ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-qr2j-wrhx-4829 | Improper Input Validation | In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block. | {'CVE-2018-16733'} | 2021-05-18T18:38:06Z | 2021-05-18T18:38:06Z | MODERATE | 7.5 | {'CWE-20'} | {'https://github.com/advisories/GHSA-qr2j-wrhx-4829', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16733', 'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'} | null | {'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'} | {'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'} |
GHSA | GHSA-qpg4-4w7w-2mq5 | Authentication and extension bypass in Faye | On 20 April 2020 it was reported to me that the potential for authentication
bypass exists in [Faye][1]'s extension system. This vulnerability has existed in
the Node.js and Ruby versions of the server since version 0.5.0, when extensions
were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and
1.2.5, which we are releasing today.
The vulnerability allows any client to bypass checks put in place by server-side
extensions, by appending extra segments to the message channel. For example, the
Faye [extension docs][2] suggest that users implement access control for
subscriptions by checking incoming messages for the `/meta/subscribe` channel,
for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel === '/meta/subscribe') {
if (message.ext.authToken !== 'my super secret password') {
message.error = 'Invalid auth token';
}
}
callback(message);
}
});
```
A bug in the server's code for recognising the special `/meta/*` channels, which
trigger connection and subscription events, means that a client can bypass this
check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`:
```json
{
"channel": "/meta/subscribe/x",
"clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3",
"subscription": "/foo"
}
```
This message will not be checked by the above extension, as it checks the
message's channel is exactly equal to `/meta/subscribe`. But it will still be
processed as a subscription request by the server, so the client becomes
subscribed to the channel `/foo` without supplying the necessary credentials.
The vulnerability is caused by the way the Faye server recognises meta channels.
It will treat a message to any channel that's a prefix-match for one of the
special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`,
`/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for
that channel. So, a message to `/meta/subscribe/x` is still processed as a
subscription request, for example.
An authentication bypass for subscription requests is the most serious effect of
this but all other meta channels are susceptible to similar manipulation.
This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5.
These should be drop-in replacements for prior versions and you should upgrade
immediately if you are running any prior version.
If you are unable to install one of these versions, you can make your extensions
catch all messages the server would process by checking the channel _begins_
with the expected channel name, for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel.startsWith('/meta/subscribe')) {
// authentication logic
}
callback(message);
}
});
```
[1]: https://faye.jcoglan.com/
[2]: https://faye.jcoglan.com/node/extensions.html | {'CVE-2020-11020'} | 2021-01-08T20:21:05Z | 2020-04-29T17:41:15Z | HIGH | 8.5 | {'CWE-287'} | {'https://github.com/advisories/GHSA-qpg4-4w7w-2mq5', 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11020', 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5'} | null | {'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'} | {'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'} |
GHSA | GHSA-h6q6-9hqw-rwfv | Misinterpretation of malicious XML input | ### Impact
xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted documents.
This may lead to unexpected syntactic changes during XML processing in some downstream applications.
### Patches
Update to 0.5.0 (once it is released)
### Workarounds
Downstream applications can validate the input and reject the maliciously crafted documents.
### References
Similar to this one reported on the Go standard library:
- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom)
* Email us: send an email to **all** addresses that are shown by `npm owner ls xmldom` | {'CVE-2021-21366'} | 2022-04-19T19:02:49Z | 2021-03-12T22:39:39Z | LOW | 0 | {'CWE-115', 'CWE-436'} | {'https://www.npmjs.com/package/xmldom', 'https://github.com/xmldom/xmldom/releases/tag/0.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366', 'https://github.com/advisories/GHSA-h6q6-9hqw-rwfv', 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv'} | null | {'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'} | {'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'} |
GHSA | GHSA-wmj9-xh24-j4gx | Cross-site Scripting in microweber | microweber prior to version 1.2.11 is vulnerable to cross-site scripting. | {'CVE-2022-0558'} | 2022-02-23T21:58:40Z | 2022-02-11T00:00:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d', 'https://github.com/advisories/GHSA-wmj9-xh24-j4gx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0558', 'https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c'} | null | {'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'} | {'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'} |
GHSA | GHSA-mg5p-95m9-rmfp | Arbitrary file write in actionpack-page_caching gem | There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view. | {'CVE-2020-8159'} | 2022-04-07T15:10:56Z | 2020-05-13T16:28:46Z | CRITICAL | 9.8 | {'CWE-22'} | {'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html', 'https://github.com/advisories/GHSA-mg5p-95m9-rmfp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159', 'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8', 'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'} | null | {'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'} | {'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'} |
GHSA | GHSA-8c6g-4xc5-w96c | Uninitialized memory exposure in claxon | An issue was discovered in the claxon crate before 0.4.1 for Rust. Uninitialized memory can be exposed because certain decode buffer sizes are mishandled. | {'CVE-2018-20992'} | 2021-08-25T20:43:52Z | 2021-08-25T20:43:52Z | MODERATE | 6.5 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-20992', 'https://github.com/advisories/GHSA-8c6g-4xc5-w96c', 'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c', 'https://rustsec.org/advisories/RUSTSEC-2018-0004.html'} | null | {'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c'} | {'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c'} |
GHSA | GHSA-pq37-4c4g-v38c | Cross-site Scripting in vditor | vditor prior to version 3.8.11 is vulnerable to cross-site scripting. | {'CVE-2022-0341'} | 2022-03-23T15:36:26Z | 2022-03-15T00:01:02Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5', 'https://github.com/advisories/GHSA-pq37-4c4g-v38c', 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341', 'https://github.com/Vanessa219/vditor/issues/1102'} | null | {'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'} | {'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'} |
GHSA | GHSA-qf8x-vqjv-92gr | Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter | Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL points to before downloading it. | {'CVE-2022-24901'} | 2022-05-07T01:48:25Z | 2022-05-04T18:59:46Z | HIGH | 7.5 | {'CWE-287', 'CWE-295'} | {'https://github.com/advisories/GHSA-qf8x-vqjv-92gr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr', 'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'} | null | {'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'} | {'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'} |
GHSA | GHSA-j57w-3c39-gpp5 | Improper Privilege Management in Snipe-IT | An unprivileged user of Snipe-IT prior to version 5.3.11 can create maintenance for an asset. Version 5.3.11 contains a patch for this issue. | {'CVE-2022-0611'} | 2022-02-26T00:58:12Z | 2022-02-17T00:00:35Z | HIGH | 8.8 | {'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0611', 'https://github.com/advisories/GHSA-j57w-3c39-gpp5', 'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439', 'https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b'} | null | {'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439'} | {'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439'} |
GHSA | GHSA-jhq9-wm9m-cf89 | CHECK-failure in `UnsortedSegmentJoin` | ### Impact
An attacker can cause a denial of service by controlling the values of `num_segments` tensor argument for `UnsortedSegmentJoin`:
```python
import tensorflow as tf
inputs = tf.constant([], dtype=tf.string)
segment_ids = tf.constant([], dtype=tf.int32)
num_segments = tf.constant([], dtype=tf.int32)
separator = ''
tf.raw_ops.UnsortedSegmentJoin(
inputs=inputs, segment_ids=segment_ids,
num_segments=num_segments, separator=separator)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a2a607db15c7cd01d754d37e5448d72a13491bdb/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L93) assumes that the `num_segments` tensor is a valid scalar:
```cc
const Tensor& num_segments_tensor = context->input(2);
auto num_segments = num_segments_tensor.scalar<NUM_SEGMENTS_TYPE>()();
```
Since the tensor is empty the `CHECK` involved in `.scalar<T>()()` that checks that the number of elements is exactly 1 will be invalidated and this would result in process termination.
