ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-3c5c-7235-994j
Moderate severity vulnerability that affects Pillow
Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
{'CVE-2016-2533'}
2021-08-31T20:56:21Z
2018-07-24T20:15:13Z
MODERATE
6.5
{'CWE-119'}
{'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/advisories/GHSA-3c5c-7235-994j', 'https://github.com/python-pillow/Pillow/pull/1706', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'http://www.openwall.com/lists/oss-security/2016/02/02/5', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2533', 'http://www.debian.org/security/2016/dsa-3499', 'http://www.openwall.com/lists/oss-security/2016/02/22/2'}
null
{'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b'}
{'https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b', 'https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b'}
GHSA
GHSA-p4x4-rw2p-8j8m
Cross-site Scripting in Sanitize
When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: - `iframe` - `math` - `noembed` - `noframes` - `noscript` - `plaintext` - `script` - `style` - `svg` - `xmp` ### Impact Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. ### Releases This problem has been fixed in Sanitize 5.2.1. ### Workarounds If upgrading is not possible, a workaround is to override the default value of Sanitize's `:remove_contents` config option with the following value, which ensures that the contents of `math` and `svg` elements (among others) are removed entirely when those elements are not in the allowlist: ```ruby %w[iframe math noembed noframes noscript plaintext script style svg xmp] ``` For example, if you currently use Sanitize's relaxed config, you can create a custom config object that overrides the default value of `:remove_contents` like this: ```ruby custom_config = Sanitize::Config.merge( Sanitize::Config::RELAXED, :remove_contents => %w[iframe math noembed noframes noscript plaintext script style svg xmp] ) ``` You would then pass this custom config to Sanitize when sanitizing HTML. ### For more information If you have any questions or comments about this advisory: - Open an issue in the [Sanitize repo](https://github.com/rgrove/sanitize). - See Sanitize's [security policy](https://github.com/rgrove/sanitize/security/policy). ### Credits Many thanks to Michal Bentkowski of Securitum for reporting this bug and helping to verify the fix. ### References - [GHSA-p4x4-rw2p-8j8m](https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m) - [CVE-2020-4054](https://nvd.nist.gov/vuln/detail/CVE-2020-4054) - https://github.com/rgrove/sanitize/releases/tag/v5.2.1
{'CVE-2020-4054'}
2021-01-08T17:08:41Z
2020-06-16T22:08:06Z
HIGH
7.3
{'CWE-79'}
{'https://usn.ubuntu.com/4543-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054', 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m', 'https://github.com/advisories/GHSA-p4x4-rw2p-8j8m', 'https://www.debian.org/security/2020/dsa-4730', 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9', 'https://github.com/rgrove/sanitize/releases/tag/v5.2.1'}
null
{'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9'}
{'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9'}
GHSA
GHSA-xg6r-5gx4-qxjm
invoiceninja is vulnerable to Cross-site Scripting
invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3977'}
2022-01-06T21:58:34Z
2022-01-06T21:58:34Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35', 'https://github.com/advisories/GHSA-xg6r-5gx4-qxjm'}
null
{'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'}
{'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'}
GHSA
GHSA-5q6m-3h65-w53x
Improper Neutralization of Special Elements used in an OS Command.
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
{'CVE-2021-24033'}
2021-03-11T22:26:09Z
2021-03-11T22:26:09Z
MODERATE
0
{'CWE-78'}
{'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://github.com/advisories/GHSA-5q6m-3h65-w53x', 'https://github.com/facebook/create-react-app/pull/10644', 'https://www.facebook.com/security/advisories/cve-2021-24033'}
null
{'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}
{'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}
GHSA
GHSA-rprj-g6xc-p5gq
Moderate severity vulnerability that affects wicked
Directory traversal vulnerability in controller/concerns/render_redirect.rb in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary files via a %2E%2E%2F (encoded dot dot slash) in the step.
{'CVE-2013-4413'}
2021-09-17T19:24:02Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-22'}
{'http://seclists.org/oss-sec/2013/q4/43', 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq', 'http://www.securityfocus.com/bid/62891', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413', 'http://secunia.com/advisories/55151', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783', 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'}
null
{'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'}
{'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'}
GHSA
GHSA-v5rv-hpxg-8x49
Signature validation bypass in ServiceStack
ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.
{'CVE-2020-28042'}
2021-01-13T19:13:11Z
2021-01-13T19:13:11Z
MODERATE
0
{'CWE-347'}
{'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/', 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://www.nuget.org/packages/ServiceStack/', 'https://github.com/advisories/GHSA-v5rv-hpxg-8x49', 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519'}
null
{'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'}
{'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'}
GHSA
GHSA-rmp7-f2vp-3rq4
Cross-site scripting in SiCKRAGE
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
{'CVE-2021-25925'}
2021-04-23T19:28:53Z
2021-04-20T16:31:54Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925', 'https://github.com/advisories/GHSA-rmp7-f2vp-3rq4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'}
null
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}
GHSA
GHSA-7xj5-fwqr-5378
Cross-site Scripting in craftcms/cms
Craft CMS before 3.7.29 allows cross-site scripting.
{'CVE-2022-28378'}
2022-04-18T22:20:40Z
2022-04-04T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-7xj5-fwqr-5378', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'}
null
{'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'}
{'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'}
GHSA
GHSA-mw75-qvfr-hpmr
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0938'}
2022-03-23T15:39:32Z
2022-03-15T00:01:01Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938', 'https://github.com/advisories/GHSA-mw75-qvfr-hpmr'}
null
{'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}
{'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}
GHSA
GHSA-v2p6-4mp7-3r9v
Regular Expression Denial of Service in underscore.string
Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS). The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs. ## Recommendation Upgrade to version 3.3.5 or higher.
null
2021-08-16T23:29:45Z
2019-06-14T16:26:22Z
MODERATE
0
{'CWE-400'}
{'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/pull/517', 'https://www.npmjs.com/advisories/745', 'https://github.com/epeli/underscore.string/issues/510', 'https://github.com/advisories/GHSA-v2p6-4mp7-3r9v'}
null
{'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'}
{'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'}
GHSA
GHSA-3p9j-442x-hjp7
Business Logic Errors in microweber
microweber prior to 1.2.11 allows multiple uses of a single-use coupon.
{'CVE-2022-0689'}
2022-02-26T01:15:36Z
2022-02-20T00:00:31Z
MODERATE
5.3
null
{'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689', 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04', 'https://github.com/advisories/GHSA-3p9j-442x-hjp7'}
null
{'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}
{'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}
GHSA
GHSA-6pc9-xqrg-wfqw
Exposure of Sensitive information in httpie
httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0.
