ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-3c5c-7235-994j | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | {'CVE-2016-2533'} | 2021-08-31T20:56:21Z | 2018-07-24T20:15:13Z | MODERATE | 6.5 | {'CWE-119'} | {'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/advisories/GHSA-3c5c-7235-994j', 'https://github.com/python-pillow/Pillow/pull/1706', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'http://www.openwall.com/lists/oss-security/2016/02/02/5', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533', 'http://www.debian.org/security/2016/dsa-3499', 'http://www.openwall.com/lists/oss-security/2016/02/22/2'} | null | {'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b'} | {'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b'} |
GHSA | GHSA-p4x4-rw2p-8j8m | Cross-site Scripting in Sanitize | When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist.
You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements:
- `iframe`
- `math`
- `noembed`
- `noframes`
- `noscript`
- `plaintext`
- `script`
- `style`
- `svg`
- `xmp`
### Impact
Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser.
### Releases
This problem has been fixed in Sanitize 5.2.1.
### Workarounds
If upgrading is not possible, a workaround is to override the default value of Sanitize's `:remove_contents` config option with the following value, which ensures that the contents of `math` and `svg` elements (among others) are removed entirely when those elements are not in the allowlist:
```ruby
%w[iframe math noembed noframes noscript plaintext script style svg xmp]
```
For example, if you currently use Sanitize's relaxed config, you can create a custom config object that overrides the default value of `:remove_contents` like this:
```ruby
custom_config = Sanitize::Config.merge(
Sanitize::Config::RELAXED,
:remove_contents => %w[iframe math noembed noframes noscript plaintext script style svg xmp]
)
```
You would then pass this custom config to Sanitize when sanitizing HTML.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in the [Sanitize repo](https://github.com/rgrove/sanitize).
- See Sanitize's [security policy](https://github.com/rgrove/sanitize/security/policy).
### Credits
Many thanks to Michal Bentkowski of Securitum for reporting this bug and helping to verify the fix.
### References
- [GHSA-p4x4-rw2p-8j8m](https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m)
- [CVE-2020-4054](https://nvd.nist.gov/vuln/detail/CVE-2020-4054)
- https://github.com/rgrove/sanitize/releases/tag/v5.2.1 | {'CVE-2020-4054'} | 2021-01-08T17:08:41Z | 2020-06-16T22:08:06Z | HIGH | 7.3 | {'CWE-79'} | {'https://usn.ubuntu.com/4543-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054', 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m', 'https://github.com/advisories/GHSA-p4x4-rw2p-8j8m', 'https://www.debian.org/security/2020/dsa-4730', 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9', 'https://github.com/rgrove/sanitize/releases/tag/v5.2.1'} | null | {'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9'} | {'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9'} |
GHSA | GHSA-xg6r-5gx4-qxjm | invoiceninja is vulnerable to Cross-site Scripting | invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3977'} | 2022-01-06T21:58:34Z | 2022-01-06T21:58:34Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35', 'https://github.com/advisories/GHSA-xg6r-5gx4-qxjm'} | null | {'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'} | {'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'} |
GHSA | GHSA-5q6m-3h65-w53x | Improper Neutralization of Special Elements used in an OS Command. | react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you. | {'CVE-2021-24033'} | 2021-03-11T22:26:09Z | 2021-03-11T22:26:09Z | MODERATE | 0 | {'CWE-78'} | {'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://github.com/advisories/GHSA-5q6m-3h65-w53x', 'https://github.com/facebook/create-react-app/pull/10644', 'https://www.facebook.com/security/advisories/cve-2021-24033'} | null | {'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'} | {'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'} |
GHSA | GHSA-rprj-g6xc-p5gq | Moderate severity vulnerability that affects wicked | Directory traversal vulnerability in controller/concerns/render_redirect.rb in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary files via a %2E%2E%2F (encoded dot dot slash) in the step. | {'CVE-2013-4413'} | 2021-09-17T19:24:02Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-22'} | {'http://seclists.org/oss-sec/2013/q4/43', 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq', 'http://www.securityfocus.com/bid/62891', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413', 'http://secunia.com/advisories/55151', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783', 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'} | null | {'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'} | {'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'} |
GHSA | GHSA-v5rv-hpxg-8x49 | Signature validation bypass in ServiceStack | ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature. | {'CVE-2020-28042'} | 2021-01-13T19:13:11Z | 2021-01-13T19:13:11Z | MODERATE | 0 | {'CWE-347'} | {'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/', 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://www.nuget.org/packages/ServiceStack/', 'https://github.com/advisories/GHSA-v5rv-hpxg-8x49', 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519'} | null | {'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'} | {'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'} |
GHSA | GHSA-rmp7-f2vp-3rq4 | Cross-site scripting in SiCKRAGE | in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information. | {'CVE-2021-25925'} | 2021-04-23T19:28:53Z | 2021-04-20T16:31:54Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925', 'https://github.com/advisories/GHSA-rmp7-f2vp-3rq4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'} | null | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'} | {'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'} |
GHSA | GHSA-7xj5-fwqr-5378 | Cross-site Scripting in craftcms/cms | Craft CMS before 3.7.29 allows cross-site scripting. | {'CVE-2022-28378'} | 2022-04-18T22:20:40Z | 2022-04-04T00:00:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-7xj5-fwqr-5378', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'} | null | {'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'} | {'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'} |
GHSA | GHSA-mw75-qvfr-hpmr | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0938'} | 2022-03-23T15:39:32Z | 2022-03-15T00:01:01Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938', 'https://github.com/advisories/GHSA-mw75-qvfr-hpmr'} | null | {'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'} | {'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'} |
GHSA | GHSA-v2p6-4mp7-3r9v | Regular Expression Denial of Service in underscore.string | Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS).
The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs.
## Recommendation
Upgrade to version 3.3.5 or higher. | null | 2021-08-16T23:29:45Z | 2019-06-14T16:26:22Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/pull/517', 'https://www.npmjs.com/advisories/745', 'https://github.com/epeli/underscore.string/issues/510', 'https://github.com/advisories/GHSA-v2p6-4mp7-3r9v'} | null | {'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'} | {'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'} |
GHSA | GHSA-3p9j-442x-hjp7 | Business Logic Errors in microweber | microweber prior to 1.2.11 allows multiple uses of a single-use coupon. | {'CVE-2022-0689'} | 2022-02-26T01:15:36Z | 2022-02-20T00:00:31Z | MODERATE | 5.3 | null | {'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689', 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04', 'https://github.com/advisories/GHSA-3p9j-442x-hjp7'} | null | {'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'} | {'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'} |
GHSA | GHSA-6pc9-xqrg-wfqw | Exposure of Sensitive information in httpie | httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0. | {'CVE-2022-0430'} | 2022-04-05T18:50:32Z | 2022-03-16T00:00:47Z | LOW | 2.4 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0430', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b', 'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/advisories/GHSA-6pc9-xqrg-wfqw', 'https://github.com/pypa/advisory-database/tree/main/vulns/httpie/PYSEC-2022-167.yaml'} | null | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} |
GHSA | GHSA-qphc-hf5q-v8fc | Open Redirect in actionpack | Specially crafted "X-Forwarded-Host" headers in combination with certain
"allowed host" formats can cause the Host Authorization middleware in Action
Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For example,
configuration files that look like this:
```
config.hosts << '.EXAMPLE.com'
```
When an allowed host contains a leading dot, a specially crafted Host header
can be used to redirect to a malicious website.
This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942.