### Patches
We have patched the issue in GitHub commit [704866eabe03a9aeda044ec91a8d0c83fc1ebdbe](https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29552'} | 2021-05-21T14:23:48Z | 2021-05-21T14:23:48Z | LOW | 2.5 | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe', 'https://github.com/advisories/GHSA-jhq9-wm9m-cf89', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29552', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jhq9-wm9m-cf89'} | null | {'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe'} | {'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe'} |
GHSA | GHSA-98gj-wwxm-cj3h | Moderate severity vulnerability that affects mistune | Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument. | {'CVE-2017-16876'} | 2021-09-07T21:10:10Z | 2019-01-04T17:47:50Z | MODERATE | 6.1 | {'CWE-79'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1524596', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NUR3GMHQBMA3UC4PFMCK6GCLOQC4LQQC/', 'https://github.com/advisories/GHSA-98gj-wwxm-cj3h', 'https://github.com/lepture/mistune/blob/master/CHANGES.rst', 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'} | null | {'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'} | {'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'} |
GHSA | GHSA-2v5j-q74q-r53f | django-helpdesk is vulnerable to Cross-site Scripting | django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3994'} | 2021-12-03T20:42:26Z | 2021-12-03T20:42:26Z | HIGH | 8.8 | {'CWE-79'} | {'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06', 'https://github.com/advisories/GHSA-2v5j-q74q-r53f', 'https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3994', 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'} | null | {'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'} | {'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'} |
GHSA | GHSA-mj2c-5mjv-gmmj | SQL Injection in Pimcore | Pimcore prior to version 10.3.5 is vulnerable to SQL injection in ElementController.php. This vulnerability causes loss of data confidentiality. | {'CVE-2022-1339'} | 2022-04-22T21:06:23Z | 2022-04-14T00:00:19Z | HIGH | 7.5 | {'CWE-89'} | {'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c', 'https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9', 'https://github.com/advisories/GHSA-mj2c-5mjv-gmmj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1339'} | null | {'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c'} | {'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c'} |
GHSA | GHSA-663j-rjcr-789f | CSV injection in shuup | “Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed. | {'CVE-2021-25962'} | 2021-10-21T14:31:43Z | 2021-09-30T20:50:07Z | HIGH | 8 | {'CWE-1236'} | {'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51', 'https://github.com/advisories/GHSA-663j-rjcr-789f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25962', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962'} | null | {'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'} | {'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'} |
GHSA | GHSA-6pqm-xvfc-w7p4 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3993'} | 2021-12-03T20:42:35Z | 2021-12-03T20:42:35Z | MODERATE | 6.5 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3993', 'https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9', 'https://github.com/advisories/GHSA-6pqm-xvfc-w7p4', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | null | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} |
GHSA | GHSA-7f42-p84j-f58p | Moderate severity vulnerability that affects sanitize | When Sanitize <= 4.6.2 is used in combination with libxml2 >= 2.9.2, a specially crafted HTML fragment can cause libxml2 to generate improperly escaped output, allowing non-whitelisted attributes to be used on whitelisted elements.
This can allow HTML and JavaScript injection, which could result in XSS if Sanitize's output is served to browsers. | {'CVE-2018-3740'} | 2021-01-08T19:16:14Z | 2018-03-21T11:56:32Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-7f42-p84j-f58p', 'https://www.debian.org/security/2018/dsa-4358', 'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e', 'https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/', 'https://github.com/rgrove/sanitize/issues/176', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3740'} | null | {'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e'} | {'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e'} |
GHSA | GHSA-p6h4-93qp-jhcm | Command injection in Parse Server through prototype pollution | ### Impact
This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows.
### Patches
Upgrade to Parse Server >=4.10.7. If you are using a prerelease version of Parse Server 5.0 (alpha, beta) we will publish a timely fix for these. However, as a general reminder we do not consider prerelease versions to be suitable for production deployment.
Note that as part of the fix a new security feature scans for sensitive keywords in request data to prevent JavaScript prototype pollution. If such a keyword is found, the request is rejected with HTTP response code `400` and Parse Error `105` (`INVALID_KEY_NAME`). By default these keywords are: `{_bsontype: "Code"}`, `constructor`, `__proto__`. If you are using any of these keywords in your request data, you can override the default keywords by setting the new Parse Server option `requestKeywordDenylist` to `[]` and specify your own keywords as needed.
### Workarounds
Although the fix is more broad and includes several aspects of the vulnerability, a quick and targeted fix can be achieved by patching the MongoDB Node.js driver and disable BSON code execution. To apply the patch, add the following code to be executed before starting Parse Server, for example in `index.js`.
```
const BSON = require('bson');
const internalDeserialize = BSON.prototype.deserialize;
BSON.prototype.deserialize = (buffer, options = Object.create(null), ...others) => {
if (options.constructor) {
options = Object.assign(Object.create(null), options);
}
return internalDeserialize(buffer, options, ...others);
};
const internalDeserializeStream = BSON.prototype.deserializeStream;
BSON.prototype.deserializeStream = (
data,
startIndex,
numberOfDocuments,
documents,
docStartIndex,
options = Object.create(null),
...others
) => {
if (options.constructor) {
options = Object.assign(Object.create(null), options);
}
return internalDeserializeStream(
data,
startIndex,
numberOfDocuments,
documents,
docStartIndex,
options,
...others
);
};
```
### References
- Original report on [huntr.dev](https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/)
| {'CVE-2022-24760'} | 2022-04-19T18:24:25Z | 2022-03-11T23:53:23Z | CRITICAL | 10 | {'CWE-74', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24760', 'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d', 'https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm', 'https://github.com/advisories/GHSA-p6h4-93qp-jhcm'} | null | {'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'} | {'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'} |
GHSA | GHSA-hpfq-8wx8-cgqw | Cross-Site Scripting in ids-enterprise | Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later | null | 2021-08-04T21:16:12Z | 2019-06-13T18:59:18Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-hpfq-8wx8-cgqw', 'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4', 'https://github.com/infor-design/enterprise-ng/issues/511', 'https://www.npmjs.com/advisories/957'} | null | {'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'} | {'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'} |
GHSA | GHSA-vfrc-7r7c-w9mx | Prototype Pollution in highlight.js | ### Impact
Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code blocks (or similar) and do not filter the language names the user can provide you may be vulnerable.
The pollution should just be harmless data but this can cause problems for applications not expecting these properties to exist and can result in strange behavior or application crashes, i.e. a potential DOS vector.
_If your website or application does not render user provided data it should be unaffected._
### Patches
Versions 9.18.2 and 10.1.2 and newer include fixes for this vulnerability. If you are using version 7 or 8 you are encouraged to upgrade to a newer release.
### Workarounds
#### Patch your library
Manually patch your library to create null objects for both `languages` and `aliases`:
```js
const HLJS = function(hljs) {
// ...
var languages = Object.create(null);
var aliases = Object.create(null);
```
#### Filter out bad data from end users
Filter the language names that users are allowed to inject into your HTML to guarantee they are valid.
### References
* [What is Prototype Pollution?](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
* https://github.com/highlightjs/highlight.js/pull/2636
### For more information
If you have any questions or comments about this advisory:
* Please file an issue against [highlight.js](https://github.com/highlightjs/highlight.js/issues/) | {'CVE-2020-26237'} | 2022-04-19T19:02:31Z | 2020-11-24T22:58:41Z | LOW | 5.8 | {'CWE-471'} | {'https://www.npmjs.com/package/highlight.js', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html', 'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0', 'https://github.com/advisories/GHSA-vfrc-7r7c-w9mx', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26237', 'https://github.com/highlightjs/highlight.js/pull/2636'} | null | {'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0'} | {'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0'} |
GHSA | GHSA-cf8j-64h9-6q58 | CSRF in Play Framework | In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed. | {'CVE-2020-12480'} | 2021-09-23T18:57:06Z | 2020-08-18T17:30:25Z | MODERATE | 6.5 | {'CWE-352'} | {'https://github.com/playframework/playframework/pull/10285', 'https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass', 'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154', 'https://www.playframework.com/security/vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12480', 'https://github.com/advisories/GHSA-cf8j-64h9-6q58'} | null | {'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'} | {'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'} |
GHSA | GHSA-hfwx-c7q6-g54c | Vulnerability allowing for reading internal HTTP resources | ### Impact
The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.
The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses.
The previous versions have been marked as deprecated on NPM.
### Patches
Version 2.1.0 released alongside this security advisory addresses the issue. **Please note that this release is not backwards compatible out of the box. See the [changelog](https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md) for details.**
Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later.
### Workarounds
There are no known workarounds to the issue - an upgrade to version 2.1.0 is required.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the export server issue tracker](https://github.com/highcharts/node-export-server/issues)
* Email us at [security@highsoft.com](mailto:security@highsoft.com) | null | 2021-03-12T23:04:46Z | 2021-03-12T23:04:46Z | HIGH | 0 | {'CWE-552'} | {'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6', 'https://www.npmjs.com/package/highcharts-export-server', 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210'} | null | {'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'} | {'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'} |
GHSA | GHSA-44gv-fgcj-w546 | Missing Authorization in DayByDay CRM | In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all. | {'CVE-2022-22107'} | 2022-01-08T00:31:55Z | 2022-01-08T00:31:55Z | MODERATE | 4.3 | {'CWE-862'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://github.com/advisories/GHSA-44gv-fgcj-w546', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22107'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'} | {'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'} |
GHSA | GHSA-6jvm-3j5h-79f6 | Moderate severity vulnerability that affects paperclip | The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg. | {'CVE-2015-2963'} | 2021-09-02T16:53:00Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-79'} | {'http://jvn.jp/en/jp/JVN83881261/index.html', 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57', 'https://robots.thoughtbot.com/paperclip-security-release', 'http://www.securityfocus.com/bid/75304', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963', 'http://openwall.com/lists/oss-security/2015/06/19/3', 'https://github.com/advisories/GHSA-6jvm-3j5h-79f6', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088'} | null | {'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'} | {'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'} |
GHSA | GHSA-f8cm-364f-q9qh | Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls | ### Impact
The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints.