{'CVE-2022-0430'}
2022-04-05T18:50:32Z
2022-03-16T00:00:47Z
LOW
2.4
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0430', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b', 'https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f', 'https://github.com/advisories/GHSA-6pc9-xqrg-wfqw', 'https://github.com/pypa/advisory-database/tree/main/vulns/httpie/PYSEC-2022-167.yaml'}
null
{'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}
{'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}
GHSA
GHSA-qphc-hf5q-v8fc
Open Redirect in actionpack
Specially crafted "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this: ``` config.hosts << '.EXAMPLE.com' ``` When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website. This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942. Releases -------- The fixed releases are available at the normal locations. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series * 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series * 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
{'CVE-2021-44528'}
2022-04-27T22:24:24Z
2021-12-14T21:19:08Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528', 'https://github.com/advisories/GHSA-qphc-hf5q-v8fc', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer', 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml'}
null
{'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'}
{'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'}
GHSA
GHSA-3qxp-qjq7-w4hf
CHECK-fail in tf.raw_ops.EncodePng
### Impact An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data: ```python import tensorflow as tf image = tf.zeros([0, 0, 3]) image = tf.cast(image, dtype=tf.uint8) tf.raw_ops.EncodePng(image=image) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when [calling `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat<T>().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the [first line of `png::WriteImageToBuffer`](https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349). ```cc template <typename T> bool WriteImageToBuffer( const void* image, int width, int height, int row_bytes, int num_channels, int channel_bits, int compression, T* png_string, const std::vector<std::pair<std::string, std::string> >* metadata) { CHECK_NOTNULL(image); ... } ``` Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack. ### Patches We have patched the issue in GitHub commit [26eb323554ffccd173e8a79a8c05c15b685ae4d1](https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29531'}
2021-05-21T14:22:13Z
2021-05-21T14:22:13Z
LOW
2.5
{'CWE-754'}
{'https://github.com/advisories/GHSA-3qxp-qjq7-w4hf', 'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3qxp-qjq7-w4hf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29531'}
null
{'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1'}
{'https://github.com/tensorflow/tensorflow/commit/26eb323554ffccd173e8a79a8c05c15b685ae4d1'}
GHSA
GHSA-xwx6-vmj4-5rv8
Denial of service via deserialization attack in nifi
A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB.
{'CVE-2017-15703'}
2021-08-18T22:04:42Z
2019-10-25T19:42:50Z
MODERATE
5
{'CWE-502'}
{'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc', 'https://github.com/advisories/GHSA-xwx6-vmj4-5rv8'}
null
{'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'}
{'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'}
GHSA
GHSA-6g47-63mv-qpgh
Prototype Pollution in dotty
This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23624'}
2021-11-08T17:55:48Z
2021-11-08T17:55:48Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/advisories/GHSA-6g47-63mv-qpgh'}
null
{'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}
{'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}
GHSA
GHSA-2p6p-v69p-9mm9
XSS in login form
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
{'CVE-2019-13235'}
2021-08-18T22:26:43Z
2019-11-12T22:58:16Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://aetsu.github.io/OpenCms', 'https://github.com/advisories/GHSA-2p6p-v69p-9mm9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235'}
null
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
GHSA
GHSA-vpgw-ffh3-648h
Prototype Pollution in fullpage.js
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability. Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application.
{'CVE-2022-1295'}
2022-04-22T20:20:56Z
2022-04-12T00:00:38Z
HIGH
7.3
{'CWE-1321'}
{'https://github.com/advisories/GHSA-vpgw-ffh3-648h', 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
null
{'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
{'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
GHSA
GHSA-xpmx-h7xq-xffh
Potential access control security issue in apollo-adminservice
### Impact If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations. ### Patches Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1). ### Workarounds To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet. ### Credits [Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it. ### References [Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3) ### For more information If you have any questions or comments about this advisory: * Open an [issue](https://github.com/ctripcorp/apollo/issues) * Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors)
{'CVE-2020-15170'}
2022-04-19T19:02:34Z
2020-10-02T16:33:41Z
HIGH
7
{'CWE-20'}
{'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/advisories/GHSA-xpmx-h7xq-xffh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh'}
null
{'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'}
{'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'}
GHSA
GHSA-r5hc-9xx5-97rw
Moderate severity vulnerability that affects i18n
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
{'CVE-2013-4492'}
2021-09-17T14:34:46Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html', 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw', 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492', 'http://www.securityfocus.com/bid/64076', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://www.debian.org/security/2013/dsa-2830'}
null
{'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}
{'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}
GHSA
GHSA-j858-xp5v-f8xx
Remote code execution in Dragonfly
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
{'CVE-2021-33564'}
2021-06-11T13:19:25Z
2021-06-02T21:42:49Z
CRITICAL
9.8
{'CWE-88', 'CWE-94'}
{'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5', 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0', 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml', 'https://github.com/advisories/GHSA-j858-xp5v-f8xx', 'https://github.com/markevans/dragonfly/issues/513', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564', 'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/', 'https://github.com/mlr0p/CVE-2021-33564'}
null
{'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'}
{'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'}
GHSA
GHSA-q547-gmf8-8jr7
Signature Validation Bypass in goxmldsig
### Impact With a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. ### Patches A patch is available, all users of goxmldsig should upgrade to v1.1.0. ### For more information If you have any questions or comments about this advisory open an issue at https://github.com/russellhaering/goxmldsig
{'CVE-2020-15216'}
2022-04-19T19:02:35Z
2021-05-24T16:57:32Z
MODERATE
5.3
{'CWE-347'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBFD4M4PHBMBOCMSQ537NOU37QOVWP/', 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64', 'https://pkg.go.dev/github.com/russellhaering/goxmldsig?tab=overview', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15216', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUH33FPUXED3FHYL25BJOQPRKFGPOMS2/', 'https://github.com/advisories/GHSA-q547-gmf8-8jr7', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7'}
null
{'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'}
{'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'}
GHSA
GHSA-844m-cpr9-jcmh
Secure/signed cookies share secrets between sites in a multi-site application
### Impact This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. ### Patches The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.
{'CVE-2021-41263'}
2021-11-17T21:09:27Z
2021-11-15T17:54:01Z
MODERATE
6.2
{'CWE-200', 'CWE-565'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41263', 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh', 'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0', 'https://github.com/advisories/GHSA-844m-cpr9-jcmh'}
null
{'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'}
{'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'}
GHSA
GHSA-p8c3-7rj8-q963
ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign
### Impact Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as: - wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct) - prepending zeros with ASN.1 INTEGER value (ex. 0x00000123 even though 0x0123 is correct) - appending zeros to signature of ASN.1 TLV (ex. 0x3082....1fbc000000 even though 0x3082....1fbc, appending zeros are ignored.) This vulnerability was fixed by strict ASN.1 DER checking. Here is an assessment of this vulnerability: - If you are not use ECDSA signature validation, this vulnerability is not affected. - Not ASN.1 format signature like just concatenation of R and S value is not affected such as Bitcoin. - This vulnerability is affected to all ECC curve parameters. - Risk to accept a forged or crafted message to be signed is low. - Risk to raise memory corruption is low since jsrsasign uses BigInteger class. - ECDSA signatures semantically the same to valid one may be accepted as valid. There are many malleable variants. As discussed [here](https://crypto.stackexchange.com/questions/24862/ber-or-der-x9-62-for-ecdsa-signature), there is no standards like X9.62 which requires ASN.1 DER. So ASN.1 BER can be applied to ECDSA however most of implementations like OpenSSL do strict ASN.1 DER checking. ### Patches Users using ECDSA signature validation should upgrade to 8.0.19. ### Workarounds Do strict ASN.1 DER checking for ASN.1 encoded ECDSA signature value. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-14966 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966 https://vuldb.com/?id.157123 https://github.com/kjur/jsrsasign/issues/437 https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER https://www.itu.int/rec/T-REC-X.690
{'CVE-2020-14966'}
2021-10-06T22:01:37Z
2020-06-26T16:54:15Z
HIGH
7.5
{'CWE-347'}
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://github.com/kjur/jsrsasign/issues/437', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f', 'https://www.npmjs.com/package/jsrsasign', 'https://vuldb.com/?id.157123', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html', 'https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14966', 'https://kjur.github.io/jsrsasign/', 'https://github.com/advisories/GHSA-p8c3-7rj8-q963'}
null
{'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'}
{'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'}
GHSA
GHSA-r38r-qp28-2m63
Critical severity vulnerability that affects rope
base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to execute arbitrary code by leveraging an unsafe call to pickle.load.