Releases
--------
The fixed releases are available at the normal locations.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series
* 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series
* 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases. | {'CVE-2021-44528'} | 2022-04-27T22:24:24Z | 2021-12-14T21:19:08Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528', 'https://github.com/advisories/GHSA-qphc-hf5q-v8fc', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer', 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml'} | null | {'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'} | {'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'} |
GHSA | GHSA-3qxp-qjq7-w4hf | CHECK-fail in tf.raw_ops.EncodePng | ### Impact
An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data:
```python
import tensorflow as tf
image = tf.zeros([0, 0, 3])
image = tf.cast(image, dtype=tf.uint8)
tf.raw_ops.EncodePng(image=image)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when [calling `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat<T>().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the [first line of `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349).
```cc
template <typename T>
bool WriteImageToBuffer(
const void* image, int width, int height, int row_bytes, int num_channels,
int channel_bits, int compression, T* png_string,
const std::vector<std::pair<std::string, std::string> >* metadata) {
CHECK_NOTNULL(image);
...
}
```
Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack.
### Patches
We have patched the issue in GitHub commit [26eb323554ffccd173e8a79a8c05c15b685ae4d1](https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29531'} | 2021-05-21T14:22:13Z | 2021-05-21T14:22:13Z | LOW | 2.5 | {'CWE-754'} | {'https://github.com/advisories/GHSA-3qxp-qjq7-w4hf', 'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29531'} | null | {'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1'} | {'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1'} |
GHSA | GHSA-xwx6-vmj4-5rv8 | Denial of service via deserialization attack in nifi | A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB. | {'CVE-2017-15703'} | 2021-08-18T22:04:42Z | 2019-10-25T19:42:50Z | MODERATE | 5 | {'CWE-502'} | {'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc', 'https://github.com/advisories/GHSA-xwx6-vmj4-5rv8'} | null | {'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'} | {'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'} |
GHSA | GHSA-6g47-63mv-qpgh | Prototype Pollution in dotty | This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays. | {'CVE-2021-23624'} | 2021-11-08T17:55:48Z | 2021-11-08T17:55:48Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/advisories/GHSA-6g47-63mv-qpgh'} | null | {'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'} | {'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'} |
GHSA | GHSA-2p6p-v69p-9mm9 | XSS in login form | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form. | {'CVE-2019-13235'} | 2021-08-18T22:26:43Z | 2019-11-12T22:58:16Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://aetsu.github.io/OpenCms', 'https://github.com/advisories/GHSA-2p6p-v69p-9mm9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235'} | null | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} |
GHSA | GHSA-vpgw-ffh3-648h | Prototype Pollution in fullpage.js | fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability.
Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application. | {'CVE-2022-1295'} | 2022-04-22T20:20:56Z | 2022-04-12T00:00:38Z | HIGH | 7.3 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-vpgw-ffh3-648h', 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'} | null | {'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'} | {'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'} |
GHSA | GHSA-xpmx-h7xq-xffh | Potential access control security issue in apollo-adminservice | ### Impact
If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations.
### Patches
Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1).
### Workarounds
To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet.
### Credits
[Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it.
### References
[Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3)
### For more information
If you have any questions or comments about this advisory:
* Open an [issue](https://github.com/ctripcorp/apollo/issues)
* Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors) | {'CVE-2020-15170'} | 2022-04-19T19:02:34Z | 2020-10-02T16:33:41Z | HIGH | 7 | {'CWE-20'} | {'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/advisories/GHSA-xpmx-h7xq-xffh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh'} | null | {'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'} | {'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'} |
GHSA | GHSA-r5hc-9xx5-97rw | Moderate severity vulnerability that affects i18n | Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. | {'CVE-2013-4492'} | 2021-09-17T14:34:46Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-79'} | {'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html', 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw', 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492', 'http://www.securityfocus.com/bid/64076', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://www.debian.org/security/2013/dsa-2830'} | null | {'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'} | {'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'} |
GHSA | GHSA-j858-xp5v-f8xx | Remote code execution in Dragonfly | An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility. | {'CVE-2021-33564'} | 2021-06-11T13:19:25Z | 2021-06-02T21:42:49Z | CRITICAL | 9.8 | {'CWE-88', 'CWE-94'} | {'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5', 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0', 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml', 'https://github.com/advisories/GHSA-j858-xp5v-f8xx', 'https://github.com/markevans/dragonfly/issues/513', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564', 'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/', 'https://github.com/mlr0p/CVE-2021-33564'} | null | {'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'} | {'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'} |
GHSA | GHSA-q547-gmf8-8jr7 | Signature Validation Bypass in goxmldsig | ### Impact
With a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one.
### Patches
A patch is available, all users of goxmldsig should upgrade to v1.1.0.
### For more information
If you have any questions or comments about this advisory open an issue at https://github.com/russellhaering/goxmldsig | {'CVE-2020-15216'} | 2022-04-19T19:02:35Z | 2021-05-24T16:57:32Z | MODERATE | 5.3 | {'CWE-347'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBFD4M4PHBMBOCMSQ537NOU37QOVWP/', 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64', 'https://pkg.go.dev/github.com/russellhaering/goxmldsig?tab=overview', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15216', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUH33FPUXED3FHYL25BJOQPRKFGPOMS2/', 'https://github.com/advisories/GHSA-q547-gmf8-8jr7', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7'} | null | {'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'} | {'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'} |
GHSA | GHSA-844m-cpr9-jcmh | Secure/signed cookies share secrets between sites in a multi-site application | ### Impact
This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application.
### Patches
The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture. | {'CVE-2021-41263'} | 2021-11-17T21:09:27Z | 2021-11-15T17:54:01Z | MODERATE | 6.2 | {'CWE-200', 'CWE-565'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41263', 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh', 'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0', 'https://github.com/advisories/GHSA-844m-cpr9-jcmh'} | null | {'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'} | {'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'} |
GHSA | GHSA-p8c3-7rj8-q963 | ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign | ### Impact
Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as:
- wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct)
- prepending zeros with ASN.1 INTEGER value (ex. 0x00000123 even though 0x0123 is correct)
- appending zeros to signature of ASN.1 TLV (ex. 0x3082....1fbc000000 even though 0x3082....1fbc, appending zeros are ignored.)
This vulnerability was fixed by strict ASN.1 DER checking.
Here is an assessment of this vulnerability:
- If you are not use ECDSA signature validation, this vulnerability is not affected.
- Not ASN.1 format signature like just concatenation of R and S value is not affected such as Bitcoin.
- This vulnerability is affected to all ECC curve parameters.
- Risk to accept a forged or crafted message to be signed is low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
- ECDSA signatures semantically the same to valid one may be accepted as valid. There are many malleable variants.
As discussed [here](https://crypto.stackexchange.com/questions/24862/ber-or-der-x9-62-for-ecdsa-signature), there is no standards like X9.62 which requires ASN.1 DER. So ASN.1 BER can be applied to ECDSA however most of implementations like OpenSSL do strict ASN.1 DER checking.
### Patches
Users using ECDSA signature validation should upgrade to 8.0.19.
### Workarounds
Do strict ASN.1 DER checking for ASN.1 encoded ECDSA signature value.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-14966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966
https://vuldb.com/?id.157123
https://github.com/kjur/jsrsasign/issues/437
https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html
https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER
https://www.itu.int/rec/T-REC-X.690
| {'CVE-2020-14966'} | 2021-10-06T22:01:37Z | 2020-06-26T16:54:15Z | HIGH | 7.5 | {'CWE-347'} | {'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://github.com/kjur/jsrsasign/issues/437', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f', 'https://www.npmjs.com/package/jsrsasign', 'https://vuldb.com/?id.157123', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html', 'https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14966', 'https://kjur.github.io/jsrsasign/', 'https://github.com/advisories/GHSA-p8c3-7rj8-q963'} | null | {'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'} | {'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'} |
GHSA | GHSA-r38r-qp28-2m63 | Critical severity vulnerability that affects rope | base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load. | {'CVE-2014-3539'} | 2022-03-23T20:45:02Z | 2018-07-26T16:08:49Z | CRITICAL | 9.8 | null | {'https://github.com/advisories/GHSA-r38r-qp28-2m63', 'http://www.openwall.com/lists/oss-security/2015/02/07/1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3539', 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb', 'https://bugzilla.redhat.com/show_bug.cgi?id=1116485'} | null | {'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'} | {'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'} |
GHSA | GHSA-fcwc-p4fc-c5cc | Null pointer dereference in `MatrixDiagPartOp` | ### Impact
If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first:
```python
import tensorflow as tf
tf.raw_ops.MatrixDiagPartV2(
input=tf.ones(2,dtype=tf.int32),
k=tf.ones(2,dtype=tf.int32),
padding_value=[])
```
Although this example is given for `MatrixDiagPartV2`, all versions of the operation are affected.
