schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-mx2q-35m2-x2rh
|
2023-04-18T16:14:52Z
|
2023-04-17T16:45:21Z
| null |
['CVE-2023-30541']
|
OpenZeppelin Contracts TransparentUpgradeableProxy clashing selector calls may not be delegated
|
### Impact
A function in the implementation contract may be inaccessible if its selector clashes with one of the proxy's own selectors. Specifically, if the clashing function has a different signature with incompatible ABI encoding, the proxy could revert while attempting to decode the arguments from calldata.
The probability of an accidental clash is negligible, but one could be caused deliberately.
### Patches
The issue has been fixed in v4.8.3.
### Workarounds
If a function appears to be inaccessible for this reason, it may be possible to craft the calldata such that ABI decoding does not fail at the proxy and the function is properly proxied through.
### References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4154
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.8.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.8.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-mx2q-35m2-x2rh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30541'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/4154'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.8.3'}]
|
{'cwe_ids': ['CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-17T16:45:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w9mr-28mw-j8hg
|
2023-04-27T15:52:24Z
|
2023-04-26T19:44:00Z
| null |
[]
|
Hop-by-hop abuse to malform header mutator
|
### Impact
Downstream services relying on the presence of headers set by the `header` mutator could be exploited. A client can drop the header set by the `header` mutator by including that header's name in the `Connection` header. Example minimal config:
```yaml
- id: 'example'
upstream:
url: 'https://example.com'
match:
url: 'http://127.0.0.1:4455/'
methods:
- GET
authenticators:
- handler: anonymous
authorizer:
handler: allow
mutators:
- handler: header
config:
headers:
X-Subject: {{ .Subject }}
```
```
curl -H "Connection: close,x-subject" http://127.0.0.1:4455/
```
The `X-Subject` header will not arrive at the downstream server. It is completely dropped. In case the downstream server handles such a request in an unexpected way, an attacker can exploit this, assuming they know or guess the internal header name.
### Patches
c5cc7f736dc84185034be4356057d1c7a656d797
### Workarounds
The downstream server should handle the case that an expected header is not set by responding with an appropriate error.
### References
See background info in https://github.com/golang/go/issues/50580
|
[]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/oathkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/security/advisories/GHSA-w9mr-28mw-j8hg'}, {'type': 'PACKAGE', 'url': 'https://github.com/ory/oathkeeper'}]
|
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:44:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qgw9-vgrf-h723
|
2023-04-12T22:18:27Z
|
2023-04-12T18:30:36Z
| null |
['CVE-2023-30523']
|
Jenkins Report Portal Plugin allows users with Item/Extended Read permission to view tokens on Jenkins controller
|
Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.
These tokens can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Additionally, the configuration form does not mask these tokens, increasing the potential for attackers to observe and capture them.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:reportportal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30523'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2945'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:18:27Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-7jhg-8m74-6f6g
|
2023-04-27T21:46:44Z
|
2023-04-17T18:30:28Z
| null |
['CVE-2023-27525']
|
Apache Superset vulnerable to Improper Authorization
|
An authenticated user with Gamma role authorization could have access to metadata information using non trivial methods in Apache Superset up to and including 2.0.1
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27525'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/wpv7b17zjg2pmvpfkdd6nn8sco8y2q77'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:26:33Z', 'nvd_published_at': '2023-04-17T17:15:00Z'}
|
1.4.0
|
GHSA-w974-rq9x-mh3v
|
2023-04-07T22:43:24Z
|
2023-04-04T15:30:27Z
| null |
['CVE-2020-19697']
|
Pandao Editor.md vulnerable to cross-site scripting (XSS) in iframe src parameter
|
Cross-site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script in the `<iframe> src` parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19697'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/701'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/pull/860'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:24:07Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
|
1.4.0
|
GHSA-55vq-xpjf-r2xc
|
2023-05-05T20:35:56Z
|
2023-04-27T21:30:26Z
| null |
['CVE-2023-29471']
|
Lightbend Alpakka Kafka logs credentials on debug level
|
Lightbend Alpakka Kafka before 4.0.2 logs its configuration as debug information, and thus log files may contain credentials (if plain cleartext login is configured). This occurs in akka.kafka.internal.KafkaConsumerActor.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.akka:akka-stream-kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29471'}, {'type': 'WEB', 'url': 'https://github.com/akka/alpakka-kafka/issues/1592'}, {'type': 'WEB', 'url': 'https://github.com/akka/alpakka-kafka/pull/1614/commits/4011b704e93b22f6fd956aac516c7159d384644c'}, {'type': 'WEB', 'url': 'https://akka.io/security/alpakka-kafka-cve-2023-29471.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/akka/alpakka-kafka'}]
|
{'cwe_ids': ['CWE-312', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:53:28Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2hw6-4rv9-82fp
|
2023-04-11T21:58:45Z
|
2023-04-05T00:30:39Z
| null |
['CVE-2023-0265']
|
Uvdesk remote code execution vulnerability
|
Uvdesk version 1.1.1 allows an authenticated remote attacker to execute commands on the server. This is possible because the application does not properly validate profile pictures uploaded by customers.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'uvdesk/community-skeleton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0265'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/supply/'}, {'type': 'PACKAGE', 'url': 'https://github.com/uvdesk/community-skeleton'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:58:45Z', 'nvd_published_at': '2023-04-04T22:15:00Z'}
|
1.4.0
|
GHSA-qgm7-m77f-j8pf
|
2023-04-10T16:29:54Z
|
2023-04-02T21:30:16Z
| null |
['CVE-2023-28682']
|
Jenkins Performance Publisher Plugin vulnerable to XML external entity (XXE) attacks
|
Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control PerfPublisher report files to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:perfpublisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.09'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28682'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/perfpublisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2928'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:55:48Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-mj9r-fpv3-rgfx
|
2023-05-03T16:04:42Z
|
2023-04-21T15:30:18Z
| null |
['CVE-2022-48150']
|
Shopware vulnerable to cross-site scripting (XSS)
|
Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.5.10'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48150'}, {'type': 'WEB', 'url': 'https://github.com/sahilop123/-CVE-2022-48150'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T19:55:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-p9mj-v5mf-m82x
|
2023-04-16T07:16:09Z
|
2023-04-12T20:35:13Z
| null |
['CVE-2023-29210']
|
org.xwiki.platform:xwiki-platform-notifications-ui Eval Injection vulnerability
|
### Impact
Any user with view rights on commonly accessible documents including the notification preferences macros can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the user parameter of the macro that provide the [notification filters](https://extensions.xwiki.org/xwiki/bin/view/Extension/Notifications%20Application/#HFilters). These macros are used in the user profiles and thus installed by default in XWiki.
A proof of concept exploit is
```
{{notificationsFiltersPreferences target="user" user="~" /~}~} {{async async=~"true~" cached=~"false~" context=~"doc.reference~"~}~}{{groovy~}~}new File(~"/tmp/exploit.txt~").withWriter { out -> out.println(~"created from filter preferences!~"); }{{/groovy~}~}{{/async~}~}"/}}
{{notificationsAutoWatchPreferences target="user" user="~" /~}~} {{async async=~"true~" cached=~"false~" context=~"doc.reference~"~}~}{{groovy~}~}new File(~"/tmp/exploit2.txt~").withWriter { out -> out.println(~"created from auto watch preferences!~"); }{{/groovy~}~}{{/async~}~}"/}}
{{notificationsEmailPreferences target="user" user="~" /~}~} {{async async=~"true~" cached=~"false~" context=~"doc.reference~"~}~}{{groovy~}~}new File(~"/tmp/exploit3.txt~").withWriter { out -> out.println(~"created from email filter preferences!~"); }{{/groovy~}~}{{/async~}~}"/}}
```
If this creates files inside `/tmp`, the installation is vulnerable.
### Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
### Workarounds
The issue can be fixed by patching the code in the affected macros that are contained in XWiki documents as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/cebf9167e4fd64a8777781fc56461e9abbe0b32a) for this issue.
### References
* https://github.com/xwiki/xwiki-platform/commit/cebf9167e4fd64a8777781fc56461e9abbe0b32a
* https://jira.xwiki.org/browse/XWIKI-20259
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-notifications-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.2-rc-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-notifications-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-notifications-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29210'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/cebf9167e4fd64a8777781fc56461e9abbe0b32a'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20259'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:35:13Z', 'nvd_published_at': '2023-04-15T17:15:00Z'}
|
1.4.0
|
GHSA-7v7g-9vx6-vcg2
|
2023-04-07T19:22:41Z
|
2023-04-07T19:22:41Z
| null |
['CVE-2023-29014']
|
Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter
|
### Impact
A reflected cross-site scripting vulnerability has been identified in Goobi viewer core when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser.
### Patches
The vulnerability has been fixed in version 23.03
### Credits
We would like to thank [RUS-CERT](https://cert.uni-stuttgart.de/) for reporting this issues.
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.goobi.viewer:viewer-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.03'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-7v7g-9vx6-vcg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29014'}, {'type': 'WEB', 'url': 'https://github.com/intranda/goobi-viewer-core/commit/c29efe60e745a94d03debc17681c4950f3917455'}, {'type': 'PACKAGE', 'url': 'https://github.com/intranda/goobi-viewer-core'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:22:41Z', 'nvd_published_at': '2023-04-06T20:15:00Z'}
|
1.4.0
|
GHSA-3gvp-54v2-2jrp
|
2023-04-07T22:09:07Z
|
2023-04-04T15:30:27Z
| null |
['CVE-2020-19850']
|
Directus API vulnerable to denial of service
|
An issue found in Directus API v.2.2.0 allows a remote attacker to cause a denial of service via a great amount of HTTP requests.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19850'}, {'type': 'WEB', 'url': 'https://github.com/directus/api/issues/982'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/v8-archive'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T22:09:07Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
|
1.4.0
|
GHSA-6m9f-pj6w-w87g
|
2023-04-25T18:09:03Z
|
2023-04-24T22:34:59Z
| null |
['CVE-2023-22651']
|
Rancher Webhook is misconfigured during upgrade process
|
### Impact
A failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security checks before resources are admitted into the Kubernetes cluster.
When the Webhook is operating in a degraded state, it no longer validates any resources, which may result in severe privilege escalations and data corruption.
The issue only affects users that upgrade from `2.6.x` or `2.7.x` to `2.7.2`. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.
The command below can be executed on the `local` cluster to determine whether the cluster is affected by this issue:
```sh
$ kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io
NAME WEBHOOKS AGE
rancher.cattle.io 0 19h
```
If the resulting webhook quantity is `0`, the Rancher instance is affected.
### Patches
Patched versions include release `2.7.3` and later versions.
### Workarounds
If you are affected and cannot update to a patched Rancher version, the recommended workaround is to manually reconfigure the Webhook with the script below. Please note that the script must be run from inside the `local` cluster or with a kubeconfig pointing to the `local` cluster which has admin permissions.