### Patches
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version.
### Workarounds
In your project directory create a decorator file `app/controllers/spree/api/v2/base_controller_decotatror.rb` with contents:
```ruby
module Spree
module Api
module V2
module BaseControllerDecorator
private
def spree_current_user
return nil unless doorkeeper_token
return @spree_current_user if @spree_current_user
doorkeeper_authorize!
@spree_current_user ||= ::Spree.user_class.find_by(id: doorkeeper_token.resource_owner_id)
end
end
end
end
Spree::Api::V2::BaseController.prepend(Spree::Api::V2::BaseControllerDecorator)
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org) | {'CVE-2020-15269'} | 2022-04-19T19:02:38Z | 2020-10-20T20:03:52Z | HIGH | 7.4 | {'CWE-287', 'CWE-613'} | {'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269', 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh', 'https://github.com/advisories/GHSA-f8cm-364f-q9qh'} | null | {'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'} | {'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'} |
GHSA | GHSA-q9qc-pp5x-mc8c | Improper Neutralization of Special Elements Used in a Template Engine in microweber | Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3. | {'CVE-2022-0896'} | 2022-03-14T21:01:06Z | 2022-03-10T00:00:40Z | HIGH | 8.8 | {'CWE-94', 'CWE-1336'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0896', 'https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0', 'https://github.com/advisories/GHSA-q9qc-pp5x-mc8c', 'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'} | null | {'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'} | {'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'} |
GHSA | GHSA-896r-f27r-55mw | json-schema is vulnerable to Prototype Pollution | json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3918'} | 2021-11-19T20:16:17Z | 2021-11-19T20:16:17Z | MODERATE | 9.8 | {'CWE-1321', 'CWE-915'} | {'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3918', 'https://github.com/advisories/GHSA-896r-f27r-55mw'} | null | {'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'} | {'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'} |
GHSA | GHSA-w8f3-pvx4-4c3h | Prototype Pollution in arr-flatten-unflatten | All versions of package arr-flatten-unflatten up to and including version 1.1.4 are vulnerable to Prototype Pollution via the constructor. | {'CVE-2020-7713'} | 2021-07-29T21:16:54Z | 2021-05-06T18:11:39Z | CRITICAL | 0 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-w8f3-pvx4-4c3h', 'https://github.com/Quernest/arr-flatten-unflatten/pull/8', 'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7713', 'https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396'} | null | {'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'} | {'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'} |
GHSA | GHSA-prff-6j8q-vrv7 | Cross-site Scripting in microweber | There is a persistent XSS Vulnerability exsists in the checkout page where we can able to execute any javascription in the last name field | {'CVE-2022-0379'} | 2022-02-03T21:01:48Z | 2022-01-28T22:15:33Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b', 'https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0379', 'https://github.com/advisories/GHSA-prff-6j8q-vrv7'} | null | {'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b'} | {'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b'} |
GHSA | GHSA-j383-35pm-c5h4 | Path Traversal in Grunt | Grunt prior to version 1.5.2 is vulnerable to path traversal. | {'CVE-2022-0436'} | 2022-04-26T21:51:43Z | 2022-04-13T00:00:16Z | MODERATE | 5.5 | {'CWE-22'} | {'https://github.com/gruntjs/grunt/pull/1743', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/advisories/GHSA-j383-35pm-c5h4', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b'} | null | {'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c'} | {'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665'} |
GHSA | GHSA-743r-5g92-5vgf | Improper certificate management in AWS IoT Device SDK v2 | Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS. | {'CVE-2021-40829'} | 2021-12-03T15:21:00Z | 2021-11-24T21:11:16Z | MODERATE | 6.3 | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/advisories/GHSA-743r-5g92-5vgf', 'https://github.com/awslabs/aws-c-io/'} | null | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'} |
GHSA | GHSA-h746-rm5q-8mgq | Legacy Node API Allows Impersonation in github.com/spiffe/spire/pkg/server/endpoints/node | #### Summary
In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1.
#### What are the changes introduced by the patched versions?
The changes introduced to address this issue are related to enforcing that the FetchX509SVID RPC of SPIRE Server’s Legacy Node API only issues X.509 certificates with SPIFFE IDs that the agent is authorized to distribute.
The patched version also includes a back-ported change that improves the handling of file descriptors related to workload attestation in SPIRE Agent.
There are no changes in the expected behavior of SPIRE.
#### Should I upgrade SPIRE?
All SPIRE users running affected versions are advised to upgrade to the corresponding patched version.
#### Workarounds
No workarounds have been identified for this vulnerability. | {'CVE-2021-27098'} | 2022-04-19T19:02:49Z | 2021-05-21T14:31:11Z | HIGH | 8.1 | {'CWE-284', 'CWE-295'} | {'https://github.com/advisories/GHSA-h746-rm5q-8mgq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27098', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27098', 'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13', 'https://github.com/spiffe/spire/security/advisories/GHSA-h746-rm5q-8mgq'} | null | {'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13'} | {'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13'} |
GHSA | GHSA-pc58-wgmc-hfjr | Prototype Pollution in mout | This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution. | {'CVE-2020-7792'} | 2022-02-09T22:49:20Z | 2022-02-09T22:49:10Z | HIGH | 7.5 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-pc58-wgmc-hfjr', 'https://snyk.io/vuln/SNYK-JS-MOUT-1014544', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792', 'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'} | null | {'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'} | {'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'} |
GHSA | GHSA-pv39-qp28-4mgh | Improper Restriction of XML External Entity Reference in soa-model | Soa-model is a toolkit and Java API for WSDL, WADL and XML Schema. An XML External Entity (XXE) vulnerability exists in versions of soa-model prior to 1.6.4 in the WSDLParser function. This issue has been fixed in version 1.6.4. | {'CVE-2021-43090'} | 2022-04-12T16:40:10Z | 2022-03-26T00:00:32Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/releases/tag/v1.6.4', 'https://github.com/advisories/GHSA-pv39-qp28-4mgh', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251', 'https://github.com/membrane/soa-model/issues/281', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43090'} | null | {'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'} | {'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'} |
GHSA | GHSA-rqff-837h-mm52 | Authorization bypass in url-parse | Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6. | {'CVE-2022-0512'} | 2022-02-24T14:01:29Z | 2022-02-15T00:02:46Z | MODERATE | 5.3 | {'CWE-639'} | {'https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0512', 'https://github.com/advisories/GHSA-rqff-837h-mm52', 'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'} | null | {'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'} | {'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'} |
GHSA | GHSA-h6pr-c536-6rjg | Prototype Pollution in object-path-set | The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908 | {'CVE-2021-23507'} | 2022-02-11T16:16:48Z | 2022-02-05T00:00:31Z | HIGH | 7.5 | {'CWE-1321'} | {'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761', 'https://github.com/advisories/GHSA-h6pr-c536-6rjg', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23507', 'https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8'} | null | {'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'} | {'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'} |
GHSA | GHSA-x462-89pf-6r5h | Crash due to malformed relay protocol message | ### Impact
1. `syncthing` can be caused to crash and exit if sent a malformed relay
protocol message message with a negative length field.
2. The relay server `strelaysrv` can be caused to crash and exit if sent
a malformed relay protocol message with a negative length field.
At no point is sensitive data exposed or liable to be altered due to this
issue. Sensitive data is never exposed to relay operators. Syncthing itself
would need to be lured to connect to a malicious relay server in order to
exploit the issue.
### Patches
Fixed in version 1.15.0.
### Workarounds
1. No known workaround for `strelaysrv`.
2. `syncthing` can be configured to not use relays, or to only use specific,
trusted relays. If Syncthing is used in a closed environment or with
relaying disabled, i.e., it does not communicate with unknown relays,
Syncthing is not vulnerable.
### For more information
If you have any questions or comments about this advisory, please discuss it [on the forum](https://forum.syncthing.net/).
Thanks to Wojciech Paciorek for discovering and reporting this issue. | {'CVE-2021-21404'} | 2021-05-21T16:23:17Z | 2021-05-21T16:23:17Z | LOW | 7.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21404', 'https://github.com/advisories/GHSA-x462-89pf-6r5h', 'https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h', 'https://pkg.go.dev/github.com/syncthing/syncthing', 'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97', 'https://github.com/syncthing/syncthing/releases/tag/v1.15.0'} | null | {'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97'} | {'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97'} |
GHSA | GHSA-52q8-877j-gghq | remote code execution via cache action in MoinMoin | ### Impact
The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to
the wiki can use this to achieve remote code execution.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
### Workarounds
It is not advised to work around this, but to upgrade MoinMoin to a patched version.