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from.
### Patches
We have patched the issue in GitHub commit [482da92095c4d48f8784b1f00dda4f81c28d2988](https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37643'} | 2021-08-25T14:43:42Z | 2021-08-25T14:43:42Z | HIGH | 7.7 | {'CWE-476'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37643', 'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988', 'https://github.com/advisories/GHSA-fcwc-p4fc-c5cc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc'} | null | {'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'} | {'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'} |
GHSA | GHSA-77gc-fj98-665h | Signature Validation Bypass | Go JOSE before 1.1.0 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated. | {'CVE-2016-9122'} | 2021-05-18T19:15:09Z | 2021-05-18T19:15:09Z | HIGH | 7.5 | {'CWE-284'} | {'https://hackerone.com/reports/169629', 'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6', 'https://github.com/advisories/GHSA-77gc-fj98-665h', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9122', 'https://github.com/square/go-jose/pull/111', 'http://www.openwall.com/lists/oss-security/2016/11/03/1'} | null | {'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'} | {'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'} |
GHSA | GHSA-jh2g-xhqq-x4w9 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`.
This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`.
This can result in memory corruption caused by data races.
| null | 2021-08-25T21:00:07Z | 2021-08-25T21:00:07Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/advisories/GHSA-jh2g-xhqq-x4w9', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://github.com/Xudong-Huang/rcu_cell/issues/3', 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'} | null | {'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'} | {'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'} |
GHSA | GHSA-gj26-g5qf-jrh7 | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0. | {'CVE-2022-0589'} | 2022-02-24T13:06:11Z | 2022-02-16T00:01:51Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://github.com/advisories/GHSA-gj26-g5qf-jrh7', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589'} | null | {'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'} | {'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'} |
GHSA | GHSA-ffhg-7mh4-33c4 | Improper Verification of Cryptographic Signature in golang.org/x/crypto | golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client. | {'CVE-2020-9283'} | 2022-01-04T19:50:38Z | 2021-05-18T15:29:31Z | MODERATE | 7.5 | {'CWE-347'} | {'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236', 'http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9283', 'https://github.com/advisories/GHSA-ffhg-7mh4-33c4', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html', 'https://www.exploit-db.com/exploits/48121', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html', 'https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY'} | null | {'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'} | {'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'} |
GHSA | GHSA-4jf5-jggp-g56j | Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12 | This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty. | {'CVE-2020-28452'} | 2022-01-06T20:23:05Z | 2022-01-06T20:23:05Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/softwaremill/akka-http-session/issues/77', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://github.com/softwaremill/akka-http-session/pull/79', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046675', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452', 'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1', 'https://github.com/advisories/GHSA-4jf5-jggp-g56j'} | null | {'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'} | {'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'} |
GHSA | GHSA-962m-m8jw-8wrr | Path Traversal in Zope | Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. | {'CVE-2021-32633'} | 2021-08-31T21:04:33Z | 2021-06-15T16:10:49Z | HIGH | 8.8 | {'CWE-22'} | {'https://github.com/advisories/GHSA-962m-m8jw-8wrr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32633', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/', 'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'} | null | {'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'} | {'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'} |
GHSA | GHSA-94qw-r73x-j7hg | Users with ROLE_COURSE_ADMIN can create new users in Opencast | ### Impact
Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example:
```bash
# Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user.
# We expect this to work.
% curl -i -u admin:opencast 'https://example.opencast.org/user-utils/xy.json' -X PUT \
--data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D'
HTTP/2 201
# Use the new user to create more new users.
# We don't expüect a user with just role ROLE_COURSE_ADMIN to succeed.
# But it does work
% curl -i -u xy:f 'https://example.opencast.org/user-utils/ab.json' -X PUT \
--data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D'
HTTP/2 201
```
`ROLE_COURSE_ADMIN` is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation.
### Patches
This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration.
### Workarounds
You can fix this issue by removing all instances of `ROLE_COURSE_ADMIN` in your organization's security configuration (`etc/security/mh_default_org.xml` by default).
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5231'} | 2021-10-20T18:03:32Z | 2020-01-30T21:21:37Z | MODERATE | 4.8 | {'CWE-285'} | {'https://github.com/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231'} | null | {'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'} | {'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'} |
GHSA | GHSA-vq36-27g6-p492 | Out of bounds read in Tensorflow | ### Impact
TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production):
```cc
if (node_t.type_id() != TFT_UNSET) {
int ix = input_idx[i];
DCHECK(ix < node_t.args_size())
<< "input " << i << " should have an output " << ix
<< " but instead only has " << node_t.args_size()
<< " outputs: " << node_t.DebugString();
input_types.emplace_back(node_t.args(ix));
// ...
}
```
An attacker can control `input_idx` such that `ix` would be larger than the number of values in `node_t.args`.
### Patches
We have patched the issue in GitHub commit [c99d98cd189839dcf51aee94e7437b54b31f8abd](https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd).
The fix will be included in TensorFlow 2.8.0. This is the only affected version.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23592'} | 2022-03-28T19:30:23Z | 2022-02-09T23:31:48Z | HIGH | 8.1 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23592', 'https://github.com/advisories/GHSA-vq36-27g6-p492', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492'} | null | {'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'} | {'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'} |
GHSA | GHSA-jh63-28gx-7p26 | Command Injection in CasaOS | CasaOS before v0.2.7 was discovered to contain a command injection vulnerability via the component leave or join zerotier api. | {'CVE-2022-24193'} | 2022-05-05T13:34:12Z | 2022-03-11T00:02:17Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24193', 'https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/#more', 'https://github.com/IceWhaleTech/CasaOS/issues/84', 'https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/', 'https://github.com/advisories/GHSA-jh63-28gx-7p26'} | null | {'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06'} | {'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06'} |
GHSA | GHSA-q2q7-5pp4-w6pg | Catastrophic backtracking in URL authority parser when passed URL containing many @ characters | ### Impact
When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
### Patches
The issue has been fixed in urllib3 v1.26.5.
### References
- [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503)
- [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/)
- [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/)
- [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5)
### For more information
If you have any questions or comments about this advisory:
* Ask in our [community Discord](https://discord.gg/urllib3)
* Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
| {'CVE-2021-33503'} | 2022-04-19T19:02:58Z | 2021-06-01T21:19:32Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33503', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.gentoo.org/glsa/202107-36', 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg', 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/', 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'} | null | {'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'} | {'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'} |
GHSA | GHSA-cfjh-p3g4-3q2f | VBScript Content Injection in marked | Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set.