```yaml
#!/bin/bash
set -euo pipefail
function prereqs() {
if ! [ -x "$(command -v kubectl)" ]; then
echo "error: kubectl is not installed." >&2
exit 1
fi
if [[ -z "$(kubectl config view -o jsonpath='{.clusters[].cluster.server}')" ]]; then
echo "error: No kubernetes cluster found on kubeconfig." >&2
exit 1
fi
}
function restart_deployment(){
kubectl rollout restart deployment rancher-webhook -n cattle-system
kubectl rollout status deployment rancher-webhook -n cattle-system --timeout=30s
}
function workaround() {
echo "Cluster: $(kubectl config view -o jsonpath='{.clusters[].cluster.server}')"
if ! kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io > /dev/null 2>&1; then
echo "webhook rancher.cattle.io not found, restarting deployment:"
restart_deployment
echo "waiting for webhook configuration"
sleep 15s
fi
local -i webhooks
webhooks="$(kubectl get validatingwebhookconfigurations.admissionregistration.k8s.io rancher.cattle.io --no-headers | awk '{ print $2 }')"
if [ "${webhooks}" == "0" ]; then
echo "Webhook misconfiguration status: Cluster is affected by CVE-2023-22651"
echo "Running workaround:"
kubectl delete validatingwebhookconfiguration rancher.cattle.io
restart_deployment
ret=$?
if [ $ret -eq 0 ]; then
echo "Webhook restored, CVE-2023-22651 is fixed"
else
echo "error trying to restart deployment. try again in a few seconds."
fi
else
echo "Webhook misconfiguration status: not present (skipping)"
fi
echo "Done"
}
function main() {
prereqs
workaround
}
main
```
### References
- https://github.com/rancher/webhook/pull/216/commits/a4a498613b43a3ee93c5ab06742a3bc8adace45d
### For more information
If you have any questions or comments about this advisory:
- Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
- Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
- Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.2'}, {'fixed': '2.7.3'}]}], 'versions': ['2.7.2']}]
|
[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-6m9f-pj6w-w87g'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.7.3'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:34:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-h83h-77x2-6w6g
|
2023-04-28T20:06:45Z
|
2023-04-22T18:30:28Z
| null |
['CVE-2023-2239']
|
Information exposure in microweber
|
Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository microweber/microweber prior to 1.3.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2239'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b0644cb3411b36b6ccc2ff7cdf7af3fa49525baa'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/edeff16b-fc71-4e26-8d2d-dfe7bb5e7868'}]
|
{'cwe_ids': ['CWE-359'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T16:48:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9jxr-mwpp-w643
|
2023-04-21T20:27:12Z
|
2023-04-21T20:27:12Z
| null |
[]
|
Improper header validation in httpsoft/http-message
|
### Impact
Improper header parsing. An attacker could sneak in a newline (`\n`) into both the header names and values. While the specification states that `\r\n\r\n` is used to terminate the header list, many servers in the wild will also accept `\n\n`.
### Patches
The issue is patched in 1.0.12.
### Workarounds
There are no known workarounds.
### References
* https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'httpsoft/http-message'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw'}, {'type': 'WEB', 'url': 'https://github.com/httpsoft/http-message/security/advisories/GHSA-9jxr-mwpp-w643'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29197'}, {'type': 'PACKAGE', 'url': 'https://github.com/httpsoft/http-message'}]
|
{'cwe_ids': ['CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:27:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m3c3-9qj7-7xmx
|
2023-04-20T22:01:35Z
|
2023-04-20T22:01:35Z
| null |
['CVE-2023-29517']
|
Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-office-viewer
|
### Impact
The office document viewer macro was allowing anyone to see any file content from the hosting server, provided that the office server was connected and depending on the permissions of the user running the servlet engine (e.g. tomcat) running XWiki. The same vulnerability also allowed to perform internal requests to resources from the hosting server.
### Patches
The problem has been patched in XWiki 13.10.11, 14.10.1, 14.4.8, 15.0-rc-1.
### Workarounds
It might be possible to workaround this vulnerability by running XWiki in a sandbox with a user with very low privileges on the machine, now to run a servlet engine the user will always need access to some files, so in any case this workaround won't protect all files to be accessed.
### References
* Original jira ticket: https://jira.xwiki.org/browse/XWIKI-20447
* Jira ticket related to another exploit using same root cause: https://jira.xwiki.org/browse/XWIKI-20324
* Jira ticket related to the possibility to exploit the same vulnerability to perform internal requests: https://jira.xwiki.org/browse/XWIKI-20449
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-office-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-milestone-2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-office-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-office-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m3c3-9qj7-7xmx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29517'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20324'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20447'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20449'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:01:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qm2h-m799-86rc
|
2023-04-14T20:24:46Z
|
2023-04-10T09:30:15Z
| null |
['CVE-2023-29215']
|
Apache Linkis JDBC EngineConn has deserialization vulnerability
|
In Apache Linkis <=1.3.1, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in JDBC EngineConn Module will trigger a deserialization vulnerability and eventually lead to remote code execution. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. Users should upgrade their version of Linkis to version 1.3.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis-engineconn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29215'}, {'type': 'WEB', 'url': 'https://github.com/apache/linkis/commit/7005c01d7f7bca78322447f4f2f32b8398645687'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/linkis'}, {'type': 'WEB', 'url': 'https://linkis.apache.org/download/release-notes-1.3.2/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o682wz1ggq491ybvjwokxvcdtnzo76ls'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/10/4'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T20:21:26Z', 'nvd_published_at': '2023-04-10T08:15:00Z'}
|
1.4.0
|
GHSA-fwhv-9phj-wrj5
|
2023-04-11T21:58:17Z
|
2023-04-05T00:30:39Z
| null |
['CVE-2023-0325']
|
Uvdesk vulnerable to stored cross-site scripting (XSS)
|
Uvdesk version 1.1.1 allows an unauthenticated remote attacker to exploit a stored XSS in the application. This is possible because the application does not correctly validate the message sent by the clients in the ticket.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'uvdesk/community-skeleton'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0325'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/labrinth/'}, {'type': 'PACKAGE', 'url': 'https://github.com/uvdesk/community-skeleton/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:58:17Z', 'nvd_published_at': '2023-04-04T22:15:00Z'}
|
1.4.0
|
GHSA-939c-3g97-vpvv
|
2023-05-09T20:30:35Z
|
2023-04-26T00:30:21Z
| null |
['CVE-2023-26735']
|
Access control issues in blackbox_exporter
|
blackbox_exporter v0.23.0 was discovered to contain an access control issue in its probe interface. This vulnerability allows attackers to detect intranet ports and services, as well as download resources.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/blackbox_exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.23.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26735'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/blackbox_exporter/issues/1024'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/blackbox_exporter/issues/1025'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/blackbox_exporter/issues/1026'}, {'type': 'PACKAGE', 'url': 'https://github.com/prometheus/blackbox_exporter'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/blackbox_exporter#tls-and-basic-authentication'}, {'type': 'WEB', 'url': 'http://blackboxexporter.com'}, {'type': 'WEB', 'url': 'http://prometheus.com'}]
|
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T15:56:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fp7q-xhhw-6rj3
|
2023-04-26T16:05:02Z
|
2023-04-26T16:05:02Z
| null |
['CVE-2023-29200']
|
Path traversal vulnerability in the file manager
|
### Impact
Authenticated users in the back end can list files outside the document root in the file manager.
### Patches
Update to Contao 4.9.40, 4.13.21 or 5.1.4.
### Workarounds
None.
### References
https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager
### For more information
If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/contao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.40'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/contao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.13.0'}, {'fixed': '4.13.21'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/contao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-fp7q-xhhw-6rj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29200'}, {'type': 'WEB', 'url': 'https://github.com/contao/contao/commit/6f3e705f4ff23f4419563d09d8485793569f31df'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/directory-traversal-in-the-file-manager.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/contao/CVE-2023-29200.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T16:05:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7jr4-hgqx-vwgq
|
2023-05-10T00:37:32Z
|
2023-04-26T15:30:21Z
| null |
['CVE-2022-25274']
|
Access bypass in Drupal core
|
Drupal 9.3 implemented a generic entity access API for entity revisions. However, this API was not completely integrated with existing permissions, resulting in some possible access bypass for users who have access to use revisions of content generally, but who do not have access to individual items of node and media content. This vulnerability only affects sites using Drupal's revision system.
All releases prior to Drupal 9.3 (including Drupal 7) are not affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25274'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-009'}]
|
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:14:41Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jr86-6j4j-mv45
|
2023-04-21T17:52:22Z
|
2023-04-12T18:30:36Z
| null |
['CVE-2023-30521']
|
Jenkins Assembla merge request builder Plugin missing authentication to access endpoint
|
Jenkins Assembla merge request builder Plugin provides a webhook endpoint at `/assembla-webhook/` that can be used to trigger builds of jobs configured to use a specified repository.
In Assembla merge request builder Plugin 1.1.13 and earlier, this endpoint can be accessed without authentication. This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:assembla-merge-request-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30521'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2872'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:18:11Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-r7mm-jx6h-hv7m
|
2023-04-27T22:34:22Z
|
2023-04-27T22:34:22Z
| null |
['CVE-2023-2332']
|
Cross-site Scripting (XSS) in Conditions tab of Pricing Rules
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe.patch manually.
### References
https://huntr.dev/bounties/e436ed71-6741-4b30-89db-f7f3de4aca2c/
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-r7mm-jx6h-hv7m'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T22:34:22Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wqm8-jx8r-8rcq
|
2023-04-26T15:54:44Z
|
2023-04-26T15:54:44Z
| null |
[]
|
Cross-site scripting vulnerabilities in old version of bundled TinyMCE
|
An old version of TinyMCE include an XSS vulnerability, which was patched in a later version. This was described by TinyMCE:
> A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower.
We reviewed the potential impact of this vulnerability within the context of Silverstripe CMS. We concluded this is a medium impact vulnerability given how TinyMCE is used by Silverstripe CMS.
Reported by: Developers at ACC
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-admin/security/advisories/GHSA-wqm8-jx8r-8rcq'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/admin/SS-2023-001.yaml'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vrv8-v4w8-f95h'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-admin'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/ss-2023-001'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T15:54:44Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2jgw-28qh-6mg8
|
2023-04-21T16:13:58Z
|
2023-04-12T18:30:36Z
| null |
['CVE-2023-30520']
|
Jenkins Quay.io trigger Plugin Cross-site Scripting vulnerability
|
Jenkins Quay.io trigger Plugin 0.1 and earlier does not limit URL schemes for repository homepage URLs submitted via Quay.io trigger webhooks. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted Quay.io trigger webhook payloads.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:quayio-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30520'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2850'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:18:02Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-f4v8-58f6-mwj4
|
2023-04-18T14:09:30Z
|
2023-04-12T20:36:42Z
| null |
['CVE-2023-29509']
|
org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability
|
### Impact
Any user with view rights on commonly accessible documents can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `documentTree` macro parameters in This macro is installed by default in `FlamingoThemesCode.WebHome`. This page is installed by default.
Example of reproduction:
Open `<xwiki_host>/xwiki/bin/view/%22%20%2F%7D%7D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=FlamingoThemesCode.WebHome&xpage=view` where `<xwiki_host>` is the URL of your XWiki installation.
> The [documentTree] macro is a standalone macro and it cannot be used inline. Click on this message for details.
> Hello from groovy!.WebHome" /}}
is displayed. This shows that the Groovy macro that is passed in the URL has been executed and thus demonstrates a privilege escalation from view to programming rights.
### Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
### Workarounds
The issue can be fixed by replacing the code of `FlamingoThemesCode.WebHome` by the [patched version](https://github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0ae).
### References
- https://jira.xwiki.org/browse/XWIKI-20279
- https://github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0ae
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2-rc-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4v8-58f6-mwj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29509'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20279'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:36:42Z', 'nvd_published_at': '2023-04-16T08:15:00Z'}
|
1.4.0
|
GHSA-6pvf-cq4f-hfjp
|
2023-05-03T16:03:50Z
|
2023-04-21T15:30:18Z
| null |
['CVE-2023-2228']
|
modoboa vulnerable to Cross-Site Request Forgery
|
modoboa prior to 2.1.0 is vulnerable to cross-site request forgery. An attacker must be logged in as admin to exploit this issue.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2228'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/5d886f3d06373d2c3292911bac0772bcd5102343'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:29:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qghr-877h-f9jh
|
2023-04-05T17:55:20Z
|
2023-04-05T00:30:38Z
| null |
['CVE-2023-0835']
|
markdown-pdf vulnerable to local file read via server side cross-site scripting (XSS)
|
markdown-pdf version 11.0.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the Markdown content entered by the user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'markdown-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0835'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/relsb/'}, {'type': 'PACKAGE', 'url': 'https://github.com/alanshaw/markdown-pdf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/markdown-pdf/'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T17:55:20Z', 'nvd_published_at': '2023-04-04T23:15:00Z'}
|
1.4.0
|
GHSA-6mhm-gcpf-5gr8
|
2023-04-27T19:57:24Z
|
2023-04-27T17:09:50Z
| null |
['CVE-2023-30848']
|
SQL Injection in Admin Search Find API
|
### Impact
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access.