{'CVE-2014-3539'}
2022-03-23T20:45:02Z
2018-07-26T16:08:49Z
CRITICAL
9.8
null
{'https://github.com/advisories/GHSA-r38r-qp28-2m63', 'http://www.openwall.com/lists/oss-security/2015/02/07/1', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3539', 'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb', 'https://bugzilla.redhat.com/show_bug.cgi?id=1116485'}
null
{'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'}
{'https://github.com/python-rope/rope/commit/b01da7aab5cd02129941d2a900e6e5e3b5f7d4fb'}
GHSA
GHSA-fcwc-p4fc-c5cc
Null pointer dereference in `MatrixDiagPartOp`
### Impact If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first: ```python import tensorflow as tf tf.raw_ops.MatrixDiagPartV2( input=tf.ones(2,dtype=tf.int32), k=tf.ones(2,dtype=tf.int32), padding_value=[]) ``` Although this example is given for `MatrixDiagPartV2`, all versions of the operation are affected. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L89) reads the first value from a tensor buffer without first checking that the tensor has values to read from. ### Patches We have patched the issue in GitHub commit [482da92095c4d48f8784b1f00dda4f81c28d2988](https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37643'}
2021-08-25T14:43:42Z
2021-08-25T14:43:42Z
HIGH
7.7
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37643', 'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988', 'https://github.com/advisories/GHSA-fcwc-p4fc-c5cc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fcwc-p4fc-c5cc'}
null
{'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'}
{'https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988'}
GHSA
GHSA-77gc-fj98-665h
Signature Validation Bypass
Go JOSE before 1.1.0 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated.
{'CVE-2016-9122'}
2021-05-18T19:15:09Z
2021-05-18T19:15:09Z
HIGH
7.5
{'CWE-284'}
{'https://hackerone.com/reports/169629', 'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6', 'https://github.com/advisories/GHSA-77gc-fj98-665h', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9122', 'https://github.com/square/go-jose/pull/111', 'http://www.openwall.com/lists/oss-security/2016/11/03/1'}
null
{'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'}
{'https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6'}
GHSA
GHSA-jh2g-xhqq-x4w9
Send/Sync bound needed on T for Send/Sync impl of RcuCell<T>
Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`. This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`. This can result in memory corruption caused by data races.
null
2021-08-25T21:00:07Z
2021-08-25T21:00:07Z
MODERATE
0
{'CWE-362'}
{'https://github.com/advisories/GHSA-jh2g-xhqq-x4w9', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://github.com/Xudong-Huang/rcu_cell/issues/3', 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}
null
{'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}
{'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}
GHSA
GHSA-gj26-g5qf-jrh7
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
{'CVE-2022-0589'}
2022-02-24T13:06:11Z
2022-02-16T00:01:51Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://github.com/advisories/GHSA-gj26-g5qf-jrh7', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589'}
null
{'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'}
{'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'}
GHSA
GHSA-ffhg-7mh4-33c4
Improper Verification of Cryptographic Signature in golang.org/x/crypto
golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client.
{'CVE-2020-9283'}
2022-01-04T19:50:38Z
2021-05-18T15:29:31Z
MODERATE
7.5
{'CWE-347'}
{'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236', 'http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9283', 'https://github.com/advisories/GHSA-ffhg-7mh4-33c4', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html', 'https://www.exploit-db.com/exploits/48121', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html', 'https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY'}
null
{'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'}
{'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'}
GHSA
GHSA-4jf5-jggp-g56j
Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty.
{'CVE-2020-28452'}
2022-01-06T20:23:05Z
2022-01-06T20:23:05Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/softwaremill/akka-http-session/issues/77', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://github.com/softwaremill/akka-http-session/pull/79', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046675', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452', 'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1', 'https://github.com/advisories/GHSA-4jf5-jggp-g56j'}
null
{'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'}
{'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'}
GHSA
GHSA-962m-m8jw-8wrr
Path Traversal in Zope
Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
{'CVE-2021-32633'}
2021-08-31T21:04:33Z
2021-06-15T16:10:49Z
HIGH
8.8
{'CWE-22'}
{'https://github.com/advisories/GHSA-962m-m8jw-8wrr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32633', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/', 'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'}
null
{'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'}
{'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'}
GHSA
GHSA-94qw-r73x-j7hg
Users with ROLE_COURSE_ADMIN can create new users in Opencast
### Impact Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example: ```bash # Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user. # We expect this to work. % curl -i -u admin:opencast 'https://example.opencast.org/user-utils/xy.json' -X PUT \ --data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D' HTTP/2 201 # Use the new user to create more new users. # We don't expüect a user with just role ROLE_COURSE_ADMIN to succeed. # But it does work % curl -i -u xy:f 'https://example.opencast.org/user-utils/ab.json' -X PUT \ --data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D' HTTP/2 201 ``` `ROLE_COURSE_ADMIN` is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation. ### Patches This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration. ### Workarounds You can fix this issue by removing all instances of `ROLE_COURSE_ADMIN` in your organization's security configuration (`etc/security/mh_default_org.xml` by default). ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5231'}
2021-10-20T18:03:32Z
2020-01-30T21:21:37Z
MODERATE
4.8
{'CWE-285'}
{'https://github.com/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231'}
null
{'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'}
{'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'}
GHSA
GHSA-vq36-27g6-p492
Out of bounds read in Tensorflow
### Impact TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production): ```cc if (node_t.type_id() != TFT_UNSET) { int ix = input_idx[i]; DCHECK(ix < node_t.args_size()) << "input " << i << " should have an output " << ix << " but instead only has " << node_t.args_size() << " outputs: " << node_t.DebugString(); input_types.emplace_back(node_t.args(ix)); // ... } ``` An attacker can control `input_idx` such that `ix` would be larger than the number of values in `node_t.args`. ### Patches We have patched the issue in GitHub commit [c99d98cd189839dcf51aee94e7437b54b31f8abd](https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd). The fix will be included in TensorFlow 2.8.0. This is the only affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23592'}
2022-03-28T19:30:23Z
2022-02-09T23:31:48Z
HIGH
8.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd', 'https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23592', 'https://github.com/advisories/GHSA-vq36-27g6-p492', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492'}
null
{'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'}
{'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'}
GHSA
GHSA-jh63-28gx-7p26
Command Injection in CasaOS
CasaOS before v0.2.7 was discovered to contain a command injection vulnerability via the component leave or join zerotier api.