## Proof of Concept ( IE10 Compatibility Mode Only )
`[xss link](vbscript:alert(1))`
will get a link
`<a href="vbscript:alert(1)">xss link</a>`
## Recommendation
Update to version 0.3.3 or later. | {'CVE-2015-1370'} | 2021-09-09T17:02:03Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/markedjs/marked/issues/492', 'https://github.com/chjj/marked/issues/492', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370', 'https://www.npmjs.com/advisories/24/versions', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://www.npmjs.com/advisories/24', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://github.com/advisories/GHSA-cfjh-p3g4-3q2f', 'https://nodesecurity.io/advisories/marked_vbscript_injection'} | null | {'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'} | {'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba'} |
GHSA | GHSA-pfj3-56hm-jwq5 | Template injection in cron-utils | ### Impact
A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected.
### Patches
The issue was patched and a new version released. Please upgrade to version 9.1.3.
### Workarounds
There are no known workarounds up to this moment.
### References
A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [cron-utils Github repository](https://github.com/jmrozanec/cron-utils) | {'CVE-2020-26238'} | 2022-04-19T19:02:40Z | 2020-11-24T23:48:38Z | CRITICAL | 7.9 | {'CWE-74'} | {'https://github.com/advisories/GHSA-pfj3-56hm-jwq5', 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d390ee0a02e45e5a5b4f931180b9a93@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/issues/461', 'https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26238', 'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e', 'https://lists.apache.org/thread.html/r855aead591697dc2e85faf66c99036e49f492431940b78d4e6d895b5@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r96937fc9c82f3201b59311c067e97bce71123944f93102169a95bf5c@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9ae9a9fb1c8e2bf95c676e7e4cd06aa04f0a3a8a9ec1a6b787afb00f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5'} | null | {'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'} | {'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'} |
GHSA | GHSA-hf6f-jq25-8gq9 | Remote Code Execution (RCE) | Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron. | {'CVE-2018-18926'} | 2022-04-12T22:10:40Z | 2022-02-15T01:57:18Z | CRITICAL | 8.1 | {'CWE-94'} | {'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df88468374162', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18926', 'https://github.com/go-gitea/gitea/issues/5140', 'https://github.com/go-gitea/gitea/pull/5177', 'https://github.com/advisories/GHSA-hf6f-jq25-8gq9'} | null | {'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df88468374162'} | {'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df88468374162'} |
GHSA | GHSA-rhcw-wjcm-9h6g | Denial of service in Undertow | A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1. | {'CVE-2020-27782'} | 2022-02-09T00:54:12Z | 2022-02-09T00:54:12Z | HIGH | 7.5 | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1901304', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782', 'https://issues.redhat.com/browse/UNDERTOW-1813', 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90', 'https://github.com/advisories/GHSA-rhcw-wjcm-9h6g'} | null | {'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'} | {'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'} |
GHSA | GHSA-7vvq-7r29-5vg3 | Cross site scripting in three.js | # CVE has been withdrawn
Versions of three.js prior to 0.137.0 load untrusted iframes and allow for attackers to inject arbitrary javascript into a users browser.
| {'CVE-2022-0177'} | 2022-01-28T21:29:42Z | 2022-01-27T16:00:48Z | HIGH | 7.1 | {'CWE-79'} | {'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0177', 'https://github.com/mrdoob/three.js/pull/23245', 'https://huntr.dev/bounties/16901080-99b4-4fb5-8c5b-931bfbf33cba', 'https://github.com/advisories/GHSA-7vvq-7r29-5vg3'} | null | {'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d'} | {'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d'} |
GHSA | GHSA-5fxv-xx5p-g2fv | Integer Overflow in microweber | Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters | {'CVE-2022-0968'} | 2022-03-25T17:13:37Z | 2022-03-16T00:00:46Z | HIGH | 7.2 | {'CWE-190'} | {'https://github.com/advisories/GHSA-5fxv-xx5p-g2fv', 'https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968', 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'} | null | {'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'} | {'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'} |
GHSA | GHSA-jxhc-q857-3j6g | Regular Expression Denial of Service in Addressable templates | ### Impact
Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected.
### Patches
The vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0.
### Workarounds
The vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking.
### References
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
- https://cwe.mitre.org/data/definitions/1333.html
- https://www.regular-expressions.info/catastrophic.html
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/sporkmonger/addressable/issues)
| {'CVE-2021-32740'} | 2021-08-30T22:21:21Z | 2021-07-12T16:58:33Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g', 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYPVOOQU7UB277UUERJMCNQLRCXRCIQ5/', 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32740', 'https://github.com/advisories/GHSA-jxhc-q857-3j6g', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDFQM2NHNAZ3NNUQZEJTYECYZYXV4UDS/'} | null | {'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7', 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc'} | {'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc', 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7'} |
GHSA | GHSA-5pm8-492c-92p5 | Prototype Pollution in chartkick | Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server.
## Recommendation
Upgrade to version 3.2.0 or later. | {'CVE-2019-18841'} | 2021-09-22T18:05:53Z | 2019-12-02T18:04:11Z | HIGH | 0 | null | {'https://github.com/ankane/chartkick/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://rubygems.org/gems/chartkick/', 'https://github.com/ankane/chartkick.js/issues/117', 'https://github.com/advisories/GHSA-5pm8-492c-92p5', 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://chartkick.com', 'https://www.npmjs.com/advisories/1312'} | null | {'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'} | {'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'} |
GHSA | GHSA-hxhm-96pp-2m43 | Remote Code Execution in Angular Expressions | ### Impact
The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input.
* If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput).
* If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution.
### Patches
Users should upgrade to version 1.0.1 of angular-expressions
### Workarounds
A temporary workaround might be either to :
* disable user-controlled input that will be fed into angular-expressions in your application
OR
* allow only following characters in the userControlledInput :
```js
if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) {
var result = expressions.compile(userControlledInput);
}
else {
result = undefined;
}
```
### References
[Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues)
* [Email us](mailto:contact@javascript-ninja.fr)
### Credits
The issue was reported by Maxime Nadeau from GoSecure, Inc. | {'CVE-2020-5219'} | 2022-04-19T19:02:21Z | 2020-01-24T15:27:25Z | HIGH | 8.7 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5219', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667', 'https://github.com/advisories/GHSA-hxhm-96pp-2m43', 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-hxhm-96pp-2m43'} | null | {'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'} | {'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'} |
GHSA | GHSA-96v6-hrwg-p378 | Weak Password Requirements in Daybyday CRM | In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort. | {'CVE-2022-22110'} | 2022-01-24T22:07:09Z | 2022-01-08T00:31:51Z | HIGH | 7.5 | {'CWE-521'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22110', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://github.com/advisories/GHSA-96v6-hrwg-p378'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'} | {'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'} |
GHSA | GHSA-5gjm-fj42-x983 | Cross-site Request Forgery (CSRF) | A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send. | {'CVE-2018-1098'} | 2022-04-12T22:10:13Z | 2022-02-15T01:57:18Z | HIGH | 8.8 | {'CWE-352'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552714', 'https://github.com/advisories/GHSA-5gjm-fj42-x983', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1098', 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56', 'https://github.com/coreos/etcd/issues/9353'} | null | {'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'} | {'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'} |
GHSA | GHSA-hwv5-w8gm-fq9f | Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request | ### Impact
#### Information Disclosure
When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic.
For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access.
If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances.
#### File Write
If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload.
### Patches
PR #12 fixes the issue. The PR has been merged into version 0.4.0 and 0.4.0 has been released and pushed to PyPI. Users are advised to upgrade immediately.
### Workarounds
- Apache can apparently be configured to filter such malicious paths when reverse-proxying.
- There are no other workarounds known.
### References
- [Pull Request #12](https://github.com/horazont/xmpp-http-upload/pull/12) | {'CVE-2020-15239'} | 2022-04-19T19:02:36Z | 2020-10-06T18:21:02Z | LOW | 3.5 | {'CWE-22'} | {'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f', 'https://github.com/horazont/xmpp-http-upload/pull/12', 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75', 'https://github.com/advisories/GHSA-hwv5-w8gm-fq9f', 'https://pypi.org/project/xmpp-http-upload/#history', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15239'} | null | {'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'} | {'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'} |
GHSA | GHSA-3mcp-9wr4-cjqf | Remote Code Execution (RCE) vulnerability in dropwizard-validation | Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature.