In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. It was observed that the reported API endpoint accessible by an authenticated administrator user and is vulnerable to SQL injection via the "fields[]" GET parameter. The parameter is not sanitized properly and is used in a SQL statement in an unsafe manner, resulting in SQL injection.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3.patch manually.
### References
https://github.com/pimcore/pimcore/pull/14972
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-6mhm-gcpf-5gr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30848'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14972'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:09:50Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5cvg-9pp5-mxcj
|
2023-04-14T20:31:27Z
|
2023-04-07T15:30:38Z
| null |
['CVE-2023-28706']
|
Apache Airflow Hive Provider vulnerable to code injection
|
Apache Software Foundation's Apache Airflow Hive Provider before 6.0.0 is vulnerable to improper control of generation of code.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28706'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/30212'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/dl20xxd51xvlx0zzc0wzgxfjwgtbbxo3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/07/2'}]
|
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T22:23:40Z', 'nvd_published_at': '2023-04-07T15:15:00Z'}
|
1.4.0
|
GHSA-2x3r-7jgm-gh8x
|
2023-05-05T20:33:39Z
|
2023-04-26T21:30:37Z
| null |
['CVE-2020-36070']
|
Remote code execution in Voyager
|
Insecure Permission vulnerability found in Voyager v.1.4 and before allows a remote attacker to execute arbitrary code via a crafted .php file to the media component.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'tcg/voyager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36070'}, {'type': 'PACKAGE', 'url': 'https://github.com/the-control-group/voyager/'}]
|
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T14:00:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fprp-p869-w6q2
|
2023-04-17T20:06:20Z
|
2023-04-05T03:30:17Z
| null |
['CVE-2023-29374']
|
LangChain vulnerable to code injection
|
In LangChain through 0.0.131, the `LLMMathChain` chain allows prompt injection attacks that can execute arbitrary code via the Python `exec()` method.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.131'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29374'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/1026'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/814'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/pull/1119'}, {'type': 'PACKAGE', 'url': 'https://github.com/hwchase17/langchain'}, {'type': 'WEB', 'url': 'https://twitter.com/rharang/status/1641899743608463365/photo/1'}]
|
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T19:39:41Z', 'nvd_published_at': '2023-04-05T02:15:00Z'}
|
1.4.0
|
GHSA-g472-f8cm-8x5f
|
2023-04-12T22:19:04Z
|
2023-04-12T18:30:36Z
| null |
['CVE-2023-30527']
|
Jenkins WSO2 Oauth Plugin stores WSO2 Oauth client secret unencrypted in global config.xml file on Jenkins controller
|
Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller as part of its configuration.
This client secret can be viewed by users with access to the Jenkins controller file system.
Additionally, the global configuration form does not mask the WSO2 Oauth client secret, increasing the potential for attackers to observe and capture it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:wso2id-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30527'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2992'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:04Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-329j-jfvr-rhr6
|
2023-08-21T16:01:41Z
|
2023-04-17T09:30:23Z
| null |
['CVE-2023-22946']
|
Apache Spark vulnerable to Improper Privilege Management
|
In Apache Spark versions prior to versions 3.4.0 and 3.3.3, applications using spark-submit can specify a `proxy-user` to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications.
Update to Apache Spark 3.4.0, 3.3.3, or later, and ensure that spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its default of "false", and is not overridden by submitted applications.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.13'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22946'}, {'type': 'WEB', 'url': 'https://github.com/apache/spark/pull/39474'}, {'type': 'WEB', 'url': 'https://github.com/apache/spark/pull/41428'}, {'type': 'WEB', 'url': 'https://github.com/apache/spark/commit/909da96e1471886a01a9e1def93630c4fd40e74a'}, {'type': 'WEB', 'url': 'https://github.com/degant/spark/commit/bfba57724d2520e0fcaa7990f7257c21d11cd75a'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SPARK-41958'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/yllfl25xh5tbotjmg93zrq4bzwhqc0gv'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:37:59Z', 'nvd_published_at': '2023-04-17T08:15:00Z'}
|
1.4.0
|
GHSA-3862-c622-v4fp
|
2023-05-02T21:53:42Z
|
2023-04-24T09:30:19Z
| null |
['CVE-2023-31045']
|
Cross-site Scripting in Backdrop CMS
|
A stored Cross-site scripting (XSS) issue in Text Editors and Formats in Backdrop CMS before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via the name parameter. When a user is editing any content type (e.g., page, post, or card) as an admin, the stored XSS payload is executed upon selecting a malicious text formatting option.
NOTE: the vendor disputes the security relevance of this finding because "any administrator that can configure a text format could easily allow Full HTML anywhere."
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31045'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop-issues/issues/6065'}, {'type': 'PACKAGE', 'url': 'https://github.com/backdrop-ops/backdrop-composer'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.24.2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:33:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9hcr-9hcv-x6pv
|
2023-04-19T17:12:23Z
|
2023-04-10T16:37:40Z
| null |
['CVE-2023-29005']
|
Flask-AppBuilder Has No Rate Limiting on Login AUTH DB
|
### Impact
Lack of rate limiting will allow an attacker to brute-force user credentials.
### Patches
Ability to enable rate limiting on Flask-AppBuilder >= 4.3.0. Use `AUTH_RATE_LIMITED = True` and `RATELIMIT_ENABLED = True` set the limit itself by using `AUTH_RATE_LIMIT`. Will apply only to database authentication.
### Workarounds
Implement rate limiting using a reverse proxy or other strategies.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-9hcr-9hcv-x6pv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29005'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1976'}, {'type': 'WEB', 'url': 'https://flask-limiter.readthedocs.io/en/stable/configuration.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.3.0'}]
|
{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:37:40Z', 'nvd_published_at': '2023-04-10T21:15:00Z'}
|
1.4.0
|
GHSA-r69v-q48g-3966
|
2023-05-09T20:53:07Z
|
2023-04-30T03:30:26Z
| null |
['CVE-2023-2429']
|
phpMyFAQ Improper Access Control vulnerability
|
phpMyFAQ prior to version 3.1.13 does not properly validate email addresses when updating user profiles. This vulnerability allows an attacker to manipulate their email address and change it to another email address that is already registered in the system, including email addresses belonging to other users such as the administrator. Once the attacker has control of the other user's email address, they can request to remove the user from the system, leading to a loss of data and access.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2429'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/07552f5577ff8b1e6f7cdefafcce9b2a744d3a24'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/20d3a0b3-2693-4bf1-b196-10741201a540'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T22:30:43Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f7rp-xx67-4pj9
|
2023-04-10T22:37:26Z
|
2023-04-04T15:30:28Z
| null |
['CVE-2020-19277']
|
Phachon mm-wiki vulnerable to stored cross-site scripting (XSS)
|
Phachon mm-wiki v.0.1.2 vulnerable to stored cross-site scripting (XSS). This could allow a remote attacker to execute arbitrary code via JavaScript code in the markdown editor. Any user browsing the document containing XSS malicious code will trigger the vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/phachon/mm-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19277'}, {'type': 'WEB', 'url': 'https://github.com/phachon/mm-wiki/issues/68'}, {'type': 'PACKAGE', 'url': 'https://github.com/phachon/mm-wiki'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T19:27:22Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
|
1.4.0
|
GHSA-f8r8-h93m-mj77
|
2023-04-06T16:59:26Z
|
2023-04-05T21:30:24Z
| null |
['CVE-2023-1782']
|
HashiCorp Nomad vulnerable to unauthenticated client agent HTTP request privilege escalation
|
HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1782'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}]
|
{'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T16:59:26Z', 'nvd_published_at': '2023-04-05T20:15:00Z'}
|
1.4.0
|
GHSA-2c67-p4xh-m34w
|
2023-05-04T21:43:58Z
|
2023-04-27T17:13:37Z
| null |
['CVE-2023-2342']
|
Cross-site Scripting (XSS) in Website Settings name field
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patches manually
https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091.patch
https://github.com/pimcore/pimcore/commit/42a5bbe5f16b97371fdbfdcf2bb3ee759dea8564.patch
### Workarounds
Apply patches manually:
https://github.com/pimcore/pimcore/commit/07a2c95be524c7e20105cef58c5767d4ebb06091.patch
https://github.com/pimcore/pimcore/commit/42a5bbe5f16b97371fdbfdcf2bb3ee759dea8564.patch
### References
https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2c67-p4xh-m34w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2342'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/42a5bbe5f16b97371fdbfdcf2bb3ee759dea8564'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:13:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4qmm-cv4r-qfr4
|
2023-04-21T20:35:00Z
|
2023-04-15T15:30:14Z
| null |
['CVE-2023-2105']
|
alextselegidis/easyappointments Session Fixation vulnerability
|
alextselegidis/easyappointments is vulnerable to session fixation. The application does not generate a new `ea_session` cookie after the user authenticates. A malicious user may create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session. If an attacker conducts this attack against an admin user, the attacker may escalate their privileges with the admin user being unaware.
This issue is patched in commit 7f37350fab9d729a9350d96369ff0f453cf7b840 and anticipated to be part of version 1.5.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2105'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/7f37350fab9d729a9350d96369ff0f453cf7b840'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/de213e0b-a227-4fc3-bbe7-0b33fbf308e1'}]
|
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:34:48Z', 'nvd_published_at': '2023-04-15T14:15:00Z'}
|
1.4.0
|
GHSA-w9g2-3w7p-72g9
|
2023-04-25T16:34:41Z
|
2023-04-24T22:33:52Z
| null |
['CVE-2023-30629']
|
Incorrect success value returned in vyper
|
### Background
During the audit of [Lido's Gate Seals](https://github.com/lidofinance/gate-seals) code [statemind](https://statemind.io) team identified a weird behavior of the code that uses `raw_call`: https://github.com/lidofinance/gate-seals/blob/051593e74df01a4131c485b4fda52e691cd4b7d8/contracts/GateSeal.vy#L164 .
Construction like this:
```vyper
success = raw_call(
sealable,
_abi_encode(SEAL_DURATION_SECONDS, method_id=method_id("pauseFor(uint256)")),
revert_on_failure=False
)
```
was not fully documented: https://docs.vyperlang.org/en/v0.3.7/built-in-functions.html#raw_call .
The documentation says that: if `max_outsize=0` it should return nothing and then it says that if `revert_on_failure=False` it should return a `success` flag in the tuple of response, but what if `max_outsize=0` and `revert_on_failure=False`.
<img width="715" alt="image" src="https://user-images.githubusercontent.com/22330612/232125364-d2b3bbac-0b4f-40cb-80ff-f55d8eafef44.png">
So the team started researching what exactly happened in that case, after some research we found that the Vyper compiler generates the wrong bytecode in that case, it generates the sequence:
```
CALL // call
MLOAD // MLOAD is wrong since the CALL result is already stored in the stack
```
### Impact
Example of buggy code:
```vyper
@external
def returnSome(calling: address, a: uint256) -> bool:
success: bool = false
success = raw_call(
calling,
_abi_encode(a, method_id=method_id("a(uint256)")),
revert_on_failure=False
)
```
any contract that uses the `raw_call` with `revert_on_failure=False` and `max_outsize=0` receives the wrong response from `raw_call`. Depending on the memory garbage, the result can be either `True` or `False`.
### Patches
Fix by @charles-cooper https://github.com/vyperlang/vyper/commit/851f7a1b3aa2a36fd041e3d0ed38f9355a58c8ae
### Workarounds
The simple workaround is always to put `max_outsize>0`.