That said, a work around via disabling the `cache` or the `AttachFile` action might be possible.
Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
### Credits
This vulnerability was discovered by Michael Chapman.
### For more information
If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de). | {'CVE-2020-25074'} | 2022-03-22T20:54:56Z | 2020-11-11T15:54:51Z | CRITICAL | 0 | {'CWE-22'} | {'https://www.debian.org/security/2020/dsa-4787', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00020.html', 'https://github.com/advisories/GHSA-52q8-877j-gghq', 'http://moinmo.in/SecurityFixes', 'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7', 'https://pypi.org/project/moin/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25074', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-52q8-877j-gghq'} | null | {'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7'} | {'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7'} |
GHSA | GHSA-r23f-c2j5-rx2f | Local File read vulnerability in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1108" alt="Screen Shot 2020-03-31 at 2 37 53 PM" src="https://user-images.githubusercontent.com/7253840/78072989-44b3ac80-735d-11ea-8676-09c69f0409c4.png"> | {'CVE-2020-5295'} | 2022-04-19T19:02:26Z | 2020-06-03T21:58:16Z | MODERATE | 4.8 | {'CWE-98'} | {'https://github.com/advisories/GHSA-r23f-c2j5-rx2f', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/octobercms/october/security/advisories/GHSA-r23f-c2j5-rx2f', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5295'} | null | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} |
GHSA | GHSA-6cw8-7j6c-hccp | Moderate severity vulnerability that affects io.vertx:vertx-core | In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response. | {'CVE-2018-12537'} | 2021-01-08T21:06:43Z | 2018-10-19T17:43:36Z | MODERATE | 0 | {'CWE-93'} | {'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72', 'https://github.com/eclipse/vert.x/issues/2470', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536038', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12537', 'https://github.com/advisories/GHSA-6cw8-7j6c-hccp', 'https://bugzilla.redhat.com/show_bug.cgi?id=1591072', 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-021_vertx.txt', 'https://access.redhat.com/errata/RHSA-2018:2371'} | null | {'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'} | {'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'} |
GHSA | GHSA-cjc7-49v2-jp64 | Incomplete validation in `SparseAdd` | ### Impact
Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data:
```python
import tensorflow as tf
a_indices = tf.zeros([10, 97], dtype=tf.int64)
a_values = tf.zeros([10], dtype=tf.int64)
a_shape = tf.zeros([0], dtype=tf.int64)
b_indices = tf.zeros([0, 0], dtype=tf.int64)
b_values = tf.zeros([0], dtype=tf.int64)
b_shape = tf.zeros([0], dtype=tf.int64)
thresh = 0
tf.raw_ops.SparseAdd(a_indices=a_indices,
a_values=a_values,
a_shape=a_shape,
b_indices=b_indices,
b_values=b_values,
b_shape=b_shape,
thresh=thresh)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation.
### Patches
We have patched the issue in GitHub commit [6fd02f44810754ae7481838b6a67c5df7f909ca3](https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3) followed by GitHub commit [41727ff06111117bdf86b37db198217fd7a143cc](https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29609'} | 2021-05-21T17:08:02Z | 2021-05-21T14:28:29Z | MODERATE | 5.3 | {'CWE-665', 'CWE-787'} | {'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29609', 'https://github.com/advisories/GHSA-cjc7-49v2-jp64', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64'} | null | {'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'} | {'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'} |
GHSA | GHSA-phrq-v4q2-hmq6 | Code injection vulnerability in allSelectors() | Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker. | {'CVE-2020-13756'} | 2022-03-26T00:32:36Z | 2022-03-26T00:15:22Z | CRITICAL | 9.8 | {'CWE-20'} | {'http://seclists.org/fulldisclosure/2020/Jun/7', 'http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html', 'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13756', 'https://github.com/advisories/GHSA-phrq-v4q2-hmq6', 'https://packetstormsecurity.com/files/cve/CVE-2020-13756', 'https://github.com/sabberworm/PHP-CSS-Parser/releases/tag/8.3.1', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sabberworm/php-css-parser/CVE-2020-13756.yaml'} | null | {'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4'} | {'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4'} |
GHSA | GHSA-c8wh-6jw4-2h79 | Potential unauthorized access to stored request & session data when plugin is misconfigured in October CMS Debugbar | ### Impact
The debugbar contains a perhaps little known feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as the potential exists for them to use this feature to view all requests being made to the application and obtain sensitive information from those requests. There even exists the potential for account takeovers of authenticated users by non-authenticated public users, which would then lead to a number of other potential issues as an attacker could theoretically get full access to the system if the required conditions existed.
### Patches
Issue has been patched in v3.1.0 by locking down access to the debugbar to all users; it now requires an authenticated backend user with a specifically enabled permission before it is even usable, and the feature that allows access to stored request information is restricted behind a different permission that's more restrictive.
### Workarounds
Apply https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18 to your installation manually if unable to upgrade to v3.1.0.
### For more information
If you have any questions or comments about this advisory:
* Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com)
### Acknowledgements
Thanks to [Freddie Poser](https://twitter.com/vogonjeltz101) for reporting the issue to the RainLab team. | {'CVE-2020-11094'} | 2022-04-19T19:02:27Z | 2020-06-03T23:19:12Z | MODERATE | 6.1 | {'CWE-532'} | {'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18', 'https://github.com/advisories/GHSA-c8wh-6jw4-2h79', 'https://github.com/rainlab/debugbar-plugin/security/advisories/GHSA-c8wh-6jw4-2h79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11094'} | null | {'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18'} | {'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18'} |
GHSA | GHSA-vpq5-4rc8-c222 | Denial of Service in canvas | Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process.
## Recommendation
Upgrade to version 1.6.10 | null | 2020-08-31T18:36:23Z | 2019-06-05T14:10:45Z | MODERATE | 0 | null | {'https://hackerone.com/reports/315037', 'https://github.com/advisories/GHSA-vpq5-4rc8-c222', 'https://www.npmjs.com/advisories/804', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} | null | {'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} | {'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} |
GHSA | GHSA-4q97-fh3f-j294 | Prototype Pollution in tiny-conf | All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function. | {'CVE-2020-7724'} | 2021-07-29T22:08:56Z | 2021-05-10T15:59:24Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7724', 'https://github.com/advisories/GHSA-4q97-fh3f-j294', 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792'} | null | {'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05'} | {'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05'} |
GHSA | GHSA-63xm-rx5p-xvqr | Heap buffer overflow in Tensorflow | ### Impact
The implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L263-L269
It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow.
### Patches
We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15195'} | 2021-11-19T15:19:39Z | 2020-09-25T18:28:29Z | HIGH | 8.5 | {'CWE-119', 'CWE-122', 'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15195', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-63xm-rx5p-xvqr', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} |
GHSA | GHSA-6fvx-r7hx-3vh6 | JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | {'CVE-2018-15531'} | 2022-04-27T14:25:07Z | 2018-10-17T18:28:00Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353', 'https://jenkins.io/security/advisory/2018-09-25/', 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6', 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15531', 'http://www.openwall.com/lists/oss-security/2018/09/25/3'} | null | {'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'} | {'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'} |
GHSA | GHSA-hpv4-7p9c-mvfr | Heap buffer overflow in `FractionalAvgPoolGrad` | ### Impact
The implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers:
```python
import tensorflow as tf
tf.raw_ops.FractionalAvgPoolGrad(
orig_input_tensor_shape=[0,1,2,3],
out_backprop = np.array([[[[541],[541]],[[541],[541]]]]),
row_pooling_sequence=[0, 0, 0, 0, 0],
col_pooling_sequence=[-2, 0, 0, 2, 0],
overlapping=True)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area.