{'CVE-2022-24193'}
2022-05-05T13:34:12Z
2022-03-11T00:02:17Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24193', 'https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/#more', 'https://github.com/IceWhaleTech/CasaOS/issues/84', 'https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/', 'https://github.com/advisories/GHSA-jh63-28gx-7p26'}
null
{'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06'}
{'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06'}
GHSA
GHSA-q2q7-5pp4-w6pg
Catastrophic backtracking in URL authority parser when passed URL containing many @ characters
### Impact When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. ### Patches The issue has been fixed in urllib3 v1.26.5. ### References - [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503) - [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/) - [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/) - [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5) ### For more information If you have any questions or comments about this advisory: * Ask in our [community Discord](https://discord.gg/urllib3) * Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
{'CVE-2021-33503'}
2022-04-19T19:02:58Z
2021-06-01T21:19:32Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33503', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.gentoo.org/glsa/202107-36', 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg', 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/', 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'}
null
{'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'}
{'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'}
GHSA
GHSA-cfjh-p3g4-3q2f
VBScript Content Injection in marked
Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set. ## Proof of Concept ( IE10 Compatibility Mode Only ) `[xss link](vbscript:alert(1&#41;)` will get a link `<a href="vbscript:alert(1)">xss link</a>` ## Recommendation Update to version 0.3.3 or later.
{'CVE-2015-1370'}
2021-09-09T17:02:03Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-79'}
{'https://github.com/markedjs/marked/issues/492', 'https://github.com/chjj/marked/issues/492', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370', 'https://www.npmjs.com/advisories/24/versions', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://www.npmjs.com/advisories/24', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://github.com/advisories/GHSA-cfjh-p3g4-3q2f', 'https://nodesecurity.io/advisories/marked_vbscript_injection'}
null
{'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'}
{'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba'}
GHSA
GHSA-pfj3-56hm-jwq5
Template injection in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. ### Patches The issue was patched and a new version released. Please upgrade to version 9.1.3. ### Workarounds There are no known workarounds up to this moment. ### References A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461) ### For more information If you have any questions or comments about this advisory: * Open an issue in [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)
{'CVE-2020-26238'}
2022-04-19T19:02:40Z
2020-11-24T23:48:38Z
CRITICAL
7.9
{'CWE-74'}
{'https://github.com/advisories/GHSA-pfj3-56hm-jwq5', 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d390ee0a02e45e5a5b4f931180b9a93@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/issues/461', 'https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26238', 'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e', 'https://lists.apache.org/thread.html/r855aead591697dc2e85faf66c99036e49f492431940b78d4e6d895b5@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r96937fc9c82f3201b59311c067e97bce71123944f93102169a95bf5c@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9ae9a9fb1c8e2bf95c676e7e4cd06aa04f0a3a8a9ec1a6b787afb00f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5'}
null
{'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'}
{'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'}
GHSA
GHSA-hf6f-jq25-8gq9
Remote Code Execution (RCE)
Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron.
{'CVE-2018-18926'}
2022-04-12T22:10:40Z
2022-02-15T01:57:18Z
CRITICAL
8.1
{'CWE-94'}
{'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df88468374162', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18926', 'https://github.com/go-gitea/gitea/issues/5140', 'https://github.com/go-gitea/gitea/pull/5177', 'https://github.com/advisories/GHSA-hf6f-jq25-8gq9'}
null
{'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df88468374162'}
{'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df88468374162'}
GHSA
GHSA-rhcw-wjcm-9h6g
Denial of service in Undertow
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.
{'CVE-2020-27782'}
2022-02-09T00:54:12Z
2022-02-09T00:54:12Z
HIGH
7.5
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1901304', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782', 'https://issues.redhat.com/browse/UNDERTOW-1813', 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90', 'https://github.com/advisories/GHSA-rhcw-wjcm-9h6g'}
null
{'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'}
{'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'}
GHSA
GHSA-7vvq-7r29-5vg3
Cross site scripting in three.js
# CVE has been withdrawn Versions of three.js prior to 0.137.0 load untrusted iframes and allow for attackers to inject arbitrary javascript into a users browser.
{'CVE-2022-0177'}
2022-01-28T21:29:42Z
2022-01-27T16:00:48Z
HIGH
7.1
{'CWE-79'}
{'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0177', 'https://github.com/mrdoob/three.js/pull/23245', 'https://huntr.dev/bounties/16901080-99b4-4fb5-8c5b-931bfbf33cba', 'https://github.com/advisories/GHSA-7vvq-7r29-5vg3'}
null
{'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d'}
{'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d'}
GHSA
GHSA-5fxv-xx5p-g2fv
Integer Overflow in microweber
Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters
{'CVE-2022-0968'}
2022-03-25T17:13:37Z
2022-03-16T00:00:46Z
HIGH
7.2
{'CWE-190'}
{'https://github.com/advisories/GHSA-5fxv-xx5p-g2fv', 'https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968', 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}
null
{'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}
{'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}
GHSA
GHSA-jxhc-q857-3j6g
Regular Expression Denial of Service in Addressable templates
### Impact Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. ### Patches The vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0. ### Workarounds The vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking. ### References - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS - https://cwe.mitre.org/data/definitions/1333.html - https://www.regular-expressions.info/catastrophic.html ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/sporkmonger/addressable/issues)
{'CVE-2021-32740'}
2021-08-30T22:21:21Z
2021-07-12T16:58:33Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g', 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYPVOOQU7UB277UUERJMCNQLRCXRCIQ5/', 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32740', 'https://github.com/advisories/GHSA-jxhc-q857-3j6g', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDFQM2NHNAZ3NNUQZEJTYECYZYXV4UDS/'}
null
{'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7', 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc'}
{'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc', 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7'}
GHSA
GHSA-5pm8-492c-92p5
Prototype Pollution in chartkick
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server. ## Recommendation Upgrade to version 3.2.0 or later.
{'CVE-2019-18841'}
2021-09-22T18:05:53Z
2019-12-02T18:04:11Z
HIGH
0
null
{'https://github.com/ankane/chartkick/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://rubygems.org/gems/chartkick/', 'https://github.com/ankane/chartkick.js/issues/117', 'https://github.com/advisories/GHSA-5pm8-492c-92p5', 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://chartkick.com', 'https://www.npmjs.com/advisories/1312'}
null
{'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'}
{'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'}
GHSA
GHSA-hxhm-96pp-2m43
Remote Code Execution in Angular Expressions
### Impact The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input. * If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). * If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. ### Patches Users should upgrade to version 1.0.1 of angular-expressions ### Workarounds A temporary workaround might be either to : * disable user-controlled input that will be fed into angular-expressions in your application OR * allow only following characters in the userControlledInput : ```js if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) { var result = expressions.compile(userControlledInput); } else { result = undefined; } ``` ### References [Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues) * [Email us](mailto:contact@javascript-ninja.fr) ### Credits The issue was reported by Maxime Nadeau from GoSecure, Inc.
{'CVE-2020-5219'}
2022-04-19T19:02:21Z
2020-01-24T15:27:25Z
HIGH
8.7
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5219', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667', 'https://github.com/advisories/GHSA-hxhm-96pp-2m43', 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-hxhm-96pp-2m43'}
null
{'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'}
{'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'}
GHSA
GHSA-96v6-hrwg-p378
Weak Password Requirements in Daybyday CRM
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.