Workaround example https://github.com/lidofinance/gate-seals/pull/5/files
### References
Lido's fix: https://github.com/lidofinance/gate-seals/pull/5/files
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['vyper.builtins.functions.RawCall.build_IR']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.3.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-w9g2-3w7p-72g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30629'}, {'type': 'WEB', 'url': 'https://github.com/lidofinance/gate-seals/pull/5/files'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/851f7a1b3aa2a36fd041e3d0ed38f9355a58c8ae'}, {'type': 'WEB', 'url': 'https://docs.vyperlang.org/en/v0.3.7/built-in-functions.html#raw_call'}, {'type': 'WEB', 'url': 'https://github.com/lidofinance/gate-seals/blob/051593e74df01a4131c485b4fda52e691cd4b7d8/contracts/GateSeal.vy#L164'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
|
{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:33:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xmg8-w465-mr56
|
2023-04-27T19:57:22Z
|
2023-04-27T17:10:49Z
| null |
['CVE-2023-30849']
|
SQL Injection in Translation Export API
|
### Impact
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access.
In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. It was observed that the reported API endpoint accessible by an authenticated administrator user and is vulnerable to SQL injection via the "filter" GET parameter. The parameter accepts JSON formatted data. The value of JSON key "property" inside "filter" is not sanitized properly and is used in a SQL statement in an unsafe manner, resulting in SQL injection
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1.patch manually.
### References
#14968
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-xmg8-w465-mr56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30849'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14968'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:10:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9337-8c6c-c2xg
|
2023-04-20T14:15:51Z
|
2023-04-12T06:30:22Z
| null |
['CVE-2023-30512']
|
CubeFS allows Kubernetes cluster-level privilege escalation
|
CubeFS through 3.2.1 allows Kubernetes cluster-level privilege escalation. This occurs because DaemonSet has cfs-csi-cluster-role and can thus list all secrets, including the admin secret.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cubefs/cubefs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30512'}, {'type': 'WEB', 'url': 'https://github.com/cubefs/cubefs/issues/1882'}, {'type': 'PACKAGE', 'url': 'https://github.com/cubefs/cubefs'}]
|
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:40:15Z', 'nvd_published_at': '2023-04-12T06:15:00Z'}
|
1.4.0
|
GHSA-h2pm-378c-pcxx
|
2023-04-20T19:05:34Z
|
2023-04-20T19:05:34Z
| null |
['CVE-2023-30548']
|
Path traversal vulnerability in gatsby-plugin-sharp
|
### Impact
The gatsby-plugin-sharp plugin prior to versions 5.8.1 and 4.25.1 contains a path traversal vulnerability exposed when running the Gatsby develop server (`gatsby develop`).
The following steps can be used to reproduce the vulnerability:
```
# Create a new Gatsby project, and install gatsby-plugin-sharp
$ npm init gatsby
$ cd my-gatsby-site
$ npm install gatsby-plugin-sharp
# Add the plugin to gatsby-config.js
module.exports = {
plugins: [
{
resolve: `gatsby-plugin-sharp`,
},
]
}
# Start the Gatsby develop server
$ gatsby develop
# Execute the path traversal vulnerability
$ curl "http://127.0.0.1:8000/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
```
It should be noted that by default `gatsby develop` is only accessible via the localhost `127.0.0.1`, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as `--host 0.0.0.0`, `-H 0.0.0.0`, or the `GATSBY_HOST=0.0.0.0` environment variable.
### Patches
A patch has been introduced in `[email protected]` and `[email protected]` which mitigates the issue by ensuring that included paths remain within the project directory.
### Workarounds
As stated above, by default `gatsby develop` is only exposed to the localhost `127.0.0.1`. For those using the develop server in the default configuration no risk is posed. If other ranges are required, preventing the develop server from being exposed to untrusted interfaces or IP address ranges would mitigate the risk from this vulnerability.
We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.
### Credits
We would like to thank Patrick Rombouts and Bart Veneman [drukwerkdeal.nl] for bringing the issue to our attention.
### For more information
Email us at [[email protected]](mailto:[email protected]).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-sharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-sharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.25.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-h2pm-378c-pcxx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30548'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/commit/5f442081b227cc0879babb96858f970c4ce94c6b'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/commit/dcf88ed01df2c26e0c93a41e1a2a840076d8247e'}, {'type': 'PACKAGE', 'url': 'https://github.com/gatsbyjs/gatsby'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T19:05:34Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w4g6-8xqp-g92m
|
2023-04-10T16:27:13Z
|
2023-04-02T21:30:16Z
| null |
['CVE-2023-28683']
|
Jenkins Phabricator Differential Plugin vulnerable to XML external entity (XXE) attacks
|
Jenkins Phabricator Differential Plugin 2.1.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control coverage report file contents for the `Post to Phabricator` post-build action to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:phabricator-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28683'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phabricator-plugin/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2942'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:55:58Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-gpq5-7p34-vqx5
|
2023-04-20T22:24:46Z
|
2023-04-20T22:24:46Z
| null |
['CVE-2023-29526']
|
XWiki Platform's async and display macro allow displaying and interacting with any document in restricted mode
|
### Impact
It's possible to display any page you cannot access through the combination of the async and display macro.
Steps to reproduce:
1. Enable comments for guests by giving guests comment rights
2. As a guest, create a comment with content ```{{async}}{{display reference="Menu.WebHome" /}}{{/async}}```
3. Open the comments viewer from the menu (appends ?viewer=comments to the URL)
-> the `Menu.WebHome` is displayed while the expectation would be to have an error that the current user is not allowed to see it
### Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11.
### Workarounds
There is no known workaround.
### References
https://jira.xwiki.org/browse/XWIKI-20394
https://jira.xwiki.org/browse/XRENDERING-694
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.11.1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-async-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.11.1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-async-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-async-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29526'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XRENDERING-694'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20394'}]
|
{'cwe_ids': ['CWE-284', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:24:46Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5p75-vc5g-8rv2
|
2023-06-21T13:48:08Z
|
2023-04-04T21:20:47Z
| null |
['CVE-2023-29003']
|
SvelteKit vulnerable to Cross-Site Request Forgery
|
### Summary
The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a `+server.js` file, containing endpoint handlers for different HTTP methods.
SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to it’s users. The protection is implemented at `kit/src/runtime/server/respond.js#L52`. While the implementation does a sufficient job in mitigating common CSRF attacks, the protection can be bypassed by simply specifying a different `Content-Type` header value.
### Details
The CSRF protection is implemented using the code shown below.
```js
const forbidden =
// (1)
request.method === 'POST' &&
// (2)
request.headers.get('origin') !== url.origin &&
// (3)
is_form_content_type(request);
if (forbidden) {
// (4)
const csrf_error = error(403, `Cross-site ${request.method} form submissions are forbidden`);
if (request.headers.get('accept') === 'application/json') {
return json(csrf_error.body, { status: csrf_error.status });
}
return text(csrf_error.body.message, { status: csrf_error.status });
}
```
If the incoming request specifies a POST method (1), the protection will compare the server’s origin with the value of the HTTP `Origin` header (2). A mismatch between these values signals that a potential attack has been detected. The final check is performed on the request’s `Content-Type` header (3) whether the value is either `application/x-www-form-urlencoded` or `multipart/form-data` (`kit/src/utils/http.js#L71`). If all the previous checks pass, the request will be rejected with an 403 error response (4).
The `is_form_content_type` validation is not sufficient to mitigate all possible variations of this type of attack. If a CSRF attack is performed with the `Content-Type` header set to `text/plain`, the protection will be circumvented and the request will be processed by the endpoint handler.
<!--
### PoC
To reproduce this issue, create and run a simple server (by default running on `localhost:3000`) with a POST endpoint handler such as:
```js
export async function POST({ request }) {
const data = await request.json();
console.log(JSON.stringify(data));
return new Response(String('success'));
}
```
Next, save the malicious HTML page:
```html
<!DOCTYPE html>
<html>
<head></head>
<body>
<h1 id="name"></h1>
<form action="http://localhost:3000/api/test" method="POST" enctype="text/plain">
<input type="hidden" name="{"name":"test" value="","age":123}" />
<input type="submit" value="Submit" />
</form>
</body>
</html>
```
in a file named `index.html`. Run another web server, using Python’s built in http.server module (`python -m http.server`, by default running on `localhost:8000`), navigate to [http://localhost:8000/index.html](http://localhost:8000/index.html) and click the `Submit` button.
Verify that the browser’s URL has changed to `localhost:3000` and that the text `success` is displayed on the screen. Additionally, inspect the console of the SvelteKit web server and verify that the request body (`{"name":"test=","age":123}`) was parsed as valid JSON and printed out.
It's worth noting that this attack is possible only for JSON request bodies. Form data sent using `text/plain` will be rejected by the server.
-->
### Impact
If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts.
### Remediation
SvelteKit 1.15.1 updates the `is_form_content_type` function call in the CSRF protection logic to include `text/plain`.
As additional hardening of the CSRF protection mechanism against potential method overrides, SvelteKit 1.15.1 is now performing validation on PUT, PATCH and DELETE methods as well. This latter hardening is only needed to protect users who have put in some sort of `?_method=` override feature themselves in their `handle` hook, so that the request that `resolve` sees could be `PUT`/`PATCH`/`DELETE` when the browser issues a `POST` request.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@sveltejs/kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sveltejs/kit/security/advisories/GHSA-5p75-vc5g-8rv2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29003'}, {'type': 'WEB', 'url': 'https://github.com/sveltejs/kit/commit/bb2253d51d00aba2e4353952d4fb0dcde6c77123'}, {'type': 'PACKAGE', 'url': 'https://github.com/sveltejs/kit'}, {'type': 'WEB', 'url': 'https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fkit%401.15.1'}]
|
{'cwe_ids': ['CWE-184', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:20:47Z', 'nvd_published_at': '2023-04-04T22:15:00Z'}
|
1.4.0
|
GHSA-9gxx-32p7-ff7m
|
2023-04-21T20:25:27Z
|
2023-04-18T18:30:29Z
| null |
['CVE-2023-2160']
|
Modoboa has Weak Password Requirements
|
Modoboa 2.0.5 and prior allows users to set unsafe passwords, such as `1` or `HACK`. This issue is fixed in commit 130257c96a2392ada795785a91178e656e27015c and anticipated to be part of version 2.1.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2160'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/130257c96a2392ada795785a91178e656e27015c'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b'}]
|
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:25:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f9xv-q969-pqx4
|
2023-05-03T18:36:52Z
|
2023-04-24T15:30:34Z
| null |
['CVE-2023-2251']
|
Uncaught Exception in yaml
|
Uncaught Exception in GitHub repository eemeli/yaml starting at version 2.0.0-5 and prior to 2.2.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-5'}, {'fixed': '2.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2251'}, {'type': 'WEB', 'url': 'https://github.com/eemeli/yaml/commit/984f5781ffd807e58cad3b5c8da1f940dab75fba'}, {'type': 'PACKAGE', 'url': 'https://github.com/eemeli/yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c'}]
|
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T18:05:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2qv5-7mw5-j3cg
|
2023-04-03T22:53:18Z
|
2023-04-03T22:53:18Z
| null |
[]
|
spin-rs initialisation failure in `Once::try_call_once` can lead to undefined behaviour for other initialisers
|
`Once::try_call_once` is unsound if invoked more than once concurrently and any call fails to initialise successfully.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'spin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.3'}, {'fixed': '0.9.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mvdnes/spin-rs/issues/148'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvdnes/spin-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0031.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:53:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8r4m-5p6p-52rp
|
2023-04-26T16:03:45Z
|
2023-04-26T16:03:45Z
| null |
['CVE-2023-30545']
|
Arbitrary file read via SQL injection
|
### Impact
It is possible for a user having access to the SQL Manager (Advanced Options -> Database) to arbitrary read any file on the Operating system when using SQL function LOAD_FILE in a SELECT request. So It can access to critical information.