### Summary
A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.
If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended.
### Impact
This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**.
### Patches
The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions.
### Workarounds
If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html).
Example:
```java
@SelfValidation
public void validateFullName(ViolationCollector col) {
if (fullName.contains("_")) {
// Sanitize fullName variable by escaping relevant characters such as "$"
col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName));
}
}
```
See also:
https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98
### References
* https://github.com/dropwizard/dropwizard/pull/3157
* https://github.com/dropwizard/dropwizard/pull/3160
* https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm
* https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions
* https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new)
* Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev)
### Security contact
If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy):
https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability | {'CVE-2020-5245'} | 2022-04-25T23:06:16Z | 2020-02-24T17:27:27Z | HIGH | 7.9 | {'CWE-74'} | {'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/dropwizard/dropwizard/pull/3160', 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm', 'https://github.com/advisories/GHSA-3mcp-9wr4-cjqf', 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions', 'https://github.com/dropwizard/dropwizard/pull/3157'} | null | {'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'} | {'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'} |
GHSA | GHSA-gh88-3pxp-6fm8 | Infinite Loop in colors.js | The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to have been revoked in an attempt to prevent them from fixing the issue. Vulnerable Code js for (let i = 666; i < Infinity; i++;) { Alternative Remediation Suggested * Pin dependancy to 1.4.0 | {'CVE-2021-23567'} | 2022-01-21T23:39:50Z | 2022-01-21T23:39:50Z | HIGH | 7.5 | {'CWE-835'} | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6%23diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/Marak/colors.js/issues/285', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://snyk.io/blog/open-source-maintainer-pulls-the-plug-on-npm-packages-colors-and-faker-now-what/', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906'} | null | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} |
GHSA | GHSA-7prf-vw4p-qr59 | Prototype pollution in supermixer | Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation. | {'CVE-2020-24939'} | 2021-12-10T19:03:07Z | 2021-12-10T19:03:07Z | HIGH | 7.5 | {'CWE-1321', 'CWE-915'} | {'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3', 'https://hackerone.com/reports/959987', 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939', 'https://github.com/advisories/GHSA-7prf-vw4p-qr59', 'https://github.com/stampit-org/supermixer/issues/9'} | null | {'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'} | {'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'} |
GHSA | GHSA-2cqg-q7jm-j35c | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3938'} | 2021-11-17T21:13:27Z | 2021-11-15T23:19:42Z | LOW | 3.9 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3938', 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9', 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063', 'https://github.com/advisories/GHSA-2cqg-q7jm-j35c'} | null | {'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'} | {'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'} |
GHSA | GHSA-24x4-6qmh-88qg | Use after free in `DecodePng` kernel | ### Impact
A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346):
```cc
if (/* ... error conditions ... */) {
png::CommonFreeDecode(&decode);
OP_REQUIRES(context, false,
errors::InvalidArgument("PNG size too large for int: ",
decode.width, " by ", decode.height));
}
```
After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state.
### Patches
We have patched the issue in GitHub commit [e746adbfcfee15e9cfdb391ff746c765b99bdf9b](https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23584'} | 2022-02-11T20:36:59Z | 2022-02-09T23:57:42Z | HIGH | 7.6 | {'CWE-416'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23584', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346', 'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b', 'https://github.com/advisories/GHSA-24x4-6qmh-88qg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg'} | null | {'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'} | {'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'} |
GHSA | GHSA-765h-qjxv-5f44 | Prototype Pollution in handlebars | The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source. | {'CVE-2021-23383'} | 2022-02-10T23:51:42Z | 2022-02-10T23:51:42Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://security.netapp.com/advisory/ntap-20210618-0007/', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://github.com/advisories/GHSA-765h-qjxv-5f44', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23383', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030', 'https://www.npmjs.com/package/handlebars'} | null | {'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'} | {'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'} |
GHSA | GHSA-m2jh-fxw4-gphm | HTTP Host Header Injection | ### Meta
* CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5)
### Problem
It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment.
This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability.
### Solution
Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
### Credits
Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015)
* [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0 | {'CVE-2021-41114'} | 2022-04-19T19:03:11Z | 2021-10-05T20:23:35Z | MODERATE | 4.8 | {'CWE-20', 'CWE-644'} | {'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm', 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114', 'https://github.com/advisories/GHSA-m2jh-fxw4-gphm', 'https://typo3.org/security/advisory/typo3-core-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941'} | null | {'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'} | {'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'} |
GHSA | GHSA-vvg4-vgrv-xfr7 | Incomplete validation in `tf.raw_ops.CTCLoss` | ### Impact
Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[10, 16, 0], dtype=tf.float32)
labels_indices = tf.constant([], shape=[8, 0], dtype=tf.int64)
labels_values = tf.constant([-100] * 8, shape=[8], dtype=tf.int32)
sequence_length = tf.constant([-100] * 16, shape=[16], dtype=tf.int32)
tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices,
labels_values=labels_values, sequence_length=sequence_length,
preprocess_collapse_repeated=True, ctc_merge_repeated=False,
ignore_longer_outputs_than_inputs=True)
```
An attacker can also trigger a heap buffer overflow:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[7, 2, 0], dtype=tf.float32)
labels_indices = tf.constant([-100, -100], shape=[2, 1], dtype=tf.int64)
labels_values = tf.constant([-100, -100], shape=[2], dtype=tf.int32)
sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32)
tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices,
labels_values=labels_values, sequence_length=sequence_length,
preprocess_collapse_repeated=False, ctc_merge_repeated=False,
ignore_longer_outputs_than_inputs=False)
```
Finally, an attacker can trigger a null pointer dereference:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[0, 2, 11], dtype=tf.float32)
labels_indices = tf.constant([], shape=[0, 2], dtype=tf.int64)
labels_values = tf.constant([], shape=[0], dtype=tf.int32)
sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32)
tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices,
labels_values=labels_values, sequence_length=sequence_length,
preprocess_collapse_repeated=False, ctc_merge_repeated=False,
ignore_longer_outputs_than_inputs=False)
```
### Patches
We have patched the issue in GitHub commit[14607c0707040d775e06b6817325640cb4b5864c](https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c) followed by GitHub commit [4504a081af71514bb1828048363e6540f797005b](https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29613'} | 2021-05-21T14:28:39Z | 2021-05-21T14:28:39Z | MODERATE | 6.3 | {'CWE-665'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29613', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7', 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/advisories/GHSA-vvg4-vgrv-xfr7', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'} | null | {'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c', 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b'} | {'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'} |
GHSA | GHSA-3374-7h99-xr85 | Cross-site scripting in forkcms | Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML. | {'CVE-2020-23049'} | 2021-10-29T13:52:24Z | 2021-10-25T19:43:05Z | MODERATE | 5.4 | {'CWE-79'} | {'https://www.vulnerability-lab.com/get_content.php?id=2208', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23049', 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6', 'https://github.com/advisories/GHSA-3374-7h99-xr85'} | null | {'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'} | {'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'} |
GHSA | GHSA-r7j3-vvh2-xrpj | OS Command Injection in MiniMagick | In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command. | {'CVE-2019-13574'} | 2021-05-10T21:50:50Z | 2019-07-18T13:19:22Z | HIGH | 7.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-r7j3-vvh2-xrpj', 'https://github.com/minimagick/minimagick/compare/d484786...293f9bb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13574', 'https://seclists.org/bugtraq/2019/Jul/20', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html', 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851', 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/', 'https://www.debian.org/security/2019/dsa-4481'} | null | {'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'} | {'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'} |
GHSA | GHSA-fphq-gw9m-ghrv | CHECK-fail in `CTCGreedyDecoder` | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`:
```python
import tensorflow as tf
inputs = tf.constant([], shape=[18, 2, 0], dtype=tf.float32)
sequence_length = tf.constant([-100, 17], shape=[2], dtype=tf.int32)
merge_repeated = False
tf.raw_ops.CTCGreedyDecoder(inputs=inputs, sequence_length=sequence_length, merge_repeated=merge_repeated)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks.