### Patches
We have patched the issue in GitHub commit [0f931751fb20f565c4e94aa6df58d54a003cdb30](https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37651'} | 2021-08-25T14:43:21Z | 2021-08-25T14:43:21Z | HIGH | 7.1 | {'CWE-787', 'CWE-125'} | {'https://github.com/advisories/GHSA-hpv4-7p9c-mvfr', 'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37651'} | null | {'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'} | {'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'} |
GHSA | GHSA-3x58-xr87-2fcj | Cross-site scripting in bluemonday | bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the "script" string. | {'CVE-2021-29272'} | 2022-03-15T21:37:06Z | 2021-05-18T21:07:37Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/microcosm-cc/bluemonday/issues/111', 'https://vuln.ryotak.me/advisories/4.txt', 'https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5', 'https://github.com/advisories/GHSA-3x58-xr87-2fcj', 'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee', 'https://vuln.ryotak.me/advisories/4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29272'} | null | {'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee'} | {'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee'} |
GHSA | GHSA-h2fw-93qx-vrcq | SQL Injection in Moodle | An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default. | {'CVE-2022-0983'} | 2022-04-05T20:54:47Z | 2022-03-26T00:00:29Z | HIGH | 8.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0983', 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74074', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4GRMWBGHOJMFXMTORECQNULJK7ZJJ6Y/', 'https://github.com/advisories/GHSA-h2fw-93qx-vrcq', 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119', 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'} | null | {'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'} | {'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'} |
GHSA | GHSA-rcp4-jm2v-mr3f | Cross-site scripting in Shopizer | A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html. | {'CVE-2021-33561'} | 2021-06-08T23:10:24Z | 2021-06-08T23:10:24Z | MODERATE | 4.8 | {'CWE-79'} | {'https://www.exploit-db.com/exploits/49901', 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://github.com/advisories/GHSA-rcp4-jm2v-mr3f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33561', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0'} | null | {'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} |
GHSA | GHSA-3jxh-789f-p7m6 | Cross-site Scripting | An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads. | {'CVE-2021-27902'} | 2021-07-07T17:11:18Z | 2021-07-02T18:36:31Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27902', 'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#360---2021-01-26', 'https://github.com/advisories/GHSA-3jxh-789f-p7m6', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security-1'} | null | {'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce'} | {'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce'} |
GHSA | GHSA-3c6g-pvg8-gqw2 | Command injection in json | This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function. | {'CVE-2020-7712'} | 2022-02-08T22:04:50Z | 2021-05-06T18:11:21Z | HIGH | 7.2 | {'CWE-78'} | {'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931', 'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/issues/144', 'https://snyk.io/vuln/SNYK-JS-JSON-597481', 'https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E', 'https://github.com/trentm/json/pull/145', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7712', 'https://github.com/advisories/GHSA-3c6g-pvg8-gqw2', 'https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null | {'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483'} | {'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483'} |
GHSA | GHSA-82j4-vr25-x394 | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0940'} | 2022-03-23T15:41:45Z | 2022-03-15T00:01:01Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-82j4-vr25-x394', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0940', 'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73', 'https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782'} | null | {'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73'} | {'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73'} |
GHSA | GHSA-p523-jrph-qjc6 | Insufficient Session Expiration in shopware | ### Impact
Automatically invalidate sessions upon password change
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
| {'CVE-2022-21652'} | 2022-01-06T23:49:17Z | 2022-01-06T23:49:17Z | LOW | 3.5 | {'CWE-613'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21652', 'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/advisories/GHSA-p523-jrph-qjc6', 'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0', 'https://github.com/shopware/shopware/security/advisories/GHSA-p523-jrph-qjc6'} | null | {'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0'} | {'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0'} |
GHSA | GHSA-58w4-w77w-qv3w | Reflected XSS with parameters in PostComment | ### Impact
An attacker could inject malicious web code into the users' web browsers by creating a malicious link.
### Patches
The problem is fixed in 4.2.0
### References
[Cross-site Scripting (XSS) - Reflected (CWE-79) ](https://cwe.mitre.org/data/definitions/79.html) | {'CVE-2020-26225'} | 2022-04-19T19:02:40Z | 2020-11-16T21:23:29Z | MODERATE | 8.7 | {'CWE-79'} | {'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26225', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w', 'https://github.com/advisories/GHSA-58w4-w77w-qv3w'} | null | {'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'} | {'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'} |
GHSA | GHSA-2cv6-6437-39p2 | Cross-site Scripting in microweber | File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12. | {'CVE-2022-0930'} | 2022-03-22T20:03:40Z | 2022-03-13T00:00:53Z | HIGH | 4.8 | {'CWE-79'} | {'https://github.com/advisories/GHSA-2cv6-6437-39p2', 'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e', 'https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0930'} | null | {'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e'} | {'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e'} |
GHSA | GHSA-59c7-4xj2-hgvw | Moderate severity vulnerability that affects rails-html-sanitizer | Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes. | {'CVE-2015-7578'} | 2021-09-01T21:30:33Z | 2017-10-24T18:33:36Z | MODERATE | 6.1 | {'CWE-79'} | {'http://www.securitytracker.com/id/1034816', 'http://www.openwall.com/lists/oss-security/2016/01/25/11', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://github.com/advisories/GHSA-59c7-4xj2-hgvw', 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'} | null | {'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'} | {'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'} |
GHSA | GHSA-6fw4-hr69-g3rv | Prototype Pollution in property-expr | The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function. | {'CVE-2020-7707'} | 2021-07-29T22:00:51Z | 2021-05-06T17:29:47Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7707', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857', 'https://github.com/advisories/GHSA-6fw4-hr69-g3rv', 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7', 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'} | null | {'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7'} | {'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7'} |
GHSA | GHSA-ggxm-pgc9-g7fp | Arbitrary Code Execution in rdoc | In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. | {'CVE-2021-31799'} | 2022-04-22T15:44:17Z | 2021-09-01T18:53:15Z | HIGH | 7 | {'CWE-74', 'CWE-77'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799', 'https://security.netapp.com/advisory/ntap-20210902-0004/', 'https://security-tracker.debian.org/tracker/CVE-2021-31799', 'https://github.com/advisories/GHSA-ggxm-pgc9-g7fp', 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7', 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html'} | null | {'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'} | {'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'} |
GHSA | GHSA-6m93-343m-3jrc | Cross-site Scripting in HTML2PDF | An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document. | {'CVE-2021-45394'} | 2022-01-25T20:48:30Z | 2022-01-21T23:29:48Z | HIGH | 8.8 | {'CWE-79', 'CWE-918'} | {'https://github.com/advisories/GHSA-6m93-343m-3jrc', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md', 'https://github.com/spipu/html2pdf/releases/tag/v5.2.4', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394', 'https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf'} | null | {'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585'} | {'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f'} |
GHSA | GHSA-48ww-j4fc-435p | Command injection in nodemailer | This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails. | {'CVE-2020-7769'} | 2021-07-29T20:31:01Z | 2021-05-10T19:16:52Z | CRITICAL | 9.8 | {'CWE-88'} | {'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834', 'https://www.npmjs.com/package/nodemailer', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75', 'https://github.com/advisories/GHSA-48ww-j4fc-435p', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7769', 'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'} | null | {'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'} | {'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'} |
GHSA | GHSA-269g-pwp5-87pp | TemporaryFolder on unix-like systems does not limit access to created files | ### Vulnerability
The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability.
Example of vulnerable code:
```java
public static class HasTempFolder {
@Rule
public TemporaryFolder folder = new TemporaryFolder();
@Test
public void testUsingTempFolder() throws IOException {
folder.getRoot(); // Previous file permissions: `drwxr-xr-x`; After fix:`drwx------`
File createdFile= folder.newFile("myfile.txt"); // unchanged/irrelevant file permissions
File createdFolder= folder.newFolder("subfolder"); // unchanged/irrelevant file permissions
// ...
}
}
```
### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system.
This vulnerability **does not** allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability.
When analyzing the impact of this vulnerability, here are the important questions to ask:
1. Do the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder?
- If yes, this vulnerability impacts you, but only if you also answer 'yes' to question 2.
- If no, this vulnerability does not impact you.
2. Do the JUnit tests ever execute in an environment where the OS has other untrusted users.
_This may apply in CI/CD environments but normally won't be 'yes' for personal developer machines._
- If yes, and you answered 'yes' to question 1, this vulnerability impacts you.
- If no, this vulnerability does not impact you.
### Patches
Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using.
- Java 1.7 and higher users: this vulnerability is fixed in 4.13.1.
- Java 1.6 and lower users: **no patch is available, you must use the workaround below.**
### Workarounds
If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability.