### Patches
The patch will be on PS 8.0.4 and PS 1.7.8.9
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8r4m-5p6p-52rp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30545'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/cddac4198a47c602878a787280d813f60c6c0630'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/d900806e1841a31f26ff0a1843a6888fc1bb7f81'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T16:03:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x263-hp5c-p2rj
|
2023-04-03T22:54:26Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28674']
|
Jenkins OctoPerf Load Testing Plugin vulnerable to Cross-site Request Forgery
|
OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to a previously configured Octoperf server using attacker-specified credentials.
Additionally, these endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
OctoPerf Load Testing Plugin Plugin 4.5.3 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkinsci.plugins:octoperf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28674'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(4)'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:54:26Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-48wp-p9qv-4j64
|
2023-04-11T22:08:18Z
|
2023-04-11T22:08:18Z
| null |
[]
|
Commonmarker vulnerable to to several quadratic complexity bugs that may lead to denial of service
|
## Impact
Several quadratic complexity bugs in commonmarker's underlying [`cmark-gfm`](https://github.com/github/cmark-gfm) library may lead to unbounded resource exhaustion and subsequent denial of service.
The following vulnerabilities were addressed:
* [CVE-2023-24824](https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh)
* [CVE-2023-26485](https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5)
For more information, consult the release notes for version [`0.23.0.gfm.10`](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.10) and [`0.23.0.gfm.11`](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.11).
## Mitigation
Users are advised to upgrade to commonmarker version [`0.23.9`](https://rubygems.org/gems/commonmarker/versions/0.23.9).
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh'}, {'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-48wp-p9qv-4j64'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/pull/236'}, {'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.10'}, {'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.11'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/releases/tag/v0.23.9'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T22:08:18Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-r7qr-f43m-pxfr
|
2023-04-22T00:06:38Z
|
2023-04-13T21:30:27Z
| null |
['CVE-2023-20866']
|
Spring Session session ID can be logged to the standard output stream
|
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.session:spring-session-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20866'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-session/issues/2215'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-session/commit/c98a7be0e2ced7f795018f05397dca4bd5ca8212'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-session'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-20866'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-17T17:14:40Z', 'nvd_published_at': '2023-04-13T20:15:00Z'}
|
1.4.0
|
GHSA-2j26-j953-2rph
|
2023-05-05T20:34:17Z
|
2023-04-28T15:30:18Z
| null |
['CVE-2023-28474']
|
Stored cross site scripting on saved presets
|
Concrete CMS (previously concrete5) before 9.2 is vulnerable to Stored XSS on Saved Presets on search.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28474'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:44:59Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4655-wh7v-3vmg
|
2023-04-12T20:35:42Z
|
2023-04-12T20:35:42Z
| null |
['CVE-2023-29213']
|
org.xwiki.platform:xwiki-platform-logging-ui Eval Injection vulnerability
|
### Impact
#### Steps to reproduce:
It is possible to trick a user with programming rights into visiting <xwiki-host>/xwiki/bin/view/XWiki/LoggingAdmin?loggeraction_set=1&logger_name=%7B%7Bcache%7D%7D%7B%7Bgroovy%7D%7Dnew+File%28%22%2Ftmp%2Fexploit.txt%22%29.withWriter+%7B+out+-%3E+out.println%28%22created+from+notification+filter+preferences%21%22%29%3B+%7D%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fcache%7D%7D&logger_level=TRACE where <xwiki-host> is the URL of your XWiki installation, e.g., by embedding an image with this URL in a document that is viewed by a user with programming rights.
#### Expected result:
No file in /tmp/exploit.txt has been created.
#### Actual result:
The file `/tmp/exploit.txt` is been created with content "created from notification filter preferences!". This demonstrates a CSRF remote code execution vulnerability that could also be used for privilege escalation or data leaks (if the XWiki installation can reach remote hosts).
### Patches
The problem has been patched on XWiki 14.4.7, and 14.10.
### Workarounds
The issue can be fixed manually applying this [patch](https://github.com/xwiki/xwiki-platform/commit/49fdfd633ddfa346c522d2fe71754dc72c9496ca).
### References
- https://jira.xwiki.org/browse/XWIKI-20291
- https://github.com/xwiki/xwiki-platform/commit/49fdfd633ddfa346c522d2fe71754dc72c9496ca
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-logging-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2-milestone-3'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-logging-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-logging-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4655-wh7v-3vmg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29213'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/49fdfd633ddfa346c522d2fe71754dc72c9496ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20291'}]
|
{'cwe_ids': ['CWE-352', 'CWE-74', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:35:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9pc2-x9qf-7j2q
|
2023-04-16T07:16:33Z
|
2023-04-12T20:35:03Z
| null |
['CVE-2023-29209']
|
org.xwiki.platform:xwiki-platform-legacy-notification-activitymacro Eval Injection vulnerability
|
### Impact
Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the [legacy notification activity macro](https://extensions.xwiki.org/xwiki/bin/view/Extension/Legacy%20Notification%20Activity%20Macro/). This macro is installed by default in XWiki.
A proof of concept exploit is
```
{{activity wikis="~" /~}~} {{async async=~"true~" cached=~"false~" context=~"doc.reference~"~}~}{{groovy~}~}println(~"Hello from Groovy!~"){{/groovy~}~}"/}}
```
If the output of this macro is
```
The [notifications] macro is a standalone macro and it cannot be used inline. Click on this message for details.
Hello from Groovy!" displayMinorEvents="false" displayRSSLink="false" /}}
```
or similar, the XWiki installation is vulnerable. The vulnerability can be exploited via every wiki page that is editable including the user's profile, but also with just view rights using the HTMLConverter that is part of the [CKEditor integration](https://extensions.xwiki.org/xwiki/bin/view/Extension/CKEditor%20Integration/) which is bundled with XWiki.
### Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
### Workarounds
The issue can be fixed by replacing the code of the legacy notification activity macro by the [patched version](https://github.com/xwiki/xwiki-platform/commit/94392490884635c028199275db059a4f471e57bc). Alternatively, if the macro isn't used, the document `XWiki.Notifications.Code.Legacy.ActivityMacro` can also be completely deleted.
### References
* https://github.com/xwiki/xwiki-platform/commit/94392490884635c028199275db059a4f471e57bc
* https://jira.xwiki.org/browse/XWIKI-20258
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-legacy-notification-activitymacro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.9'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-legacy-notification-activitymacro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-legacy-notification-activitymacro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29209'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/94392490884635c028199275db059a4f471e57bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20258'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:35:03Z', 'nvd_published_at': '2023-04-15T17:15:00Z'}
|
1.4.0
|
GHSA-j97g-77fj-9c4p
|
2023-04-21T17:50:30Z
|
2023-04-11T12:30:25Z
| null |
['CVE-2023-1976']
|
Answer vulnerable to account takeover because password reset links do not expire
|
answerdev/answer is an open-source knowledge-based community software. Answer prior to 1.0.6 is vulnerable to account takeover because the password reset link does not expire.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/answerdev/answer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1976'}, {'type': 'WEB', 'url': 'https://github.com/answerdev/answer/commit/813ad0b9894673b1bdd489a2e9ab60a44fe990af'}, {'type': 'PACKAGE', 'url': 'https://github.com/answerdev/answer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/469bcabf-b315-4750-b63c-82ac86d153de'}]
|
{'cwe_ids': ['CWE-263'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:31:01Z', 'nvd_published_at': '2023-04-11T11:15:00Z'}
|
1.4.0
|
GHSA-vxf7-mx22-jr24
|
2023-04-26T22:17:01Z
|
2023-04-12T20:38:44Z
| null |
['CVE-2023-29205']
|
org.xwiki.platform:xwiki-platform-rendering-xwiki vulnerable to stored cross-site scripting via HTML and raw macro
|
### Impact
The HTML macro does not systematically perform a proper neutralization of script-related html tags. As a result, any user able to use the html macro in XWiki, is able to introduce an XSS attack. This can be particularly dangerous since in a standard wiki, any user is able to use the html macro directly in their own user profile page.
### Patches
The problem has been patched in XWiki 14.8RC1. The patch involve that the HTML macro are systematically cleaned up whenever the user does not have script right.
### Workarounds
There's no workaround for this issue.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-xwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.8-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vxf7-mx22-jr24'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29205'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18568'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:38:44Z', 'nvd_published_at': '2023-04-15T16:15:00Z'}
|
1.4.0
|
GHSA-qrgf-9gpc-vrxw
|
2023-05-02T12:31:41Z
|
2023-04-20T21:18:51Z
| null |
['CVE-2023-27495']
|
Bypass of CSRF protection in the presence of predictable userInfo
|
## Description
The [CSRF](https://owasp.org/www-community/attacks/csrf) protection enforced by the `@fastify/csrf-protection` library in combination with `@fastify/cookie` can be bypassed from network and same-site attackers under certain conditions.
`@fastify/csrf-protection` supports an optional `userInfo` parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for [CVE-2021-29624](https://www.cvedetails.com/cve/CVE-2021-29624). Whenever `userInfo` parameter is missing, or its value can be predicted for the target user account, network and [same-site](https://canitakeyoursubdomain.name/) attackers can 1. fixate a `_csrf` cookie in the victim's browser, and 2. forge CSRF tokens that are valid for the victim's session. This allows attackers to bypass the CSRF protection mechanism.
As a fix, `@fastify/csrf-protection` starting from version 6.3.0 (and v4.1.0) includes a server-defined secret `hmacKey` that cryptographically binds the CSRF token to the value of the `_csrf` cookie and the `userInfo` parameter, making tokens non-spoofable by attackers. This protection is effective as long as the `userInfo` parameter is unique for each user.
### Patches
This is patched in version 6.3.0 and v4.1.0.
### Workarounds
As a workaround, developers can use a random, non-predictable `userInfo` parameter for each user.
## Credits
* Pedro Adão (@pedromigueladao), [Instituto Superior Técnico, University of Lisbon](https://tecnico.ulisboa.pt/)
* Marco Squarcina (@lavish), [Security & Privacy Research Unit, TU Wien](https://secpriv.wien/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@fastify/csrf-protection'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/csrf-protection'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/fastify/csrf-protection/security/advisories/GHSA-qrgf-9gpc-vrxw'}, {'type': 'WEB', 'url': 'https://github.com/fastify/csrf-protection/security/advisories/GHSA-rc4q-9m69-gqp8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27495'}, {'type': 'WEB', 'url': 'https://github.com/fastify/csrf-protection/commit/be3e5761f37aa05c7c1ac8ed44499c51ecec8058'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/csrf-protection'}, {'type': 'WEB', 'url': 'https://github.com/fastify/csrf-protection/releases/tag/v4.1.0'}, {'type': 'WEB', 'url': 'https://github.com/fastify/csrf-protection/releases/tag/v6.3.0'}, {'type': 'WEB', 'url': 'https://www.cvedetails.com/cve/CVE-2021-29624'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T21:18:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hg77-vx9v-f49x
|
2023-05-04T21:39:32Z
|
2023-04-27T23:09:03Z
| null |
['CVE-2023-2336']
|
Path Traversal in Asset "import from server" option
|
### Impact
An authenticated attacker can abuse import-server-files with a path traversal to download an arbitrary file from the server
An arbitrary file read vulnerability allows an attacker to read files on the server that they should not have access to, potentially including sensitive files such as configuration files, user data, and credentials. This can result in the exposure of confidential information, which can be used to launch further attacks or compromise the system.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4.patch manually.
### References
https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-hg77-vx9v-f49x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2336'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:09:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wjfc-pgfp-pv9c
|
2023-04-21T20:27:30Z
|
2023-04-21T20:27:30Z
| null |
[]
|
Improper Input Validation in nyholm/psr7
|
### Impact
Improper header parsing. An attacker could sneak in a newline (`\n`) into both the header names and values. While the specification states that `\r\n\r\n` is used to terminate the header list, many servers in the wild will also accept `\n\n`.
### Patches
The issue is patched in 1.6.1.
### Workarounds
There are no known workarounds.