### Patches
We have patched the issue in GitHub commit [ea3b43e98c32c97b35d52b4c66f9107452ca8fb2](https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29543'} | 2021-05-21T14:23:18Z | 2021-05-21T14:23:18Z | LOW | 2.5 | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://github.com/advisories/GHSA-fphq-gw9m-ghrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29543'} | null | {'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'} | {'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'} |
GHSA | GHSA-7qx4-pp76-vrqh | Remote code execution in Apache Commons Configuration | Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application. | {'CVE-2020-1953'} | 2021-07-28T18:49:54Z | 2020-05-21T19:08:08Z | CRITICAL | 10 | {'CWE-20'} | {'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r16a2e949e35780c8974cf66104e812410f3904f752df6b66bf292269@%3Ccommits.servicecomb.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1953', 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-7qx4-pp76-vrqh'} | null | {'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'} | {'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'} |
GHSA | GHSA-x68c-4gmm-5g43 | kimai2 is vulnerable to Cross-site Scripting | kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3985'} | 2021-12-03T20:40:38Z | 2021-12-03T20:40:38Z | HIGH | 8 | {'CWE-79'} | {'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5', 'https://github.com/advisories/GHSA-x68c-4gmm-5g43'} | null | {'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'} | {'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'} |
GHSA | GHSA-5rcr-q3rx-j7vr | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106. | {'CVE-2019-1107'} | 2021-03-29T21:03:41Z | 2021-03-29T20:57:35Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-5rcr-q3rx-j7vr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} |
GHSA | GHSA-qh73-qc3p-rjv2 | Uncaught Exception in fastify-multipart | ### Impact
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).
By providing a `name=constructor` property it is still possible to crash the application.
The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116).
All users are recommended to upgrade
### Patches
v5.3.1 includes a patch
### Workarounds
No workarounds are possible.
### References
Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/fastify/fastify-multipart](https://github.com/fastify/fastify-multipart)
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
| {'CVE-2021-23597'} | 2022-04-19T19:03:23Z | 2022-02-11T18:57:53Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/fastify/fastify-multipart/pull/116', 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2', 'https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/', 'https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23597', 'https://github.com/advisories/GHSA-qh73-qc3p-rjv2', 'https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480', 'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'} | null | {'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'} | {'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'} |
GHSA | GHSA-x67x-vg9m-65c3 | Integer overflow in base64 | Affected versions of this crate suffered from an integer overflow bug when
calculating the size of a buffer to use when encoding base64 using the
`encode_config_buf` and `encode_config` functions. If the input string
was large, this would cause a buffer to be allocated that was too small.
Since this function writes to the buffer using unsafe code, it would
allow an attacker to write beyond the buffer, causing memory corruption
and possibly the execution of arbitrary code.
This flaw was corrected by using checked arithmetic to calculate
the size of the buffer.
| {'CVE-2017-1000430'} | 2021-08-25T20:55:27Z | 2021-08-25T20:55:27Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000430', 'https://rustsec.org/advisories/RUSTSEC-2017-0004', 'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319', 'https://github.com/advisories/GHSA-x67x-vg9m-65c3'} | null | {'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319'} | {'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319'} |
GHSA | GHSA-27wq-qx3q-fxm9 | Improper Handling of Unexpected Data Type in ced | ### Impact
In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash.
### Patches
The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes.
### Workarounds
Before passing an argument to ced, verify it’s a `Buffer` using [`Buffer.isBuffer(obj)`](https://nodejs.org/api/buffer.html#buffer_static_method_buffer_isbuffer_obj).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since ced is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to ced. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const bodyParser = require("body-parser");
const ced = require("ced");
const app = express();
app.use(bodyParser.raw());
app.post("/", (req, res) => {
const encoding = ced(req.body);
res.end(encoding);
});
app.listen(3000);
```
`curl --request POST --header "Content-Type: text/plain" --data foo http://localhost:3000` crashes the server.
### References
- https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3 | {'CVE-2021-39131'} | 2022-04-19T19:03:05Z | 2021-08-23T19:42:28Z | HIGH | 7.5 | {'CWE-241'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39131', 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9', 'https://github.com/advisories/GHSA-27wq-qx3q-fxm9', 'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3', 'https://github.com/sonicdoe/ced/releases/tag/v1.0.0'} | null | {'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'} | {'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'} |
GHSA | GHSA-hwqm-x785-qh8p | Incorrect Permission Assignment for Critical Resource in Hashicorp Consul | HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4. | {'CVE-2020-12797'} | 2021-06-23T17:52:33Z | 2021-06-23T17:52:33Z | MODERATE | 3.7 | {'CWE-732'} | {'https://github.com/advisories/GHSA-hwqm-x785-qh8p', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12797', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7', 'https://github.com/hashicorp/consul/issues/5606', 'https://github.com/hashicorp/consul/pull/8047', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'} | null | {'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7'} | {'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7'} |
GHSA | GHSA-x7p2-x2j6-mwhr | Moderate severity vulnerability that affects gemirro | Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file. | {'CVE-2017-16833'} | 2021-09-21T22:16:07Z | 2017-11-29T23:19:51Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16833', 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de', 'https://github.com/advisories/GHSA-x7p2-x2j6-mwhr'} | null | {'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'} | {'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'} |
GHSA | GHSA-rwxp-hwwf-653v | Insecure template handling in express-hbs | express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability. | {'CVE-2021-32817'} | 2021-05-17T20:58:51Z | 2021-05-17T20:58:51Z | MODERATE | 5.4 | {'CWE-200'} | {'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e', 'https://www.npmjs.com/package/express-hbs', 'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/', 'https://github.com/advisories/GHSA-rwxp-hwwf-653v', 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32817'} | null | {'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'} | {'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'} |
GHSA | GHSA-8v9x-9xqg-r8mr | Prototype pollution in json8-merge-patch | Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor. | {'CVE-2020-8268'} | 2021-05-10T19:17:15Z | 2021-05-10T19:17:15Z | HIGH | 7.5 | {'CWE-20', 'CWE-471', 'CWE-1321'} | {'https://hackerone.com/reports/980649', 'https://www.npmjs.com/package/json8-merge-patch', 'https://github.com/advisories/GHSA-8v9x-9xqg-r8mr', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268', 'https://github.com/sonnyp/JSON8/issues/113'} | null | {'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'} | {'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'} |
GHSA | GHSA-3w8g-xr3f-2mp8 | Out of bounds write in nalgebra | The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector.
This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`. | {'CVE-2021-38190'} | 2021-08-25T20:55:49Z | 2021-08-25T20:55:49Z | CRITICAL | 9.8 | {'CWE-119', 'CWE-787'} | {'https://github.com/advisories/GHSA-3w8g-xr3f-2mp8', 'https://github.com/dimforge/nalgebra/issues/883', 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38190', 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5', 'https://github.com/dimforge/nalgebra/pull/889', 'https://rustsec.org/advisories/RUSTSEC-2021-0070.html'} | null | {'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'} | {'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'} |
GHSA | GHSA-4ph2-8337-hm62 | Key Caching behavior in the DynamoDB Encryption Client. | ### Impact
This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified.