### References
- [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html)
- Fix commit https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae
#### Similar Vulnerabilities
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
### For more information
If you have any questions or comments about this advisory, please pen an issue in [junit-team/junit4](https://github.com/junit-team/junit4/issues). | {'CVE-2020-15250'} | 2022-04-25T23:05:55Z | 2020-10-12T17:33:00Z | MODERATE | 4.4 | {'CWE-200', 'CWE-732'} | {'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html', 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15250', 'https://lists.apache.org/thread.html/r29d703d1986d9b871466ff24082a1828ac8ad27bb0965a93a383872e@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r30f502d2f79e8d635361adb8108dcbb73095163fcbd776ee7984a094@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r9710067c7096b83cb6ae8f53a2f6f94e9c042d1bf1d6929f8f2a2b7a@%3Ccommits.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r934208a520b38f5cf0cae199b6b076bfe7d081809528b0eff2459e40@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rf797d119cc3f51a8d7c3c5cbe50cb4524c8487282b986edde83a9467@%3Ccommits.pulsar.apache.org%3E', 'https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html', 'https://lists.apache.org/thread.html/rc49cf1547ef6cac1be4b3c92339b2cae0acacf5acaba13cfa429a872@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rde8e70b95c992378e8570e4df400c6008a9839eabdfb8f800a3e5af6@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r09cfbb5aedd76023691bbce9ca4ce2e16bb07dd37554a17efc19935d@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rf2ec93f4ca9a97d1958eb4a31b1830f723419ce9bf2018a6e5741d5b@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01110833b63616ddbef59ae4e10c0fbd0060f0a51206defd4cb4d917@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/rdbdd30510a7c4d0908fd22075c02b75bbc2e0d977ec22249ef3133cb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbaec90e699bc7c7bd9a053f76707a36fda48b6d558f31dc79147dbf9@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r742b44fd75215fc75963b8ecc22b2e4372e68d67d3d859d2b5e8743f@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r687f489b10b0d14e46f626aa88476545e1a2600b24c4ebd3c0d2a10b@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/reb700e60b9642eafa4b7922bfee80796394135aa09c7a239ef9f7486@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r8b02dc6f18df11ff39eedb3038f1e31e6f90a779b1959bae65107279@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r500517c23200fb2fdb0b82770a62dd6c88b3521cfb01cfd0c76e3f8b@%3Cdev.creadur.apache.org%3E', 'https://github.com/junit-team/junit4/blob/7852b90cfe1cea1e0cdaa19d490c83f0d8684b50/doc/ReleaseNotes4.13.1.md', 'https://lists.apache.org/thread.html/r717877028482c55acf604d7a0106af4ca05da4208c708fb157b53672@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra1bdb9efae84794e8ffa2f8474be8290ba57830eefe9714b95da714b@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rf6e5d894d4b03bef537c9d6641272e0197c047c0d1982b4e176d0353@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r925eaae7dd8f77dd61eefc49c1fcf54bd9ecfe605486870d7b1e9390@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rb2771949c676ca984e58a5cd5ca79c2634dee1945e0406e48e0f8457@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r5f8841507576f595bb783ccec6a7cb285ea90d4e6f5043eae0e61a41@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/r2b78f23bc2711a76a7fc73ad67b7fcd6817c5cfccefd6f30a4f54943@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r1209986f79359b518d09513ff05a88e5b3c398540e775edea76a4774@%3Cdev.knox.apache.org%3E', 'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae', 'https://lists.apache.org/thread.html/rea812d8612fdc46842a2a57248cad4b01ddfdb1e9b037c49e68fdbfb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rdef7d1380c86e7c0edf8a0f89a2a8db86fce5e363457d56b722691b4@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/junit-team/junit4/issues/1676', 'https://github.com/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/r95f8ef60c4b3a5284b647bb3132cda08e6fadad888a66b84f49da0b0@%3Ccommits.creadur.apache.org%3E'} | null | {'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'} | {'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'} |
GHSA | GHSA-wf5p-c75w-w3wh | Null pointer dereference in TFLite MLIR optimizations | ### Impact
An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:
This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements:
```cc
bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) {
if (sq_op.getType().cast<ShapedType>().getRank() - 1 ==
*axis.getValues<int>().begin() ||
*axis.getValues<int>().begin() == -1) {
// ...
}
// ...
}
```
### Patches
We have patched the issue in GitHub commit [d6b57f461b39fd1aa8c1b870f1b974aac3554955](https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security. | {'CVE-2021-37689'} | 2021-08-25T14:39:36Z | 2021-08-25T14:39:36Z | HIGH | 7.8 | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37689', 'https://github.com/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'} | null | {'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'} | {'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'} |
GHSA | GHSA-c2vx-49jm-h3f6 | Pysaml2 does not sanitize XML responses | XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier allows remote attackers to read arbitrary files via a crafted SAML XML request or response. | {'CVE-2016-10149'} | 2022-04-26T18:16:33Z | 2018-07-16T16:50:12Z | HIGH | 7.5 | {'CWE-611'} | {'https://access.redhat.com/errata/RHSA-2017:0937', 'https://github.com/rohe/pysaml2/pull/379', 'https://github.com/advisories/GHSA-c2vx-49jm-h3f6', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716', 'https://access.redhat.com/errata/RHSA-2017:0936', 'http://www.openwall.com/lists/oss-security/2017/01/19/5', 'http://www.securityfocus.com/bid/97692', 'https://github.com/rohe/pysaml2/issues/366', 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10149', 'https://access.redhat.com/errata/RHSA-2017:0938', 'http://www.debian.org/security/2017/dsa-3759'} | null | {'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'} | {'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'} |
GHSA | GHSA-fw5q-j9p4-3vxg | Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
Impact: XSS via Arbitrary script execution.
Components are: Blog comment posting
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by yama | {'CVE-2020-15276'} | 2022-04-19T19:02:38Z | 2020-10-30T19:10:20Z | LOW | 7.7 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15276', 'https://basercms.net/security/20201029', 'https://github.com/advisories/GHSA-fw5q-j9p4-3vxg', 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54', 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg'} | null | {'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'} | {'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'} |
GHSA | GHSA-xvm2-9xvc-hx7f | Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer | ### Impact
Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues.
### Patches
Upgrade to version 2.1.0.
### Workarounds
No known workaround.
### References
https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [monitorjbl/excel-streaming-reader](https://github.com/monitorjbl/excel-streaming-reader)
| {'CVE-2022-23640'} | 2022-04-19T19:03:23Z | 2022-03-02T21:30:54Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73', 'https://github.com/advisories/GHSA-xvm2-9xvc-hx7f', 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'} | null | {'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'} | {'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'} |
GHSA | GHSA-c7fm-jx59-wjf6 | Authorization Bypass Through User-Controlled Key in LiveHelperChat | Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v. | {'CVE-2022-0266'} | 2022-01-21T18:50:58Z | 2022-01-21T18:50:58Z | MODERATE | 6.5 | {'CWE-639'} | {'https://github.com/advisories/GHSA-c7fm-jx59-wjf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266', 'https://huntr.dev/bounties/1ac267be-3af8-4774-89f2-77234d144d6b', 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'} | {'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'} |
GHSA | GHSA-p49h-hjvm-jg3h | PCX P mode buffer overflow in Pillow | libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | {'CVE-2020-5312'} | 2021-11-03T18:05:04Z | 2021-11-03T18:05:04Z | HIGH | 9.8 | {'CWE-120'} | {'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml', 'https://www.debian.org/security/2020/dsa-4631', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://access.redhat.com/errata/RHSA-2020:0578', 'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd', 'https://access.redhat.com/errata/RHSA-2020:0580', 'https://access.redhat.com/errata/RHSA-2020:0566', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5312', 'https://access.redhat.com/errata/RHSA-2020:0683', 'https://access.redhat.com/errata/RHSA-2020:0694', 'https://usn.ubuntu.com/4272-1/', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/advisories/GHSA-p49h-hjvm-jg3h', 'https://access.redhat.com/errata/RHSA-2020:0681'} | null | {'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd'} | {'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd'} |
GHSA | GHSA-jr3j-whm4-9wwm | Reflected XSS when using flashMessages or languageDictionary | ### Overview
Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's
- `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`.
- `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`.
### Am I affected?
You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply:
- You are utilizing `flashMessage` feature.
- User input or data from URL parameters is incorporated into the `flashMessage`.
An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`.
```js
var params = new URLSearchParams(location.search);
var errorMessage = params.get('error__message');
var showParams = {};
if (!!errorMessage === true) {
showParams.flashMessage = {
type: 'error',
text: 'We were unable to log you in. ' + errorMessage,
};
}
lock.show(showParams);
```
OR
- You are utilizing `languageDictionary` feature.
- User input or data from URL parameters is used in `languageDictionary` properties.
An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`.
```js
var params = new URLSearchParams(location.search);
var instruction = params.get('instruction');
var options = {
languageDictionary: {
emailInputPlaceholder: "something@youremail.com",
title: "title",
socialLoginInstructions: instruction
},
};
var lock = new Auth0LockPasswordless(
CLIENT_ID,
DOMAIN,
options
);
lock.show()
```
### How to fix that?
Upgrade to version `11.30.1`.
### Will this update impact my users?
The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed. | {'CVE-2021-32641'} | 2021-06-07T18:54:44Z | 2021-06-04T19:10:34Z | HIGH | 8.1 | {'CWE-79'} | {'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed', 'https://github.com/advisories/GHSA-jr3j-whm4-9wwm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641', 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm', 'https://github.com/auth0/lock/releases/tag/v11.30.1'} | null | {'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'} | {'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'} |
GHSA | GHSA-r7cj-8hjg-x622 | DBAL 3 SQL Injection Security Vulnerability | We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction.
We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately.
The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`.
As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs.
This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608).
| {'CVE-2021-43608'} | 2021-12-16T14:11:44Z | 2021-11-16T17:25:57Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/doctrine/dbal/releases', 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43608', 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622', 'https://github.com/advisories/GHSA-r7cj-8hjg-x622', 'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html'} | null | {'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'} | {'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'} |
GHSA | GHSA-2828-9vh6-9m6j | Client Denial of Service on TUF | ### Impact
An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted.