### References
* https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'nyholm/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/Nyholm/psr7/security/advisories/GHSA-wjfc-pgfp-pv9c'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29197'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/nyholm/psr7/2023-04-17.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/Nyholm/psr7'}]
|
{'cwe_ids': ['CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:27:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-mjv9-vp6w-3rc9
|
2023-04-26T16:01:10Z
|
2023-04-26T16:01:10Z
| null |
['CVE-2023-30610']
|
AWS SDK for Rust will log AWS credentials when TRACE-level logging is enabled for request sending
|
The `aws_sigv4::SigningParams` struct had a derived `Debug` implementation. When debug-formatted, it would include a user's AWS access key, AWS secret key, and security token in plaintext. When TRACE-level logging is enabled for an SDK, `SigningParams` is printed, thereby revealing those credentials to anyone with access to logs.
### Impact
All users of the AWS SDK for Rust who enabled TRACE-level logging, either globally (e.g. `RUST_LOG=trace`), or for the `aws-sigv4` crate specifically.
### Patches
- Versions >= `0.55.1`
- `0.54.2`
- `0.53.2`
- `0.52.1`
- `0.51.1`
- `0.50.1`
- `0.49.1`
- `0.48.1`
- `0.47.1`
- `0.46.1`
- `0.15.1`
- `0.14.1`
- `0.13.1`
- `0.12.1`
- `0.11.1`
- `0.10.2`
- `0.9.1`
- `0.8.1`
- `0.7.1`
- `0.6.1`
- `0.5.3`
- `0.3.1`
- `0.2.1`
### Workarounds
Disable TRACE-level logging for AWS Rust SDK crates.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.55.0'}, {'fixed': '0.55.1'}]}], 'versions': ['0.55.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.54.1'}, {'fixed': '0.54.2'}]}], 'versions': ['0.54.1']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.53.1'}, {'fixed': '0.53.2'}]}], 'versions': ['0.53.1']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.52.0'}, {'fixed': '0.52.1'}]}], 'versions': ['0.52.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.51.0'}, {'fixed': '0.51.1'}]}], 'versions': ['0.51.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.49.0'}, {'fixed': '0.49.1'}]}], 'versions': ['0.49.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.48.0'}, {'fixed': '0.48.1'}]}], 'versions': ['0.48.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.47.0'}, {'fixed': '0.47.1'}]}], 'versions': ['0.47.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.46.0'}, {'fixed': '0.46.1'}]}], 'versions': ['0.46.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.15.0'}, {'fixed': '0.15.1'}]}], 'versions': ['0.15.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.1'}]}], 'versions': ['0.14.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.1'}]}], 'versions': ['0.13.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.1'}]}], 'versions': ['0.12.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.1'}]}], 'versions': ['0.11.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.1'}, {'fixed': '0.10.2'}]}], 'versions': ['0.10.1']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.1'}]}], 'versions': ['0.9.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.1'}]}], 'versions': ['0.8.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.1'}]}], 'versions': ['0.7.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.1'}]}], 'versions': ['0.6.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.2'}, {'fixed': '0.5.3'}]}], 'versions': ['0.5.2']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.1'}, {'fixed': '0.4.2'}]}], 'versions': ['0.4.1']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}], 'versions': ['0.3.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'aws-sigv4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}], 'versions': ['0.2.0']}]
|
[{'type': 'WEB', 'url': 'https://github.com/awslabs/aws-sdk-rust/security/advisories/GHSA-mjv9-vp6w-3rc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30610'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/aws-sdk-rust'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T16:01:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-58ch-c2jf-5g23
|
2023-04-10T16:42:59Z
|
2023-04-02T21:30:16Z
| null |
['CVE-2023-28684']
|
Jenkins remote-jobs-view-plugin vulnerable to XML external entity attacks
|
Jenkins remote-jobs-view-plugin Plugin 0.0.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows authenticated attackers with Overall/Read permission to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.sap.jenkinsci:remote-jobs-view-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28684'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/remote-jobs-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2956'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:42:59Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-9q7q-r54q-3f3g
|
2023-05-04T21:44:37Z
|
2023-04-27T17:11:55Z
| null |
['CVE-2023-2343']
|
Cross-site Scripting (XSS) in DataObject Classification Store
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/f1d904094700b513c4756904fa2b1e19d08d890e.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/f1d904094700b513c4756904fa2b1e19d08d890e.patch manually.
### References
https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-9q7q-r54q-3f3g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2343'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/f1d904094700b513c4756904fa2b1e19d08d890e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:11:55Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fjx5-qpf4-xjf2
|
2023-04-17T16:32:26Z
|
2023-04-17T16:32:26Z
| null |
[]
|
Parsing borsh messages with ZST which are not-copy/clone is unsound
|
Affected versions of borsh cause undefined behavior when zero-sized-types (ZST) are parsed and the Copy/Clone traits are not implemented/derived. For instance if 1000 instances of a ZST are deserialized, and the ZST is not copy (this can be achieved through a singleton), then accessing/writing to deserialized data will cause a segmentation fault.
There is currently no way for borsh to read data without also providing a Rust type. Therefore, if you are not using ZST for serialization, then you are not affected by this issue.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'borsh'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-alpha.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.3'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/near/borsh-rs/issues/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/near/borsh-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0033.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-17T16:32:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9jq5-xwqw-q8j3
|
2023-04-20T22:05:26Z
|
2023-04-20T22:05:26Z
| null |
['CVE-2023-29520']
|
XWiki Platform vulnerable to page render failure due to broken translations
|
### Impact
It's possible to break many translations coming from wiki pages by creating a corrupted document containing a translation object.
### Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.
### Workarounds
There is no other workaround other than fixing any way to create a document that fail to load.
### References
https://jira.xwiki.org/browse/XWIKI-20460
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-localization-source-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3-milestone-2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-localization-source-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-localization-source-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq5-xwqw-q8j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29520'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20460'}]
|
{'cwe_ids': ['CWE-248', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:05:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-hcg3-56jf-x4vh
|
2023-04-14T21:35:38Z
|
2023-04-11T06:30:29Z
| null |
['CVE-2023-26121']
|
safe-eval vulnerable to Prototype Pollution via the safeEval function
|
All versions of the package safe-eval are vulnerable to Prototype Pollution via the safeEval function, due to improper sanitization of its parameter content.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'safe-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26121'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/28'}, {'type': 'WEB', 'url': 'https://gist.github.com/seongil-wi/9d9fc0cc5b7b130419cd45827e59c4f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/hacksparrow/safe-eval'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373062'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T15:40:21Z', 'nvd_published_at': '2023-04-11T05:15:00Z'}
|
1.4.0
|
GHSA-r3mm-v4x7-2phm
|
2023-04-12T22:19:30Z
|
2023-04-12T18:30:37Z
| null |
['CVE-2023-30517']
|
Jenkins NeuVector Vulnerability Scanner Plugin disables SSL/TLS certificate and hostname validation
|
Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:neuvector-vulnerability-scanner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30517'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2841'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:30Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-xwph-x6xj-wggv
|
2023-04-26T22:17:18Z
|
2023-04-12T20:38:42Z
| null |
['CVE-2023-29204']
|
org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability
|
### Impact
It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`.
### Patches
The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
### Workarounds
The only way to workaround the bug is by providing a patched jar of xwiki-platform-oldcore containing the following changes: https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf.
### References
* Jira ticket of the reported vulnerability: https://jira.xwiki.org/browse/XWIKI-19994
* Jira ticket of the original mechanism put in place to prevent open redirect: https://jira.xwiki.org/browse/XWIKI-10309
* Original advisory about open redirect: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [Security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0-rc-1'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.8-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29204'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-10309'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19994'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:38:42Z', 'nvd_published_at': '2023-04-15T16:15:00Z'}
|
1.4.0
|
GHSA-fc4g-f42p-7rhp
|
2023-04-21T20:34:35Z
|
2023-04-15T15:30:14Z
| null |
['CVE-2023-2104']
|
alextselegidis/easyappointments Improper Access Control vulnerability
|
alextselegidis/easyappointments 1.4.3 and prior allows one provider to view and edit others providers' appointment details. A patch is available at commit 75b24735767868344193fb2cc56e17ee4b9ac4be and anticipated to be part of version 1.5.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2104'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/75b24735767868344193fb2cc56e17ee4b9ac4be'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3099b8d1-c49c-41b8-a929-73ccded6fc7c'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:34:35Z', 'nvd_published_at': '2023-04-15T14:15:00Z'}
|
1.4.0
|
GHSA-x873-6rgc-94jc
|
2023-08-23T22:15:24Z
|
2023-04-19T21:30:26Z
| null |
['CVE-2023-20862']
|
Spring Security logout not clearing security context
|
In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.8.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20862'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230526-0002/'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-20862'}]
|
{'cwe_ids': ['CWE-459'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-05T22:58:08Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jgg7-w2rj-58cj
|
2023-04-20T22:25:42Z
|
2023-04-20T22:25:42Z
| null |
['CVE-2023-29525']
|
XWiki Platform vulnerable to privilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdministration
|
### Impact
Steps to reproduce:
Open <xwiki-host>/xwiki/bin/view/XWiki/Notifications/Code/LegacyNotificationAdministration?since=%7B%7B%2Fhtml%7D%7D+%7B%7Basync+async%3D%22true%22+cached%3D%22false%22+context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello+%22+%2B+%22from+groovy%21%22%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D, where <xwiki-host> is the URL of your XWiki installation.
This demonstrates an XWiki syntax injection attack via the since-parameter, allowing privilege escalation from view to programming rights.
### Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8 and 14.10.3.
### Workarounds
For versions >= 14.6-rc-1 the workaround is to modify the page `XWiki.Notifications.Code.LegacyNotificationAdministration` to add the missing escaping, as described on https://github.com/xwiki/xwiki-platform/commit/8e7c7f90f2ddaf067cb5b83b181af41513028754#diff-4e13f4ee4a42938bf1201b7ee71ca32edeacba22559daf0bcb89d534e0225949R70
For versions < 14.6-rc-1 the workaround is to modify the file `<xwikiwebapp>/templates/distribution/eventmigration.wiki` to add the missing escaping, as described on https://github.com/xwiki/xwiki-platform/commit/6d74e2e4aa03d19f0be385ab63ae9e0f0e90a766
### References
https://jira.xwiki.org/browse/XWIKI-20287
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-distribution-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-distribution-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-distribution-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.6-rc-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-legacy-events-hibernate-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgg7-w2rj-58cj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29525'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/6d74e2e4aa03d19f0be385ab63ae9e0f0e90a766'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/8e7c7f90f2ddaf067cb5b83b181af41513028754#diff-4e13f4ee4a42938bf1201b7ee71ca32edeacba22559daf0bcb89d534e0225949R70'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20287'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:25:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xj29-gfww-j67g
|
2023-04-07T23:02:22Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28669']
|
Jenkins JaCoCo Plugin vulnerable to Stored Cross-site Scripting
|
Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action. Version 3.3.2.1 escapes class and method names shown on the UI.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jacoco'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28669'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3061'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:54:41Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-x77j-w7wf-fjmw
|
2023-04-20T21:19:24Z
|
2023-04-20T21:19:24Z
| null |
['CVE-2023-2142']
|
Nunjucks autoescape bypass leads to cross site scripting
|
### Impact
In Nunjucks versions prior to version 3.2.4, it was possible to bypass the restrictions which are provided by the autoescape functionality. If there are two user-controlled parameters on the same line used in the views, it was possible to inject cross site scripting payloads using the backslash `\` character.
#### Example
If the user-controlled parameters were used in the views similar to the following:
```
<script>
let testObject = { lang: '{{ lang }}', place: '{{ place }}' };
</script>
```
It is possible to inject XSS payload using the below parameters:
```
https://<application-url>/?lang=jp\&place=};alert(document.domain)//
```
### Patches
The issue was patched in version 3.2.4.