{'CVE-2022-22110'}
2022-01-24T22:07:09Z
2022-01-08T00:31:51Z
HIGH
7.5
{'CWE-521'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22110', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://github.com/advisories/GHSA-96v6-hrwg-p378'}
null
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}
GHSA
GHSA-5gjm-fj42-x983
Cross-site Request Forgery (CSRF)
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
{'CVE-2018-1098'}
2022-04-12T22:10:13Z
2022-02-15T01:57:18Z
HIGH
8.8
{'CWE-352'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552714', 'https://github.com/advisories/GHSA-5gjm-fj42-x983', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1098', 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56', 'https://github.com/coreos/etcd/issues/9353'}
null
{'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}
{'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}
GHSA
GHSA-hwv5-w8gm-fq9f
Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request
### Impact #### Information Disclosure When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. #### File Write If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. ### Patches PR #12 fixes the issue. The PR has been merged into version 0.4.0 and 0.4.0 has been released and pushed to PyPI. Users are advised to upgrade immediately. ### Workarounds - Apache can apparently be configured to filter such malicious paths when reverse-proxying. - There are no other workarounds known. ### References - [Pull Request #12](https://github.com/horazont/xmpp-http-upload/pull/12)
{'CVE-2020-15239'}
2022-04-19T19:02:36Z
2020-10-06T18:21:02Z
LOW
3.5
{'CWE-22'}
{'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f', 'https://github.com/horazont/xmpp-http-upload/pull/12', 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75', 'https://github.com/advisories/GHSA-hwv5-w8gm-fq9f', 'https://pypi.org/project/xmpp-http-upload/#history', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15239'}
null
{'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'}
{'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'}
GHSA
GHSA-3mcp-9wr4-cjqf
Remote Code Execution (RCE) vulnerability in dropwizard-validation
Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. ### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended. ### Impact This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**. ### Patches The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions. ### Workarounds If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html). Example: ```java @SelfValidation public void validateFullName(ViolationCollector col) { if (fullName.contains("_")) { // Sanitize fullName variable by escaping relevant characters such as "$" col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName)); } } ``` See also: https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98 ### References * https://github.com/dropwizard/dropwizard/pull/3157 * https://github.com/dropwizard/dropwizard/pull/3160 * https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm * https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions * https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation ### For more information If you have any questions or comments about this advisory: * Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new) * Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev) ### Security contact If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy): https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability
{'CVE-2020-5245'}
2022-04-25T23:06:16Z
2020-02-24T17:27:27Z
HIGH
7.9
{'CWE-74'}
{'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/dropwizard/dropwizard/pull/3160', 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm', 'https://github.com/advisories/GHSA-3mcp-9wr4-cjqf', 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions', 'https://github.com/dropwizard/dropwizard/pull/3157'}
null
{'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'}
{'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'}
GHSA
GHSA-gh88-3pxp-6fm8
Infinite Loop in colors.js
The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to have been revoked in an attempt to prevent them from fixing the issue. Vulnerable Code js for (let i = 666; i < Infinity; i++;) { Alternative Remediation Suggested * Pin dependancy to 1.4.0
{'CVE-2021-23567'}
2022-01-21T23:39:50Z
2022-01-21T23:39:50Z
HIGH
7.5
{'CWE-835'}
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6%23diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/Marak/colors.js/issues/285', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://snyk.io/blog/open-source-maintainer-pulls-the-plug-on-npm-packages-colors-and-faker-now-what/', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906'}
null
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
GHSA
GHSA-7prf-vw4p-qr59
Prototype pollution in supermixer
Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
{'CVE-2020-24939'}
2021-12-10T19:03:07Z
2021-12-10T19:03:07Z
HIGH
7.5
{'CWE-1321', 'CWE-915'}
{'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3', 'https://hackerone.com/reports/959987', 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939', 'https://github.com/advisories/GHSA-7prf-vw4p-qr59', 'https://github.com/stampit-org/supermixer/issues/9'}
null
{'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}
{'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}
GHSA
GHSA-2cqg-q7jm-j35c
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3938'}
2021-11-17T21:13:27Z
2021-11-15T23:19:42Z
LOW
3.9
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3938', 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9', 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063', 'https://github.com/advisories/GHSA-2cqg-q7jm-j35c'}
null
{'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}
{'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}
GHSA
GHSA-24x4-6qmh-88qg
Use after free in `DecodePng` kernel
### Impact A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346): ```cc if (/* ... error conditions ... */) { png::CommonFreeDecode(&decode); OP_REQUIRES(context, false, errors::InvalidArgument("PNG size too large for int: ", decode.width, " by ", decode.height)); } ``` After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. ### Patches We have patched the issue in GitHub commit [e746adbfcfee15e9cfdb391ff746c765b99bdf9b](https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23584'}
2022-02-11T20:36:59Z
2022-02-09T23:57:42Z
HIGH
7.6
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23584', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346', 'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b', 'https://github.com/advisories/GHSA-24x4-6qmh-88qg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg'}
null
{'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'}
{'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'}
GHSA
GHSA-765h-qjxv-5f44
Prototype Pollution in handlebars
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
{'CVE-2021-23383'}
2022-02-10T23:51:42Z
2022-02-10T23:51:42Z
CRITICAL
9.8
{'CWE-1321'}
{'https://security.netapp.com/advisory/ntap-20210618-0007/', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://github.com/advisories/GHSA-765h-qjxv-5f44', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23383', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030', 'https://www.npmjs.com/package/handlebars'}
null
{'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}
{'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}
GHSA
GHSA-m2jh-fxw4-gphm
HTTP Host Header Injection
### Meta * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5) ### Problem It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment. This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability. ### Solution Update your instance to TYPO3 version 11.5.0 which addresses the problem described. ### Credits Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015) * [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0
{'CVE-2021-41114'}
2022-04-19T19:03:11Z
2021-10-05T20:23:35Z
MODERATE
4.8
{'CWE-20', 'CWE-644'}
{'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm', 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114', 'https://github.com/advisories/GHSA-m2jh-fxw4-gphm', 'https://typo3.org/security/advisory/typo3-core-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941'}
null
{'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'}
{'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'}
GHSA
GHSA-vvg4-vgrv-xfr7
Incomplete validation in `tf.raw_ops.CTCLoss`
### Impact Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap: ```python import tensorflow as tf inputs = tf.constant([], shape=[10, 16, 0], dtype=tf.float32) labels_indices = tf.constant([], shape=[8, 0], dtype=tf.int64) labels_values = tf.constant([-100] * 8, shape=[8], dtype=tf.int32) sequence_length = tf.constant([-100] * 16, shape=[16], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=True, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=True) ``` An attacker can also trigger a heap buffer overflow: ```python import tensorflow as tf inputs = tf.constant([], shape=[7, 2, 0], dtype=tf.float32) labels_indices = tf.constant([-100, -100], shape=[2, 1], dtype=tf.int64) labels_values = tf.constant([-100, -100], shape=[2], dtype=tf.int32) sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=False, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=False) ``` Finally, an attacker can trigger a null pointer dereference: ```python import tensorflow as tf inputs = tf.constant([], shape=[0, 2, 11], dtype=tf.float32) labels_indices = tf.constant([], shape=[0, 2], dtype=tf.int64) labels_values = tf.constant([], shape=[0], dtype=tf.int32) sequence_length = tf.constant([-100, -100], shape=[2], dtype=tf.int32) tf.raw_ops.CTCLoss(inputs=inputs, labels_indices=labels_indices, labels_values=labels_values, sequence_length=sequence_length, preprocess_collapse_repeated=False, ctc_merge_repeated=False, ignore_longer_outputs_than_inputs=False) ``` ### Patches We have patched the issue in GitHub commit[14607c0707040d775e06b6817325640cb4b5864c](https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c) followed by GitHub commit [4504a081af71514bb1828048363e6540f797005b](https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29613'}
2021-05-21T14:28:39Z
2021-05-21T14:28:39Z
MODERATE
6.3
{'CWE-665'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29613', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vvg4-vgrv-xfr7', 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/advisories/GHSA-vvg4-vgrv-xfr7', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'}
null
{'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c', 'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b'}
{'https://github.com/tensorflow/tensorflow/commit/4504a081af71514bb1828048363e6540f797005b', 'https://github.com/tensorflow/tensorflow/commit/14607c0707040d775e06b6817325640cb4b5864c'}
GHSA
GHSA-3374-7h99-xr85
Cross-site scripting in forkcms
Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.