The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue.
### Patches
No fix exists for this issue.
### Workarounds
No workarounds are known for this issue.
### References
* [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173)
* [Issue #973](https://github.com/theupdateframework/tuf/issues/973) | {'CVE-2020-6173'} | 2021-09-23T19:00:17Z | 2020-08-21T16:25:48Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173', 'https://github.com/advisories/GHSA-2828-9vh6-9m6j', 'https://github.com/theupdateframework/tuf/issues/973', 'https://github.com/theupdateframework/tuf/commits/develop'} | null | {'https://github.com/theupdateframework/tuf/commits/develop'} | {'https://github.com/theupdateframework/tuf/commits/develop'} |
GHSA | GHSA-3p85-p4qg-hcrp | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4081'} | 2021-12-16T14:27:58Z | 2021-12-16T14:27:58Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4081', 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a', 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3', 'https://github.com/advisories/GHSA-3p85-p4qg-hcrp'} | null | {'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'} | {'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'} |
GHSA | GHSA-vrw4-w73r-6mm8 | TimelockController vulnerability in OpenZeppelin Contracts | ### Impact
A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker.
### Patches
A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`:
- 4.3.1
- 3.4.2
- 3.4.2-solc-0.7
Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles.
### Workarounds
Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
### References
[Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958).
### Credits
The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
| {'CVE-2021-39168'} | 2021-09-13T20:30:26Z | 2021-08-30T16:12:49Z | CRITICAL | 10 | {'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39168', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/advisories/GHSA-vrw4-w73r-6mm8', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8'} | null | {'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'} | {'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'} |
GHSA | GHSA-g57j-q48p-9vm2 | Command injection in Gerapy | This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized. | {'CVE-2020-7698'} | 2022-03-21T22:49:53Z | 2021-05-06T18:52:13Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2', 'https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7698', 'https://github.com/advisories/GHSA-g57j-q48p-9vm2'} | null | {'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2'} | {'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2'} |
GHSA | GHSA-754h-5r27-7x3r | RCE in Symfony | Description
-----------
The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by `CachingHttpClient` and if an attacker can control the response for a request being made by the `CachingHttpClient`, remote code execution is possible.
Resolution
----------
HTTP headers designed for internal use in `HttpCache` are now stripped from remote responses before being passed to `HttpCache`.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78) for the 4.4 branch.
Credits
-------
I would like to thank Matthias Pigulla (webfactory GmbH) for reporting and fixing the issue. | {'CVE-2020-15094'} | 2022-03-18T18:31:50Z | 2020-09-02T17:29:56Z | HIGH | 8 | {'CWE-212'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15094', 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r', 'https://packagist.org/packages/symfony/http-kernel', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/', 'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78', 'https://packagist.org/packages/symfony/symfony', 'https://github.com/advisories/GHSA-754h-5r27-7x3r'} | null | {'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'} | {'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'} |
GHSA | GHSA-x7j7-qp7j-hw3q | Cross-site scripting (XSS) from writer field content in the site frontend | ### Impact
Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost.
Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site.
This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content.
### Patches
We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
### Credits
Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue. | {'CVE-2021-41252'} | 2022-04-19T19:03:14Z | 2021-11-16T17:04:19Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc', 'https://github.com/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/releases/tag/3.5.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252'} | null | {'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'} | {'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'} |
GHSA | GHSA-28xr-mwxg-3qc8 | Command injection in simple-git | `simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.6.0. | {'CVE-2022-24066'} | 2022-05-03T22:29:55Z | 2022-04-02T00:00:13Z | HIGH | 8.1 | {'CWE-74', 'CWE-77'} | {'https://github.com/advisories/GHSA-28xr-mwxg-3qc8', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306', 'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24066', 'https://gist.github.com/lirantal/a930d902294b833514e821102316426b'} | null | {'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5'} | {'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5'} |
GHSA | GHSA-jjx5-3f36-6927 | Incorrect buffer size calculation in iced-x86 | An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely. | {'CVE-2021-38188'} | 2021-08-25T20:55:47Z | 2021-08-25T20:55:47Z | CRITICAL | 9.8 | {'CWE-131'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0068.html', 'https://github.com/icedland/iced/issues/168', 'https://github.com/advisories/GHSA-jjx5-3f36-6927', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38188', 'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'} | null | {'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'} | {'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'} |
GHSA | GHSA-h3gg-7wx2-cq3h | XSS in Flarum Sticky extension | ### Impact
A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit.
Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed.
Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned.
On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited.
Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted.
### Patches
The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension.
### Workarounds
Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled.
### References
- [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)
- [Pull Request](https://github.com/flarum/sticky/pull/24)
### For more information
If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support).
If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy). | {'CVE-2021-21283'} | 2022-04-19T19:02:46Z | 2021-01-29T18:13:41Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/flarum/sticky/pull/24', 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283', 'https://github.com/advisories/GHSA-h3gg-7wx2-cq3h', 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)', 'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h'} | null | {'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'} | {'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'} |
GHSA | GHSA-5r9v-8w62-r26j | livehelperchat is vulnerable to Cross-site Scripting | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0253'} | 2022-01-25T19:13:22Z | 2022-01-21T23:48:25Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303', 'https://github.com/advisories/GHSA-5r9v-8w62-r26j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0253', 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'} | {'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'} |
GHSA | GHSA-63m4-fhf2-cmf7 | Command Execution in windows-cpu | Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution.
## Proof of Concept
```
var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');
```
## Recommendation
Update to version 0.1.5 or later. | {'CVE-2017-1000219'} | 2021-09-23T21:42:05Z | 2020-09-01T16:43:55Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219', 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117', 'https://nodesecurity.io/advisories/336', 'https://www.npmjs.com/advisories/336', 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81', 'https://github.com/advisories/GHSA-63m4-fhf2-cmf7'} | null | {'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'} | {'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'} |
GHSA | GHSA-rhq2-3vr9-6mcr | Files on the host computer can be accessed from the Gradio interface | ### Impact
This is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces using `gradio<2.4.8`. Because of the way that static files were being served, someone who generated a public Gradio link and shared it with others would potentially be exposing the files on the computer that generated the link, while the link was active. An attacker would be able to view the contents of a file on the computer if they knew the exact relative filepath. We do not have any evidence that this was ever exploited, but we treated the issue seriously and immediately took steps to mitigate it (see below)
### Response
1. We worked with @haby0 to immediately patch the issue and released a new version, `gradio 2.5.0`, within 24 hours of the issue being brought to our attention
2. We enabled a notification that is printed to anyone using an older version of gradio telling them to upgrade (see screenshot below)
3. We expanded our test suite to test for this vulnerability ensuring that our patch does not get reverted in future releases of `gradio`

### Patches
The problem has been patched in `gradio>=2.5.0`.
| {'CVE-2021-43831'} | 2022-04-19T19:03:17Z | 2022-01-21T23:43:33Z | HIGH | 8.3 | {'CWE-22'} | {'https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr', 'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43831', 'https://github.com/advisories/GHSA-rhq2-3vr9-6mcr'} | null | {'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'} | {'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'} |
GHSA | GHSA-xx8c-m748-xr4j | Access Restriction Bypass in kubernetes | The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object. | {'CVE-2016-1905'} | 2022-04-12T22:01:30Z | 2022-02-15T01:57:18Z | MODERATE | 7.7 | {'CWE-284'} | {'https://github.com/advisories/GHSA-xx8c-m748-xr4j', 'https://access.redhat.com/errata/RHSA-2016:0070', 'https://github.com/kubernetes/kubernetes/issues/19479', 'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1905'} | null | {'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22'} | {'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22'} |
GHSA | GHSA-mv26-cx23-vrfg | Server-Side Request Forgery in @peertube/embed-api | @peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery. | {'CVE-2022-0508'} | 2022-02-11T15:05:03Z | 2022-02-09T00:00:31Z | MODERATE | 6.5 | {'CWE-918'} | {'https://huntr.dev/bounties/c3724574-b6c9-430b-849b-40dd2b20f23c', 'https://github.com/advisories/GHSA-mv26-cx23-vrfg', 'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508'} | null | {'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'} | {'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'} |
GHSA | GHSA-fwcm-636p-68r5 | Server-side request forgery in CarrierWave | ### Impact
[CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform.
### Patches
Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2).
### Workarounds
Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access.