### References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1825980
|
[]
|
[{'package': {'ecosystem': 'npm', 'name': 'nunjucks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/security/advisories/GHSA-x77j-w7wf-fjmw'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/pull/1437'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/commit/ec16d210e7e13f862eccdb0bc9af9f60ff6749d6'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1825980'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/nunjucks'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/nunjucks/releases/tag/v3.2.4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T21:19:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9wh7-397j-722m
|
2023-04-26T19:46:00Z
|
2023-04-26T19:46:00Z
| null |
['CVE-2023-30841']
|
Ironic and ironic-inspector may expose as ConfigMaps
|
### Impact
Ironic and ironic-inspector deployed within Baremetal Operator using the included `deploy.sh` store their `.htpasswd` files as ConfigMaps instead of Secrets. This causes the plain-text username and hashed password to be readable by anyone having a cluster-wide read-access to the management cluster, or access to the management cluster's Etcd storage.
### Patches
This issue is patched in [baremetal-operator PR#1241](https://github.com/metal3-io/baremetal-operator/pull/1241), and is included in BMO release 0.3.0 onwards.
### Workarounds
User may modify the kustomizations and redeploy the BMO, or recreate the required ConfigMaps as Secrets per instructions in [baremetal-operator PR#1241](https://github.com/metal3-io/baremetal-operator/pull/1241)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/metal3-io/baremetal-operator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/metal3-io/baremetal-operator/security/advisories/GHSA-9wh7-397j-722m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30841'}, {'type': 'WEB', 'url': 'https://github.com/metal3-io/baremetal-operator/pull/1241'}, {'type': 'PACKAGE', 'url': 'https://github.com/metal3-io/baremetal-operator'}]
|
{'cwe_ids': ['CWE-200', 'CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:46:00Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7x6q-3v3m-cwjg
|
2023-04-24T16:46:14Z
|
2023-04-24T16:46:14Z
| null |
['CVE-2023-30544']
|
kiwi TCMS has possibility for user to update email address to unverified one
|
### Impact
In previous versions of Kiwi TCMS users were able to update their email addresses via the "My profile" admin page. This page allowed them to change the email address registered with their account without the ownership verification performed during account registration.
### Patches
With Kiwi TCMS v12.2 or later it is not possible to edit the email field associated with a user account!
### Workarounds
No workaround exists.
### References
Disclosed by [@novemberdad](https://huntr.dev/bounties/1714df73-e639-4d64-ab25-ced82dad9f85/).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7x6q-3v3m-cwjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30544'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1714df73-e639-4d64-ab25-ced82dad9f85/'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/04/23/kiwi-tcms-122/'}]
|
{'cwe_ids': ['CWE-283', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T16:46:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8qhm-ch8h-xgjr
|
2023-05-09T16:41:02Z
|
2023-04-27T15:30:44Z
| null |
['CVE-2023-30349']
|
Remote code execution in JFinal CMS
|
JFinal CMS v5.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the ActionEnter function.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30349'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jflyfox_jfinal'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:51:52Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5c86-gpvc-fp53
|
2023-04-28T20:08:27Z
|
2023-04-19T15:30:21Z
| null |
['CVE-2023-29923']
|
PowerJob vulnerable to Insecure Permissions
|
PowerJob V4.3.1 is vulnerable to Insecure Permissions via the list job interface.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29923'}, {'type': 'WEB', 'url': 'https://github.com/PowerJob/PowerJob/issues/587'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}]
|
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:16:20Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-m3jr-cvhj-f35j
|
2023-04-25T21:00:29Z
|
2023-04-12T20:38:17Z
| null |
['CVE-2023-29201']
|
org.xwiki.commons:xwiki-commons-xml Cross-site Scripting vulnerability
|
### Impact
The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1, only escaped `<script>` and `<style>`-tags but neither attributes that can be used to inject scripts nor other dangerous HTML tags like `<iframe>`. As a consequence, any code relying on this "restricted" mode for security is vulnerable to JavaScript injection ("cross-site scripting"/XSS). An example are anonymous comments in XWiki where the HTML macro filters HTML using restricted mode:
```javascript
{{html}}
<a href='' onclick='alert(1)'>XSS</a>
{{/html}}
```
When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance.
### Patches
This problem has been patched in XWiki 14.6 RC1 with the introduction of a filter with allowed HTML elements and attributes that is enabled in restricted mode.
### Workarounds
There are no known workarounds apart from upgrading to a version including the fix.
### References
* https://github.com/xwiki/xwiki-commons/commit/b11eae9d82cb53f32962056b5faa73f3720c6182 - the patch with the filter
* https://github.com/xwiki/xwiki-commons/commit/4a185e0594d90cd4916d60aa60bb4333dc5623b2 - the patch with the definitions what is allowed
* https://jira.xwiki.org/browse/XWIKI-9118 - the security issue with the HTML macro
* https://jira.xwiki.org/browse/XCOMMONS-1680 - the issue regarding a definition of what is allowed HTML
* https://jira.xwiki.org/browse/XCOMMONS-2426 - the issue regarding the filter that fixes the security issue
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org/)
* Email us at [XWiki Security mailing-list](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2-milestone-1'}, {'fixed': '14.6-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m3jr-cvhj-f35j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29201'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/4a185e0594d90cd4916d60aa60bb4333dc5623b2'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/b11eae9d82cb53f32962056b5faa73f3720c6182'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-commons'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XCOMMONS-1680'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XCOMMONS-2426'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-9118'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:38:17Z', 'nvd_published_at': '2023-04-15T15:15:00Z'}
|
1.4.0
|
GHSA-4r6h-8v6p-xvw6
|
2023-05-23T13:29:06Z
|
2023-04-24T09:30:19Z
| null |
['CVE-2023-30533']
|
Prototype Pollution in sheetJS
|
All versions of SheetJS CE through 0.19.2 are vulnerable to "Prototype Pollution" when reading specially crafted files. Workflows that do not read arbitrary files (for example, exporting data to spreadsheet files) are unaffected.
A non-vulnerable version cannot be found via npm, as the repository hosted on GitHub and the npm package `xlsx` are no longer maintained.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30533'}, {'type': 'WEB', 'url': 'https://cdn.sheetjs.com/advisories/CVE-2023-30533'}, {'type': 'PACKAGE', 'url': 'https://git.sheetjs.com/sheetjs/sheetjs'}, {'type': 'WEB', 'url': 'https://git.sheetjs.com/sheetjs/sheetjs/issues/2667'}, {'type': 'WEB', 'url': 'https://git.sheetjs.com/sheetjs/sheetjs/issues/2986'}, {'type': 'WEB', 'url': 'https://git.sheetjs.com/sheetjs/sheetjs/src/branch/master/CHANGELOG.md'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:40:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qvc4-78gw-pv8p
|
2023-04-24T16:47:24Z
|
2023-04-24T16:47:24Z
| null |
[]
|
Adverserial use of `make_bitflags!` macro can cause undefined behavior
|
The macro relied on an expression of the form `Enum::Variant` always being a
variant of the enum. However, it may also be an associated integer constant, in
which case there's no guarantee that the value of said constant consists only of
bits valid for this bitflag type.
Thus, code like this could create an invalid `BitFlags<Test>`, which would cause
iterating over it to trigger undefined behavior. As the debug formatter
internally iterates over the value, it is also affected.
```rust
use enumflags2::{bitflags, make_bitflags};
#[bitflags]
#[repr(u8)]
#[derive(Copy, Clone, Debug)]
enum Test {
A = 1,
B = 2,
}
impl Test {
const C: u8 = 69;
}
fn main() {
let x = make_bitflags!(Test::{C});
// printing or iterating over x is UB
}
```
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'enumflags2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.7'}]}]}]
|
[{'type': 'PACKAGE', 'url': 'https://github.com/meithecatte/enumflags2'}, {'type': 'WEB', 'url': 'https://github.com/meithecatte/enumflags2/releases/tag/v0.7.7'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0035.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T16:47:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6g67-q39g-r79q
|
2023-04-25T16:35:38Z
|
2023-04-14T16:14:17Z
| null |
['CVE-2023-29529']
|
matrix-js-sdk vulnerable to invisible eavesdropping in group calls
|
### Impact
An attacker present in a room where an [MSC3401](https://github.com/matrix-org/matrix-spec-proposals/pull/3401) group call is taking place can eavesdrop on the video and audio of participants using matrix-js-sdk, without their knowledge. To affected matrix-js-sdk users, the attacker will not appear to be participating in the call.
This attack is possible because matrix-js-sdk's group call implementation accepts incoming direct calls from other users, even if they have not yet declared intent to participate in the group call, as a means of resolving a race condition in call setup. Affected versions do not restrict access to the user's outbound media in this case.
Legacy 1:1 calls are unaffected.
### Workarounds
Users may hold group calls in private rooms where only the exact users who are expected to participate in the call are present.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '24.1.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6g67-q39g-r79q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29529'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-spec-proposals/pull/3401'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-js-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/releases/tag/v24.1.0'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-14T16:14:17Z', 'nvd_published_at': '2023-04-14T19:15:00Z'}
|
1.4.0
|
GHSA-jvjx-qqh7-6x6c
|
2023-04-06T15:06:16Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1757']
|
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via FAQ News link parameter
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the FAQ News link parameter. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1757'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/5061e5841be6c218ebb0de0cbf7b7f195dc46d19'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/584a200a-6ff8-4d53-a3c0-e7893edff60c'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:06:16Z', 'nvd_published_at': '2023-04-05T16:15:00Z'}
|
1.4.0
|
GHSA-x9xj-pqmv-8jf7
|
2023-05-10T00:43:02Z
|
2023-04-27T19:37:24Z
| null |
['CVE-2023-2327']
|
Cross-site Scripting (XSS) in pimcore via DataObject Class date fields
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patch manually.
### References
https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-x9xj-pqmv-8jf7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2327'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T19:37:24Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fq33-vmhv-48xh
|
2023-04-07T19:23:49Z
|
2023-04-07T19:23:49Z
| null |
[]
|
ntru-rs has unsound FFI: Wrong API usage causes write past allocated area
|
The following usage causes undefined behavior.
```rust
let kp: ntru::types::KeyPair = …;
kp.get_public().export(Default::default())
```
When compiled with debug assertions, the code above will trigger a `attempt to subtract with overflow` panic before UB occurs.
Other mistakes (e.g. using `EncParams` from a different key) may always trigger UB.
Likely, older versions of this crate are also affected, but have not been tested.
|
[]
|
[{'package': {'ecosystem': 'crates.io', 'name': 'ntru'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.3'}, {'last_affected': '0.5.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/FrinkGlobal/ntru-rs/issues/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/FrinkGlobal/ntru-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0032.html'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:23:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4j2p-x79m-jcj8
|
2023-04-18T14:53:28Z
|
2023-04-10T06:30:16Z
| null |
['CVE-2023-26120']
|
XXL-JOB vulnerable to Cross-site Scripting
|
XXL-JOB (`com.xuxueli:xxl-job`) versions 2.4.0 and earlier are vulnerable to cross-site scripting (XSS). An HTML uploaded payload can be executed successfully through `/xxl-job-admin/user/add` and `/xxl-job-admin/user/update`.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26120'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:45:23Z', 'nvd_published_at': '2023-04-10T05:15:00Z'}
|
1.4.0
|
GHSA-fwcf-753v-fgcj
|
2023-04-24T22:44:12Z
|
2023-04-24T22:44:12Z
| null |
['CVE-2023-30613']
|
Unrestricted file upload in kiwi TCMS
|
### Impact
Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. In earlier versions there is no control over what kinds of files can be uploaded. Thus a malicious actor may upload an `.exe` file or a file containing embedded JavaScript and trick others into clicking on these files causing vulnerable browsers to execute malicious code on another computer or attempting XSS attacks.
Stored XSS attacks via file uploads have been fixed in earlier versions of Kiwi TCMS, see [GHSA-2wcr-87wf-cf9j](https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2wcr-87wf-cf9j). This advisory deals with prohibiting users to upload potentially compromised files in the first place.