{'CVE-2020-23049'}
2021-10-29T13:52:24Z
2021-10-25T19:43:05Z
MODERATE
5.4
{'CWE-79'}
{'https://www.vulnerability-lab.com/get_content.php?id=2208', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23049', 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6', 'https://github.com/advisories/GHSA-3374-7h99-xr85'}
null
{'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}
{'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}
GHSA
GHSA-r7j3-vvh2-xrpj
OS Command Injection in MiniMagick
In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
{'CVE-2019-13574'}
2021-05-10T21:50:50Z
2019-07-18T13:19:22Z
HIGH
7.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-r7j3-vvh2-xrpj', 'https://github.com/minimagick/minimagick/compare/d484786...293f9bb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13574', 'https://seclists.org/bugtraq/2019/Jul/20', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html', 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851', 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/', 'https://www.debian.org/security/2019/dsa-4481'}
null
{'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'}
{'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'}
GHSA
GHSA-fphq-gw9m-ghrv
CHECK-fail in `CTCGreedyDecoder`
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`: ```python import tensorflow as tf inputs = tf.constant([], shape=[18, 2, 0], dtype=tf.float32) sequence_length = tf.constant([-100, 17], shape=[2], dtype=tf.int32) merge_repeated = False tf.raw_ops.CTCGreedyDecoder(inputs=inputs, sequence_length=sequence_length, merge_repeated=merge_repeated) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CHECK_LT` inserted to validate some invariants. When this condition is false, the program aborts, instead of returning a valid error to the user. This abnormal termination can be weaponized in denial of service attacks. ### Patches We have patched the issue in GitHub commit [ea3b43e98c32c97b35d52b4c66f9107452ca8fb2](https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29543'}
2021-05-21T14:23:18Z
2021-05-21T14:23:18Z
LOW
2.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fphq-gw9m-ghrv', 'https://github.com/advisories/GHSA-fphq-gw9m-ghrv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29543'}
null
{'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'}
{'https://github.com/tensorflow/tensorflow/commit/ea3b43e98c32c97b35d52b4c66f9107452ca8fb2'}
GHSA
GHSA-7qx4-pp76-vrqh
Remote code execution in Apache Commons Configuration
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.
{'CVE-2020-1953'}
2021-07-28T18:49:54Z
2020-05-21T19:08:08Z
CRITICAL
10
{'CWE-20'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r16a2e949e35780c8974cf66104e812410f3904f752df6b66bf292269@%3Ccommits.servicecomb.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1953', 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-7qx4-pp76-vrqh'}
null
{'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'}
{'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'}
GHSA
GHSA-x68c-4gmm-5g43
kimai2 is vulnerable to Cross-site Scripting
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3985'}
2021-12-03T20:40:38Z
2021-12-03T20:40:38Z
HIGH
8
{'CWE-79'}
{'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3', 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5', 'https://github.com/advisories/GHSA-x68c-4gmm-5g43'}
null
{'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'}
{'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'}
GHSA
GHSA-5rcr-q3rx-j7vr
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106.
{'CVE-2019-1107'}
2021-03-29T21:03:41Z
2021-03-29T20:57:35Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-5rcr-q3rx-j7vr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107'}
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'}
GHSA
GHSA-qh73-qc3p-rjv2
Uncaught Exception in fastify-multipart
### Impact This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a `name=constructor` property it is still possible to crash the application. The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116). All users are recommended to upgrade ### Patches v5.3.1 includes a patch ### Workarounds No workarounds are possible. ### References Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/fastify/fastify-multipart](https://github.com/fastify/fastify-multipart) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-23597'}
2022-04-19T19:03:23Z
2022-02-11T18:57:53Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/fastify/fastify-multipart/pull/116', 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2', 'https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/', 'https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23597', 'https://github.com/advisories/GHSA-qh73-qc3p-rjv2', 'https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480', 'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'}
null
{'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'}
{'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'}
GHSA
GHSA-x67x-vg9m-65c3
Integer overflow in base64
Affected versions of this crate suffered from an integer overflow bug when calculating the size of a buffer to use when encoding base64 using the `encode_config_buf` and `encode_config` functions. If the input string was large, this would cause a buffer to be allocated that was too small. Since this function writes to the buffer using unsafe code, it would allow an attacker to write beyond the buffer, causing memory corruption and possibly the execution of arbitrary code. This flaw was corrected by using checked arithmetic to calculate the size of the buffer.
{'CVE-2017-1000430'}
2021-08-25T20:55:27Z
2021-08-25T20:55:27Z
CRITICAL
9.8
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000430', 'https://rustsec.org/advisories/RUSTSEC-2017-0004', 'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319', 'https://github.com/advisories/GHSA-x67x-vg9m-65c3'}
null
{'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319'}
{'https://github.com/alicemaz/rust-base64/commit/24ead980daf11ba563e4fb2516187a56a71ad319'}
GHSA
GHSA-27wq-qx3q-fxm9
Improper Handling of Unexpected Data Type in ced
### Impact In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. ### Patches The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes. ### Workarounds Before passing an argument to ced, verify it’s a `Buffer` using [`Buffer.isBuffer(obj)`](https://nodejs.org/api/buffer.html#buffer_static_method_buffer_isbuffer_obj). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since ced is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to ced. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const bodyParser = require("body-parser"); const ced = require("ced"); const app = express(); app.use(bodyParser.raw()); app.post("/", (req, res) => { const encoding = ced(req.body); res.end(encoding); }); app.listen(3000); ``` `curl --request POST --header "Content-Type: text/plain" --data foo http://localhost:3000` crashes the server. ### References - https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3
{'CVE-2021-39131'}
2022-04-19T19:03:05Z
2021-08-23T19:42:28Z
HIGH
7.5
{'CWE-241'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39131', 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9', 'https://github.com/advisories/GHSA-27wq-qx3q-fxm9', 'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3', 'https://github.com/sonicdoe/ced/releases/tag/v1.0.0'}
null
{'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'}
{'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'}
GHSA
GHSA-hwqm-x785-qh8p
Incorrect Permission Assignment for Critical Resource in Hashicorp Consul
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
{'CVE-2020-12797'}
2021-06-23T17:52:33Z
2021-06-23T17:52:33Z
MODERATE
3.7
{'CWE-732'}
{'https://github.com/advisories/GHSA-hwqm-x785-qh8p', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12797', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7', 'https://github.com/hashicorp/consul/issues/5606', 'https://github.com/hashicorp/consul/pull/8047', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}
null
{'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7'}
{'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7'}
GHSA
GHSA-x7p2-x2j6-mwhr
Moderate severity vulnerability that affects gemirro
Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file.