### References
[Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave)
* Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com) | {'CVE-2021-21288'} | 2022-04-19T19:02:45Z | 2021-02-08T19:16:26Z | LOW | 0 | {'CWE-918'} | {'https://github.com/advisories/GHSA-fwcm-636p-68r5', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5', 'https://rubygems.org/gems/carrierwave/', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21288', 'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'} | null | {'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'} | {'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'} |
GHSA | GHSA-4qwp-7c67-jmcc | Unauthenticated remote code execution in Ignition | Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. | {'CVE-2021-3129'} | 2022-02-17T18:03:08Z | 2021-03-29T20:23:46Z | CRITICAL | 9.8 | {'CWE-94'} | {'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html', 'https://github.com/facade/ignition/pull/334', 'https://github.com/advisories/GHSA-4qwp-7c67-jmcc', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3129', 'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b', 'http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html', 'https://www.ambionics.io/blog/laravel-debug-rce'} | null | {'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'} | {'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'} |
GHSA | GHSA-8f89-2fwj-5v5r | Improper Input Validation in klona | Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona. | {'CVE-2020-8125'} | 2021-04-13T15:41:24Z | 2021-04-13T15:41:24Z | HIGH | 9.8 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8125', 'https://github.com/advisories/GHSA-8f89-2fwj-5v5r', 'https://hackerone.com/reports/778414', 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'} | null | {'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'} | {'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'} |
GHSA | GHSA-9wcg-jrwf-8gg7 | Prototype Pollution in express-fileupload | This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution. | {'CVE-2020-7699'} | 2022-05-04T02:19:37Z | 2020-08-05T14:53:16Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://github.com/richardgirges/express-fileupload/pull/237', 'https://security.netapp.com/advisory/ntap-20200821-0003/', 'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f', 'https://github.com/advisories/GHSA-9wcg-jrwf-8gg7', 'https://github.com/richardgirges/express-fileupload/issues/236', 'https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7699'} | null | {'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f'} | {'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f'} |
GHSA | GHSA-m242-wc86-8768 | Moderate severity vulnerability that affects python-fedora | python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection | {'CVE-2017-1002150'} | 2021-12-02T22:53:40Z | 2018-07-13T15:17:05Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002150', 'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929.patch', 'https://github.com/advisories/GHSA-m242-wc86-8768'} | null | {'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929'} | {'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929'} |
GHSA | GHSA-27pv-q55r-222g | Path traversal in github.com/ipfs/go-ipfs | ### Impact
It is currently possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when `ipfs get` is done on an affected DAG.
1. The only affected command is `ipfs get`.
2. The gateway is not affected.
### Patches
Traversal fix patched in https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227
`tar-utils` patch applied to go-ipfs via https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2
### Workarounds
Upgrade to go-ipfs 0.8 or later.
### References
Binaries for the patched versions of go-ipfs are available on the IPFS distributions site, https://dist.ipfs.io/go-ipfs
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs)
* Email us at [security@ipfs.io](mailto:security@ipfs.io) | {'CVE-2020-26279'} | 2022-04-19T19:02:51Z | 2021-06-23T17:27:44Z | HIGH | 7.7 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26279', 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g', 'https://github.com/advisories/GHSA-27pv-q55r-222g', 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2'} | null | {'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227', 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2'} | {'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2', 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'} |
GHSA | GHSA-vfq6-hq5r-27r6 | Potential account hijack via password reset form in Django | Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.) | {'CVE-2019-19844'} | 2022-03-21T20:49:09Z | 2020-01-16T22:35:12Z | CRITICAL | 9.8 | {'CWE-640'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-19844', 'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/', 'https://usn.ubuntu.com/4224-1/', 'https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0', 'https://github.com/advisories/GHSA-vfq6-hq5r-27r6', 'https://security.gentoo.org/glsa/202004-17', 'https://www.djangoproject.com/weblog/2019/dec/18/security-releases/', 'https://www.debian.org/security/2020/dsa-4598', 'https://security.netapp.com/advisory/ntap-20200110-0003/', 'https://seclists.org/bugtraq/2020/Jan/9', 'http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html', 'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2'} | null | {'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2', 'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70'} | {'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70', 'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2'} |
GHSA | GHSA-4mrx-6fxm-8jpg | Buffer Overflow in vyper | ### Impact
Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun.
### Patches
0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b)
### Workarounds
Use .vy interfaces. | {'CVE-2022-24788'} | 2022-04-22T19:54:12Z | 2022-04-20T20:31:44Z | HIGH | 7.1 | {'CWE-119', 'CWE-120'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24788', 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b', 'https://github.com/advisories/GHSA-4mrx-6fxm-8jpg', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg'} | null | {'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'} | {'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'} |
GHSA | GHSA-4gwh-2pqx-f5cc | Cross-site Scripting in LibreNMS | LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php. | {'CVE-2021-44277'} | 2021-12-03T20:48:42Z | 2021-12-03T20:48:42Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-4gwh-2pqx-f5cc', 'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277', 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'} | null | {'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'} | {'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'} |
GHSA | GHSA-39wj-j3jc-858m | XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic | ### Impact
This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic.
This vulnerability was reported by Naveen Sunkavally at Horizon3.ai.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff
Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Post in https://forum.mautic.org/c/support
* Email us at security@mautic.org | {'CVE-2020-35124'} | 2022-04-19T19:02:44Z | 2021-01-19T20:43:56Z | CRITICAL | 0 | {'CWE-79'} | {'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4', 'https://github.com/advisories/GHSA-39wj-j3jc-858m', 'https://forum.mautic.org/c/announcements/16', 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35124', 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce', 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m', 'https://packagist.org/packages/mautic/core'} | null | {'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'} | {'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'} |
GHSA | GHSA-p9j6-4pjr-gp48 | Path Traversal in MPXJ | common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations. | {'CVE-2020-35460'} | 2021-01-22T20:50:55Z | 2020-12-18T18:28:23Z | MODERATE | 5.3 | {'CWE-22'} | {'http://www.mpxj.org/changes-report.html#a8.3.5', 'https://github.com/advisories/GHSA-p9j6-4pjr-gp48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35460', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'} | null | {'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'} | {'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'} |
GHSA | GHSA-cwfw-4gq5-mrqx | Regular Expression Denial of Service (ReDoS) in braces | A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. | {'CVE-2018-1109'} | 2022-01-06T20:42:03Z | 2022-01-06T20:42:03Z | LOW | 0 | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1547272', 'https://snyk.io/vuln/npm:braces:20180219', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://github.com/advisories/GHSA-cwfw-4gq5-mrqx'} | null | {'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'} | {'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'} |
GHSA | GHSA-w7q7-vjp8-7jv4 | SQL Injection in typeorm | Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 0.1.15 | null | 2021-08-04T20:56:26Z | 2019-06-06T15:30:16Z | HIGH | 0 | {'CWE-89'} | {'https://github.com/advisories/GHSA-w7q7-vjp8-7jv4', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://hackerone.com/reports/319458', 'https://www.npmjs.com/advisories/800'} | null | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'} | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'} |
GHSA | GHSA-8v67-x8q5-3x3g | Cross-Site Scripting in simditor | Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.3.22 or later. | {'CVE-2018-19048'} | 2021-08-04T14:53:06Z | 2019-05-14T04:01:27Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.npmjs.com/advisories/884', 'https://github.com/hkglue/simditor_demo.git', 'https://github.com/advisories/GHSA-8v67-x8q5-3x3g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048', 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22', 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638', 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd', 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md'} | null | {'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'} | {'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'} |
GHSA | GHSA-98vv-pw6r-q6q4 | Uncontrolled Resource Consumption in pillow | The package pillow from 0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function. | {'CVE-2021-23437'} | 2021-09-22T13:54:07Z | 2021-09-07T23:08:10Z | HIGH | 7.5 | {'CWE-400', 'CWE-125'} | {'https://github.com/advisories/GHSA-98vv-pw6r-q6q4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23437', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443', 'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'} | null | {'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'} | {'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'} |
GHSA | GHSA-wm47-8v5p-wjpj | Possible request smuggling in HTTP/2 due missing validation | ### Impact
If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1.
If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling.
In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked.
An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. A sample attack request looks like:
```
POST / HTTP/2
:authority:: externaldomain.com
Content-Length: 4
asdfGET /evilRedirect HTTP/1.1
Host: internaldomain.com
```
Users are only affected if all of this is `true`:
* `HTTP2MultiplexCodec` or `Http2FrameCodec` is used
* `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects
* These HTTP/1.1 objects are forwarded to another remote peer.
### Patches
This has been patched in 4.1.60.Final
### Workarounds
The user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`.
### References
Related change to workaround the problem: https://github.com/Netflix/zuul/pull/980 | {'CVE-2021-21295'} | 2022-04-25T20:27:22Z | 2021-03-09T18:49:49Z | MODERATE | 5.9 | {'CWE-444'} | {'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3Cissues.hbase.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/Netflix/zuul/pull/980', 'https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4', 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21295', 'https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3Cissues.hbase.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0003/', 'https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E'} | null | {'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'} | {'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.