### Patches
Kiwi TCMS v12.2 comes with functionality that allows administrators to configure additional upload validator functions which give them more control over what file types are accepted for upload. By default `.exe` are denied. Other files containing the `<script>` tag, regardless of their type are also denied b/c they are a path to XSS attacks.
### Workarounds
Upgrade to version 12.2 or later.
### References
Originally reported by [Ahmed Rabeaa Mosaa](https://huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-fwcf-753v-fgcj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30613'}, {'type': 'PACKAGE', 'url': 'https://github.com/kiwitcms/Kiwi'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c'}, {'type': 'WEB', 'url': 'https://kiwitcms.org/blog/kiwi-tcms-team/2023/04/23/kiwi-tcms-122/'}]
|
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:44:12Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ffj9-4crc-q7wf
|
2023-04-14T20:26:33Z
|
2023-04-07T15:30:38Z
| null |
['CVE-2023-28710']
|
Apache Airflow Spark Provider vulnerable to improper input validation
|
Apache Software Foundation Apache Airflow Spark Provider before 4.0.1 is vulnerable to improper input validation because the host and schema of JDBC Hook can contain `/` and `?` which is used to denote the end of the field.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-spark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28710'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/30223'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lb9w9114ow00h2nkn8bjm106v5x1p1d2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/07/3'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T22:22:39Z', 'nvd_published_at': '2023-04-07T15:15:00Z'}
|
1.4.0
|
GHSA-wrxf-x8rm-6ggg
|
2023-08-11T18:59:49Z
|
2023-04-04T15:30:27Z
| null |
['CVE-2020-21514']
|
Fluent Fluentd and Fluent-ui use default password
|
An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 that allows attackers to gain escilated privileges and execute arbitrary code due to use of a default password.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'fluentd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fluentd-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21514'}, {'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/issues/2722'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-11T18:59:49Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
|
1.4.0
|
GHSA-4m3m-ppvx-xgw9
|
2023-04-24T15:56:25Z
|
2023-04-21T22:33:30Z
| null |
['CVE-2023-29019']
|
Session fixation in fastify-passport
|
Applications using `@fastify/passport` for user authentication, in combination with `@fastify/session` as the underlying session management mechanism, are vulnerable to [session fixation attacks](https://owasp.org/www-community/attacks/Session_fixation) from network and same-site attackers.
## Details
fastify applications rely on the `@fastify/passport` library for user authentication. The login and user validation are performed by the `authenticate` function. When executing this function, the `sessionId` is preserved between the pre-login and the authenticated session. Network and [same-site attackers](https://canitakeyoursubdomain.name/) can hijack the victim's session by tossing a valid `sessionId` cookie in the victim's browser and waiting for the victim to log in on the website.
## Fix
As a solution, newer versions of `@fastify/passport` regenerate `sessionId` upon login, preventing the attacker-controlled pre-session cookie from being upgraded to an authenticated session.
## Credits
* Pedro Adão (@pedromigueladao), [Instituto Superior Técnico, University of Lisbon](https://tecnico.ulisboa.pt/)
* Marco Squarcina (@lavish), [Security & Privacy Research Unit, TU Wien](https://secpriv.wien/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@fastify/passport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/passport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-passport/security/advisories/GHSA-4m3m-ppvx-xgw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29019'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-passport/commit/43c82c321db58ea3e375dd475de60befbfcf2a11'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-passport'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/Session_fixation'}]
|
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T22:33:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j9h4-p6p7-8652
|
2023-04-07T22:57:52Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28672']
|
Jenkins OctoPerf Load Testing Plugin vulnerable to credential capture
|
OctoPerf Load Testing Plugin Plugin 4.5.1 and earlier does not perform a permission check in a connection test HTTP endpoint.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
OctoPerf Load Testing Plugin Plugin 4.5.2 properly performs a permission check when accessing the affected connection test HTTP endpoint.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkinsci.plugins:octoperf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28672'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(2)'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:54:33Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-gv7g-x59x-wf8f
|
2023-04-14T20:30:47Z
|
2023-04-07T19:23:31Z
| null |
['CVE-2023-29008']
|
SvelteKit framework has Insufficient CSRF protection for CORS requests
|
### Summary
The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a `+server.js` file, containing endpoint handlers for different HTTP methods.
SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to its users. The protection is implemented at `kit/src/runtime/server/respond.js`. While the implementation does a sufficient job of mitigating common CSRF attacks, the protection can be bypassed by simply specifying an upper-cased `Content-Type` header value. The browser will not send uppercase characters on form submission, but this check does not block all expected cross-site requests: https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests
### Details
The CSRF protection is implemented using the code shown below.
``` javascript
const forbidden =
is_form_content_type(request) &&
(request.method === 'POST' ||
request.method === 'PUT' ||
request.method === 'PATCH' ||
request.method === 'DELETE') &&
request.headers.get('origin') !== url.origin;
if (forbidden) {
const csrf_error = error(403, `Cross-site ${request.method} form submissions are forbidden`);
if (request.headers.get('accept') === 'application/json') {
return json(csrf_error.body, { status: csrf_error.status });
}
return text(csrf_error.body.message, { status: csrf_error.status });
}
```
If the incoming request specifies a POST/PUT/PATCH/DELETE method, the protection will compare the server’s origin with the value of the HTTP Origin header. A mismatch between these values signals that a potential attack has been detected. The final check is performed on the request’s `Content-Type` header whether the value is either `application/x-www-form-urlencoded`, `multipart/form-data` or `text/plain`. If all the previous checks pass, the request will be rejected with an 403 error response.
However, `is_form_content_type`, which is responsible for checking the value of the `Content-Type` header, is not sufficient to mitigate all possible variations of this type of attack. Since this function is checking `Content-Type` with lower-cased values, and the browser accepts upper-cased `Content-Type` header to be sent, a CSRF attack performed with the `Content-Type` header that contains an upper-cased character (e.g., `text/plaiN`) can circumvent the protection and the request will be processed by the endpoint handler.
<!--
### PoC
1. Set up the SvelteKit with `POST /api/test` endpoint.
2. Replace `REPLACE_DOMAIN` in the following HTML.
``` html
<script>
(async() => {
await fetch("https://REPLACE_DOMAIN/api/test", {method: "POST", headers:{"Content-Type":"text/plaiN"}, body: "hello=world"});
})();
</script>
```
3. Confirm that a POST request is processed by the server.
-->
### Impact
If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts. This may lead to all POST operations requiring authentication being allowed in the following cases:
1. If the target site sets `SameSite=None` on its auth cookie and the user visits a malicious site in a Chromium-based browser
2. If the target site doesn't set the `SameSite` attribute explicitly and the user visits a malicious site with Firefox/Safari with tracking protections turned off.
3. If the user is visiting a malicious site with a very outdated browser.
### Remediations
It is preferred to update to SvelteKit 1.15.2. It is also recommended to explicitly set `SameSite` to a value other than `None` on authentication cookies especially if the upgrade cannot be done in a timely manner.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@sveltejs/kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/sveltejs/kit/security/advisories/GHSA-gv7g-x59x-wf8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29008'}, {'type': 'WEB', 'url': 'https://github.com/sveltejs/kit/commit/ba436c6685e751d968a960fbda65f24cf7a82e9f'}, {'type': 'PACKAGE', 'url': 'https://github.com/sveltejs/kit'}]
|
{'cwe_ids': ['CWE-352', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:23:31Z', 'nvd_published_at': '2023-04-06T17:15:00Z'}
|
1.4.0
|
GHSA-vcpr-hm2m-gjjj
|
2023-05-05T20:34:28Z
|
2023-04-28T15:30:18Z
| null |
['CVE-2023-28475']
|
Reflected cross site scripting
|
Concrete CMS (previously concrete5) before 9.2 is vulnerable to Reflected XSS on the Reply form because msgID was not sanitized.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28475'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:45:14Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pwfv-3cvg-9m4c
|
2023-04-26T20:32:48Z
|
2023-04-12T20:36:28Z
| null |
['CVE-2023-29507']
|
org.xwiki.platform:xwiki-platform-oldcore makes Incorrect Use of Privileged APIs with DocumentAuthors
|
### Impact
The Document script API returns directly a DocumentAuthors allowing to set any authors to the document, which in consequence can allow subsequent executions of scripts since this author is used for checking rights.
Example of such attack:
```
{{velocity}}
$doc.setContent('{{velocity}}$xcontext.context.authorReference{{/velocity}}')
$doc.authors.setContentAuthor('xwiki:XWiki.superadmin')
$doc.getRenderedContent()
{{/velocity}}
```
### Patches
The problem has been patched in XWiki 14.10 and 14.4.7 by returning a safe script API.
### Workarounds
There no easy workaround apart of upgrading.
### References
* https://jira.xwiki.org/browse/XWIKI-20380
* https://github.com/xwiki/xwiki-platform/commit/905cdd7c421dbf8c565557cdc773ab1aa9028f83
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.4.1'}, {'fixed': '14.4.7'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pwfv-3cvg-9m4c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29507'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/905cdd7c421dbf8c565557cdc773ab1aa9028f83'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20380'}]
|
{'cwe_ids': ['CWE-648'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:36:28Z', 'nvd_published_at': '2023-04-16T07:15:00Z'}
|
1.4.0
|
GHSA-8849-cv9f-vccm
|
2023-04-27T14:01:16Z
|
2023-04-26T21:30:37Z
| null |
['CVE-2023-31250']
|
Access bypass in Drupal core
|
The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating.
|
[]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.4.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.96'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31250'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2023-005'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T14:01:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-436g-2f92-cvhh
|
2023-04-03T22:55:17Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28668']
|
Jenkins Role-based Authorization Strategy Plugin grants permissions even after they’ve been disabled
|
Permissions in Jenkins can be enabled and disabled. Some permissions are disabled by default, e.g., Overall/Manage or Item/Extended Read. Disabled permissions cannot be granted directly, only through greater permissions that imply them (e.g., Overall/Administer or Item/Configure).
Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they’ve been disabled.
This allows attackers to have greater access than they’re entitled to after the following operations took place:
A permission is granted to attackers directly or through groups.
The permission is disabled, e.g., through the script console.
Role-based Authorization Strategy Plugin 587.588.v850a_20a_30162 does not grant disabled permissions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:role-strategy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '587.588.v850a_20a_30162'}]}], 'database_specific': {'last_known_affected_version_range': '< 587.588.v850a'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28668'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3053'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:55:17Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-833c-xh79-p429
|
2023-04-24T15:57:13Z
|
2023-04-21T19:42:10Z
| null |
['CVE-2023-30622']
|
A potential risk in clusternet which can be leveraged to make a cluster-level privilege escalation
|
## Summary:
A potential risk in clusternet which can be leveraged to make a cluster-level privilege escalation.
## Detailed analysis:
The clusternet has a deployment called cluster-hub inside the clusternet-system Kubernetes namespace, which runs on worker nodes
randomly. The deployment has a service account called clusternet-hub, which has a cluster role called clusternet:hub via cluster role binding. The clusternet:hub cluster role has "*" verbs of "*.*" resources. Thus, if a malicious user can access the worker node which runs the clusternet, he/she can leverage the service account to do malicious actions to critical system resources. For example, he/she can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/clusternet/clusternet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/clusternet/clusternet/security/advisories/GHSA-833c-xh79-p429'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30622'}, {'type': 'PACKAGE', 'url': 'https://github.com/clusternet/clusternet'}, {'type': 'WEB', 'url': 'https://github.com/clusternet/clusternet/releases/tag/v0.15.2'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T19:42:10Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ch5w-2994-6h82
|
2023-04-28T20:06:20Z
|
2023-04-22T18:30:28Z
| null |
['CVE-2023-1875']
|
Cross-site Scripting in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1875'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/dcf7dd43a3412aa951d7087b86a8b917fae2133a'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T16:41:16Z', 'nvd_published_at': None}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.