{'CVE-2017-16833'}
2021-09-21T22:16:07Z
2017-11-29T23:19:51Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16833', 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de', 'https://github.com/advisories/GHSA-x7p2-x2j6-mwhr'}
null
{'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'}
{'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'}
GHSA
GHSA-rwxp-hwwf-653v
Insecure template handling in express-hbs
express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability.
{'CVE-2021-32817'}
2021-05-17T20:58:51Z
2021-05-17T20:58:51Z
MODERATE
5.4
{'CWE-200'}
{'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e', 'https://www.npmjs.com/package/express-hbs', 'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/', 'https://github.com/advisories/GHSA-rwxp-hwwf-653v', 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32817'}
null
{'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'}
{'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'}
GHSA
GHSA-8v9x-9xqg-r8mr
Prototype pollution in json8-merge-patch
Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.
{'CVE-2020-8268'}
2021-05-10T19:17:15Z
2021-05-10T19:17:15Z
HIGH
7.5
{'CWE-20', 'CWE-471', 'CWE-1321'}
{'https://hackerone.com/reports/980649', 'https://www.npmjs.com/package/json8-merge-patch', 'https://github.com/advisories/GHSA-8v9x-9xqg-r8mr', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268', 'https://github.com/sonnyp/JSON8/issues/113'}
null
{'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'}
{'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'}
GHSA
GHSA-3w8g-xr3f-2mp8
Out of bounds write in nalgebra
The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector. This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`.
{'CVE-2021-38190'}
2021-08-25T20:55:49Z
2021-08-25T20:55:49Z
CRITICAL
9.8
{'CWE-119', 'CWE-787'}
{'https://github.com/advisories/GHSA-3w8g-xr3f-2mp8', 'https://github.com/dimforge/nalgebra/issues/883', 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38190', 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5', 'https://github.com/dimforge/nalgebra/pull/889', 'https://rustsec.org/advisories/RUSTSEC-2021-0070.html'}
null
{'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'}
{'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'}
GHSA
GHSA-4ph2-8337-hm62
Key Caching behavior in the DynamoDB Encryption Client.
### Impact This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. ### Patches Fixed as of 1.3.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`. ### Workarounds Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
null
2021-02-08T17:43:49Z
2021-02-08T17:43:49Z
LOW
0
{'CWE-862'}
{'https://github.com/aws/aws-dynamodb-encryption-python/security/advisories/GHSA-4ph2-8337-hm62', 'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b', 'https://pypi.org/project/dynamodb-encryption-sdk', 'https://github.com/aws/aws-dynamodb-encryption-python/blob/master/CHANGELOG.rst#130----2021-02-04', 'https://github.com/advisories/GHSA-4ph2-8337-hm62'}
null
{'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b'}
{'https://github.com/aws/aws-dynamodb-encryption-python/commit/90606ec9af7c2b5cb338d64639a62ee867d38d6b'}
GHSA
GHSA-h7vq-5qgw-jwwq
CSV Injection Vulnerability
### Impact In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel. If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update. ### Patches This has been patched in Craft 3.7.14. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28 * https://twitter.com/craftcmsupdates/status/1442928690145366018 ### For more information If you have any questions or comments about this advisory, email us at support@craftcms.com ---------- Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli
{'CVE-2021-41824'}
2021-10-18T19:11:02Z
2021-10-18T19:04:16Z
HIGH
8.8
{'CWE-1236'}
{'https://github.com/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2', 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}
null
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}
GHSA
GHSA-9mqp-7v2h-2382
Denial of Service in Tensorflow
### Impact The `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L235-L241 Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. ### Patches We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-63xm-rx5p-xvqr](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr)
{'CVE-2020-15194'}
2021-08-26T15:10:19Z
2020-09-25T18:28:19Z
MODERATE
5.3
{'CWE-20', 'CWE-617'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-9mqp-7v2h-2382', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15194', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'}
{'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'}
GHSA
GHSA-55x5-fj6c-h6m8
HTML Cleaner allows crafted and SVG embedded scripts to pass through
### Impact The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5. ### Patches The issue has been resolved in lxml 4.6.5. ### Workarounds None. ### References The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038.
{'CVE-2021-43818'}
2022-04-22T15:39:59Z
2021-12-13T18:14:36Z
HIGH
8.2
{'CWE-74', 'CWE-79'}
{'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/', 'https://github.com/advisories/GHSA-55x5-fj6c-h6m8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/', 'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8', 'https://security.netapp.com/advisory/ntap-20220107-0005/', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://www.debian.org/security/2022/dsa-5043'}
null
{'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'}
{'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a', 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776', 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'}
GHSA
GHSA-cpq8-x35g-m439
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling.
{'CVE-2021-3783'}
2021-09-20T20:43:15Z
2021-09-20T20:43:15Z
MODERATE
6.6
{'CWE-79'}
{'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984', 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4', 'https://github.com/advisories/GHSA-cpq8-x35g-m439', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783'}
null
{'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}
{'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}
GHSA
GHSA-w3wf-cfx3-6gcx
SAML authentication vulnerability due to stdlib XML parsing
### Impact Due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. ### Patches This issue is patched in 3.5.1 using https://github.com/mattermost/xml-roundtrip-validator. ### Workarounds If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet. ### References See https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ for more information about the underlying vulnerabilities. ### For more information If you have any questions or comments about this advisory: * Email us at [security@fleetdm.com](mailto:security@fleetdm.com) * Join #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)
{'CVE-2020-26276'}
2022-02-11T23:59:21Z
2022-02-11T23:59:14Z
HIGH
0
{'CWE-290'}
{'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607', 'https://github.com/mattermost/xml-roundtrip-validator', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-w3wf-cfx3-6gcx', 'https://github.com/fleetdm/fleet/blob/master/CHANGELOG.md#fleet-351-dec-14-2020', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26276', 'https://github.com/advisories/GHSA-w3wf-cfx3-6gcx'}
null
{'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607'}
{'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607'}
GHSA
GHSA-w4pj-7p68-3vgv
Stored XSS in October
### Impact A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field. ### Patches Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission. ### Workarounds Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin). ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
{'CVE-2020-11083'}
2022-04-19T19:02:27Z
2020-08-05T14:52:44Z
LOW
3.5
{'CWE-79'}
{'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/advisories/GHSA-w4pj-7p68-3vgv', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'http://seclists.org/fulldisclosure/2020/Aug/2'}
null
{'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94'}
{'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'}
GHSA
GHSA-7vmw-7x57-q6jw
Cross-site scripting
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
{'CVE-2021-32713'}
2021-09-08T18:00:00Z
2021-09-08T18:00:00Z
MODERATE
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32713', 'https://github.com/advisories/GHSA-7vmw-7x57-q6jw', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'}
null
{'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}
{'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}
GHSA
GHSA-6hpv-v2rx-c5g6
FPE in convolutions with zero size filters
### Impact The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments. ### Patches We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41209'}
2021-11-10T19:02:17Z
2021-11-10T19:02:17Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-6hpv-v2rx-c5g6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41209'}
null
{'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}
{'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}
GHSA
GHSA-whgm-jr23-g3j9
Uncontrolled Resource Consumption in ansi-html
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
{'CVE-2021-23424'}
2022-04-19T19:03:26Z
2021-09-02T17:15:24Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69', 'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849', 'https://github.com/advisories/GHSA-whgm-jr23-g3j9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424'}
null
{'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'}
{'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'}
GHSA
GHSA-8m9g-647g-5pxw
Infinite loop in Yubico yubihsm-connector
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing any further operations until the yubihsm-connector is restarted. An attacker can send 0, 1, or 2 bytes to trigger this.