When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider.
### Patches
Fixed as of 1.3.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`.
### Workarounds
Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider. | null | 2021-02-08T17:43:49Z | 2021-02-08T17:43:49Z | LOW | 0 | {'CWE-862'} | {'https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62', 'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b', 'https://pypi.org/project/dynamodb-encryption-sdk', 'https://github.com/aws/aws-dynamodb-encryption-python/blob/master/CHANGELOG.rst#130----2021-02-04', 'https://github.com/advisories/GHSA-4ph2-8337-hm62'} | null | {'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b'} | {'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b'} |
GHSA | GHSA-h7vq-5qgw-jwwq | CSV Injection Vulnerability | ### Impact
In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel.
If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update.
### Patches
This has been patched in Craft 3.7.14.
### References
* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28
* https://twitter.com/craftcmsupdates/status/1442928690145366018
### For more information
If you have any questions or comments about this advisory, email us at support@craftcms.com
----------
Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli | {'CVE-2021-41824'} | 2021-10-18T19:11:02Z | 2021-10-18T19:04:16Z | HIGH | 8.8 | {'CWE-1236'} | {'https://github.com/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2', 'https://twitter.com/craftcmsupdates/status/1442928690145366018'} | null | {'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'} | {'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'} |
GHSA | GHSA-9mqp-7v2h-2382 | Denial of Service in Tensorflow | ### Impact
The `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L235-L241
Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations.
### Patches
We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-63xm-rx5p-xvqr](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr) | {'CVE-2020-15194'} | 2021-08-26T15:10:19Z | 2020-09-25T18:28:19Z | MODERATE | 5.3 | {'CWE-20', 'CWE-617'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-9mqp-7v2h-2382', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15194', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'} |
GHSA | GHSA-55x5-fj6c-h6m8 | HTML Cleaner allows crafted and SVG embedded scripts to pass through | ### Impact
The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs.
Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5.
### Patches
The issue has been resolved in lxml 4.6.5.
### Workarounds
None.
### References
The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038.
| {'CVE-2021-43818'} | 2022-04-22T15:39:59Z | 2021-12-13T18:14:36Z | HIGH | 8.2 | {'CWE-74', 'CWE-79'} | {'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/', 'https://github.com/advisories/GHSA-55x5-fj6c-h6m8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/', 'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8', 'https://security.netapp.com/advisory/ntap-20220107-0005/', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://www.debian.org/security/2022/dsa-5043'} | null | {'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'} | {'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'} |
GHSA | GHSA-cpq8-x35g-m439 | Cross-site Scripting in yourls | yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling. | {'CVE-2021-3783'} | 2021-09-20T20:43:15Z | 2021-09-20T20:43:15Z | MODERATE | 6.6 | {'CWE-79'} | {'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984', 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4', 'https://github.com/advisories/GHSA-cpq8-x35g-m439', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783'} | null | {'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'} | {'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'} |
GHSA | GHSA-w3wf-cfx3-6gcx | SAML authentication vulnerability due to stdlib XML parsing | ### Impact
Due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP.
Users that configure Fleet with SSO login may be vulnerable to this issue.
### Patches
This issue is patched in 3.5.1 using https://github.com/mattermost/xml-roundtrip-validator.
### Workarounds
If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.
### References
See https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ for more information about the underlying vulnerabilities.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@fleetdm.com](mailto:security@fleetdm.com)
* Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw) | {'CVE-2020-26276'} | 2022-02-11T23:59:21Z | 2022-02-11T23:59:14Z | HIGH | 0 | {'CWE-290'} | {'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607', 'https://github.com/mattermost/xml-roundtrip-validator', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-w3wf-cfx3-6gcx', 'https://github.com/fleetdm/fleet/blob/master/CHANGELOG.md#fleet-351-dec-14-2020', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26276', 'https://github.com/advisories/GHSA-w3wf-cfx3-6gcx'} | null | {'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607'} | {'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607'} |
GHSA | GHSA-w4pj-7p68-3vgv | Stored XSS in October | ### Impact
A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field.
### Patches
Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission.
### Workarounds
Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin).
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png"> | {'CVE-2020-11083'} | 2022-04-19T19:02:27Z | 2020-08-05T14:52:44Z | LOW | 3.5 | {'CWE-79'} | {'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/advisories/GHSA-w4pj-7p68-3vgv', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'http://seclists.org/fulldisclosure/2020/Aug/2'} | null | {'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94'} | {'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'} |
GHSA | GHSA-7vmw-7x57-q6jw | Cross-site scripting | Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. | {'CVE-2021-32713'} | 2021-09-08T18:00:00Z | 2021-09-08T18:00:00Z | MODERATE | 4.8 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32713', 'https://github.com/advisories/GHSA-7vmw-7x57-q6jw', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'} | null | {'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'} | {'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'} |
GHSA | GHSA-6hpv-v2rx-c5g6 | FPE in convolutions with zero size filters | ### Impact
The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments.
### Patches
We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41209'} | 2021-11-10T19:02:17Z | 2021-11-10T19:02:17Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-6hpv-v2rx-c5g6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41209'} | null | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} |
GHSA | GHSA-whgm-jr23-g3j9 | Uncontrolled Resource Consumption in ansi-html | This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time. | {'CVE-2021-23424'} | 2022-04-19T19:03:26Z | 2021-09-02T17:15:24Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69', 'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849', 'https://github.com/advisories/GHSA-whgm-jr23-g3j9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424'} | null | {'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'} | {'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'} |
GHSA | GHSA-8m9g-647g-5pxw | Infinite loop in Yubico yubihsm-connector | An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing any further operations until the yubihsm-connector is restarted. An attacker can send 0, 1, or 2 bytes to trigger this. | {'CVE-2021-28484'} | 2022-04-12T22:00:38Z | 2022-02-15T01:57:18Z | HIGH | 5.4 | {'CWE-835'} | {'https://github.com/Yubico/yubihsm-connector/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28484', 'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed', 'https://www.yubico.com/support/security-advisories/ysa-2021-02/', 'https://github.com/advisories/GHSA-8m9g-647g-5pxw'} | null | {'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed'} | {'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed'} |
GHSA | GHSA-j7rm-8ww4-xx2g | Division by zero in TFLite's implementation of `SpaceToDepth` | ### Impact
The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67).
```cc
const int block_size = params->block_size;
const int input_height = input->dims->data[1];
const int input_width = input->dims->data[2];
int output_height = input_height / block_size;
int output_width = input_width / block_size;
```
An attacker can craft a model such that `params->block_size` would be zero.
### Patches
We have patched the issue in GitHub commit [0d45ea1ca641b21b73bcf9c00e0179cda284e7e7](https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29587'} | 2021-05-21T14:26:45Z | 2021-05-21T14:26:45Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-j7rm-8ww4-xx2g', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587', 'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} | null | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} | {'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'} |
GHSA | GHSA-9gwx-9cwp-5c2m | Billion laughs attack (XML bomb) | ### Impact
Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request.
Consider an XML file (`createMediaPackage.xml`) like this:
```xml
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!DOCTYPE lolz [
<!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. ">
<!ELEMENT title (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
<!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">
<!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;">
<!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;">
]>
<mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z">
<title>&lol5;</title>
<media/>
<metadata/>
<attachments/>
<publications/>
</mediapackage>
```
Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory:
```sh
curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \
-F 'mediapackage=<createMediaPackage.xml' \
-F sourceFlavors="" \
-F sourceTags="" \
-F deleteExternal="" \
-F tagsAndFlavor='' \
-o out.xml
```
Additional notes:
- You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text.
- Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system.
- To exploit this, users need to have ingest privileges, limiting the group of potential attackers
### Patches
The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch.
### Workarounds
There is no known workaround for this issue.
### References
- [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack)
- For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
- Email us at [security@opencast.org](mailto:security@opencast.org) | {'CVE-2021-32623'} | 2022-04-19T19:02:58Z | 2021-06-17T20:11:35Z | HIGH | 8.1 | {'CWE-776'} | {'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623', 'https://github.com/advisories/GHSA-9gwx-9cwp-5c2m'} | null | {'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'} | {'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'} |
GHSA | GHSA-m553-9wmx-533h | Cross-site scripting in Dolibarr | In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS. | {'CVE-2019-16197'} | 2021-08-18T19:24:27Z | 2019-11-08T20:05:31Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964', 'https://github.com/advisories/GHSA-m553-9wmx-533h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html'} | null | {'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'} | {'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'} |
GHSA | GHSA-2v2v-fx7r-f2fh | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4082'} | 2021-12-16T14:28:10Z | 2021-12-16T14:28:10Z | MODERATE | 4.3 | {'CWE-352'} | {'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/advisories/GHSA-2v2v-fx7r-f2fh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'} | null | {'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'} | {'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'} |
GHSA | GHSA-xgx2-332h-9x6q | SQL Injection in Yeswiki | An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0. | {'CVE-2021-43091'} | 2022-04-05T20:54:58Z | 2022-03-26T00:00:32Z | HIGH | 7.5 | {'CWE-89'} | {'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://github.com/advisories/GHSA-xgx2-332h-9x6q', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/'} | null | {'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'} | {'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'} |
GHSA | GHSA-689x-x68p-fph3 | Cross-site Scripting in vditor | Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13. | {'CVE-2022-0350'} | 2022-04-12T21:57:07Z | 2022-04-01T00:00:41Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476', 'https://github.com/advisories/GHSA-689x-x68p-fph3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c'} | null | {'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'} | {'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'} |
GHSA | GHSA-73qw-ww62-m54x | Critical severity vulnerability that affects colorscore | The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable. | {'CVE-2015-7541'} | 2021-09-02T19:21:06Z | 2017-10-24T18:33:36Z | CRITICAL | 10 | {'CWE-77'} | {'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718', 'http://rubysec.com/advisories/CVE-2015-7541/', 'https://github.com/advisories/GHSA-73qw-ww62-m54x', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541', 'http://www.openwall.com/lists/oss-security/2016/01/05/2'} | null | {'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'} | {'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'} |
GHSA | GHSA-hm3x-jwwf-jpr9 | Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates | An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1. | {'CVE-2021-4180'} | 2022-04-05T20:53:00Z | 2022-03-24T00:00:17Z | MODERATE | 4.3 | {'CWE-200'} | {'https://bugs.launchpad.net/tripleo/+bug/1955397', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180', 'https://github.com/advisories/GHSA-hm3x-jwwf-jpr9', 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793'} | null | {'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'} | {'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'} |
GHSA | GHSA-j87c-cj65-vmh5 | High severity vulnerability that affects rendertron | Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. | {'CVE-2017-18354'} | 2021-09-14T19:19:11Z | 2019-01-04T17:41:51Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'} | null | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} |
GHSA | GHSA-vx5c-87qx-cv6c | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution.
## Recommendation
Update to version 3.17.0 or later. | {'CVE-2017-1001002'} | 2021-06-10T20:06:13Z | 2017-12-18T22:27:45Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/552', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'} | null | {'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'} | {'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'} |
GHSA | GHSA-xw5p-hw6r-2j98 | Denial of service in fastify | A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas. | {'CVE-2020-8192'} | 2021-01-07T23:42:12Z | 2020-08-05T14:53:22Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e', 'https://hackerone.com/reports/903521', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192', 'https://github.com/advisories/GHSA-xw5p-hw6r-2j98'} | null | {'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'} | {'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'} |
GHSA | GHSA-hrmm-f4j8-8vxc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0922'} | 2021-03-29T21:00:11Z | 2021-03-29T21:00:11Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-hrmm-f4j8-8vxc', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'} |
GHSA | GHSA-m3fm-h5jp-q79p | Authorization bypass in Openshift | Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed. | {'CVE-2016-1906'} | 2021-12-20T16:58:14Z | 2021-12-20T16:58:14Z | CRITICAL | 9.8 | {'CWE-285'} | {'https://access.redhat.com/errata/RHSA-2016:0351', 'https://github.com/openshift/origin/issues/6556', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1906', 'https://github.com/advisories/GHSA-m3fm-h5jp-q79p', 'https://access.redhat.com/errata/RHSA-2016:0070', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1906', 'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406', 'https://github.com/openshift/origin/pull/6576'} | null | {'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406'} | {'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406'} |
GHSA | GHSA-2cfc-865j-gm4w | XML External Entity Reference in detekt | Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0. | {'CVE-2022-0272'} | 2022-04-26T13:03:17Z | 2022-04-22T00:00:36Z | HIGH | 7.3 | {'CWE-611'} | {'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44', 'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://github.com/advisories/GHSA-2cfc-865j-gm4w'} | null | {'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'} | {'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'} |
GHSA | GHSA-m539-j985-hcr8 | Crash in `max_pool3d` when size argument is 0 or negative | ### Impact
The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative:
```python
import tensorflow as tf
pool_size = [2, 2, 0]
layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size)
input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32)
res = layer(input_tensor)
```
This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive.
### Patches
We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936).
| {'CVE-2021-41196'} | 2021-11-10T19:36:21Z | 2021-11-10T19:36:21Z | MODERATE | 5.5 | {'CWE-191'} | {'https://github.com/advisories/GHSA-m539-j985-hcr8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41196'} | null | {'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'} | {'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'} |
GHSA | GHSA-rqjh-jp2r-59cj | nltk is vulnerable to Inefficient Regular Expression Complexity | nltk is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3842'} | 2022-01-06T22:24:14Z | 2022-01-06T22:24:14Z | HIGH | 7.5 | {'CWE-1333'} | {'https://github.com/advisories/GHSA-rqjh-jp2r-59cj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3842', 'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d', 'https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a'} | null | {'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d'} | {'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d'} |
GHSA | GHSA-r587-7jh2-4qr3 | Server secret was included in static assets and served to clients | ### Impact
Server JWT signing secret was included in static assets and served to clients.
This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**.
### Background
Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`.
Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood.
### Patches
Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components.
Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend).
### Workarounds
Users shall upgrade if they use Flood's builtin authentication system.
While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments.
> Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication.
Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions.
### References
[Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions)
[Introduction to JSON Web Tokens](https://jwt.io/introduction/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [issue tracker](https://github.com/jesec/flood/issues)
* Email us at [jc@linux.com](mailto:jc@linux.com) | null | 2022-04-19T19:02:33Z | 2020-08-26T19:32:50Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'} | null | {'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'} | {'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'} |
GHSA | GHSA-652h-xwhf-q4h6 | OS Command Injection in ssh2 | ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0. | {'CVE-2020-26301'} | 2021-09-21T16:50:46Z | 2021-09-21T16:50:46Z | HIGH | 7.5 | {'CWE-78'} | {'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/', 'https://www.npmjs.com/package/ssh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21', 'https://github.com/advisories/GHSA-652h-xwhf-q4h6'} | null | {'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'} | {'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'} |
GHSA | GHSA-6jmm-mp6w-4rrg | OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser | ### Impact
NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/HtmlUnit/htmlunit-neko](https://github.com/HtmlUnit/htmlunit-neko)
* Email us at [rbri at rbri.de]
| {'CVE-2022-29546'} | 2022-05-02T19:49:44Z | 2022-04-26T21:14:57Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/advisories/GHSA-6jmm-mp6w-4rrg', 'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg'} | null | {'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'} | {'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.