{'CVE-2021-28484'}
2022-04-12T22:00:38Z
2022-02-15T01:57:18Z
HIGH
5.4
{'CWE-835'}
{'https://github.com/Yubico/yubihsm-connector/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28484', 'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed', 'https://www.yubico.com/support/security-advisories/ysa-2021-02/', 'https://github.com/advisories/GHSA-8m9g-647g-5pxw'}
null
{'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed'}
{'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed'}
GHSA
GHSA-j7rm-8ww4-xx2g
Division by zero in TFLite's implementation of `SpaceToDepth`
### Impact The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). ```cc const int block_size = params->block_size; const int input_height = input->dims->data[1]; const int input_width = input->dims->data[2]; int output_height = input_height / block_size; int output_width = input_width / block_size; ``` An attacker can craft a model such that `params->block_size` would be zero. ### Patches We have patched the issue in GitHub commit [0d45ea1ca641b21b73bcf9c00e0179cda284e7e7](https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29587'}
2021-05-21T14:26:45Z
2021-05-21T14:26:45Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-j7rm-8ww4-xx2g', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587', 'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'}
null
{'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'}
{'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7'}
GHSA
GHSA-9gwx-9cwp-5c2m
Billion laughs attack (XML bomb)
### Impact Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. Consider an XML file (`createMediaPackage.xml`) like this: ```xml <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <!DOCTYPE lolz [ <!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. "> <!ELEMENT title (#PCDATA)> <!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;"> <!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;"> <!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;"> <!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;"> <!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;"> ]> <mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z"> <title>&lol5;</title> <media/> <metadata/> <attachments/> <publications/> </mediapackage> ``` Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory: ```sh curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \ -F 'mediapackage=<createMediaPackage.xml' \ -F sourceFlavors="" \ -F sourceTags="" \ -F deleteExternal="" \ -F tagsAndFlavor='' \ -o out.xml ``` Additional notes: - You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text. - Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system. - To exploit this, users need to have ingest privileges, limiting the group of potential attackers ### Patches The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch. ### Workarounds There is no known workaround for this issue. ### References - [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack) - For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________ ### For more information If you have any questions or comments about this advisory: - Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) - Email us at [security@opencast.org](mailto:security@opencast.org)
{'CVE-2021-32623'}
2022-04-19T19:02:58Z
2021-06-17T20:11:35Z
HIGH
8.1
{'CWE-776'}
{'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623', 'https://github.com/advisories/GHSA-9gwx-9cwp-5c2m'}
null
{'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'}
{'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'}
GHSA
GHSA-m553-9wmx-533h
Cross-site scripting in Dolibarr
In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
{'CVE-2019-16197'}
2021-08-18T19:24:27Z
2019-11-08T20:05:31Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964', 'https://github.com/advisories/GHSA-m553-9wmx-533h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html'}
null
{'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}
{'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}
GHSA
GHSA-2v2v-fx7r-f2fh
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4082'}
2021-12-16T14:28:10Z
2021-12-16T14:28:10Z
MODERATE
4.3
{'CWE-352'}
{'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/advisories/GHSA-2v2v-fx7r-f2fh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}
null
{'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}
{'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}
GHSA
GHSA-xgx2-332h-9x6q
SQL Injection in Yeswiki
An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0.
{'CVE-2021-43091'}
2022-04-05T20:54:58Z
2022-03-26T00:00:32Z
HIGH
7.5
{'CWE-89'}
{'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://github.com/advisories/GHSA-xgx2-332h-9x6q', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/'}
null
{'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'}
{'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'}
GHSA
GHSA-689x-x68p-fph3
Cross-site Scripting in vditor
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
{'CVE-2022-0350'}
2022-04-12T21:57:07Z
2022-04-01T00:00:41Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476', 'https://github.com/advisories/GHSA-689x-x68p-fph3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c'}
null
{'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}
{'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}
GHSA
GHSA-73qw-ww62-m54x
Critical severity vulnerability that affects colorscore
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.
{'CVE-2015-7541'}
2021-09-02T19:21:06Z
2017-10-24T18:33:36Z
CRITICAL
10
{'CWE-77'}
{'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718', 'http://rubysec.com/advisories/CVE-2015-7541/', 'https://github.com/advisories/GHSA-73qw-ww62-m54x', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541', 'http://www.openwall.com/lists/oss-security/2016/01/05/2'}
null
{'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'}
{'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'}
GHSA
GHSA-hm3x-jwwf-jpr9
Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1.
{'CVE-2021-4180'}
2022-04-05T20:53:00Z
2022-03-24T00:00:17Z
MODERATE
4.3
{'CWE-200'}
{'https://bugs.launchpad.net/tripleo/+bug/1955397', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180', 'https://github.com/advisories/GHSA-hm3x-jwwf-jpr9', 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793'}
null
{'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'}
{'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'}
GHSA
GHSA-j87c-cj65-vmh5
High severity vulnerability that affects rendertron
Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.
{'CVE-2017-18354'}
2021-09-14T19:19:11Z
2019-01-04T17:41:51Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}
null
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
GHSA
GHSA-vx5c-87qx-cv6c
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2017-1001002'}
2021-06-10T20:06:13Z
2017-12-18T22:27:45Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/552', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'}
null
{'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}
{'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}
GHSA
GHSA-xw5p-hw6r-2j98
Denial of service in fastify
A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.
{'CVE-2020-8192'}
2021-01-07T23:42:12Z
2020-08-05T14:53:22Z
MODERATE
0
{'CWE-400'}
{'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e', 'https://hackerone.com/reports/903521', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192', 'https://github.com/advisories/GHSA-xw5p-hw6r-2j98'}
null
{'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}
{'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}
GHSA
GHSA-hrmm-f4j8-8vxc
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0922'}
2021-03-29T21:00:11Z
2021-03-29T21:00:11Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-hrmm-f4j8-8vxc', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'}
GHSA
GHSA-m3fm-h5jp-q79p
Authorization bypass in Openshift
Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.
{'CVE-2016-1906'}
2021-12-20T16:58:14Z
2021-12-20T16:58:14Z
CRITICAL
9.8
{'CWE-285'}
{'https://access.redhat.com/errata/RHSA-2016:0351', 'https://github.com/openshift/origin/issues/6556', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1906', 'https://github.com/advisories/GHSA-m3fm-h5jp-q79p', 'https://access.redhat.com/errata/RHSA-2016:0070', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1906', 'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406', 'https://github.com/openshift/origin/pull/6576'}
null
{'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406'}
{'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406'}
GHSA
GHSA-2cfc-865j-gm4w
XML External Entity Reference in detekt
Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.
{'CVE-2022-0272'}
2022-04-26T13:03:17Z
2022-04-22T00:00:36Z
HIGH
7.3
{'CWE-611'}
{'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44', 'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://github.com/advisories/GHSA-2cfc-865j-gm4w'}
null
{'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'}
{'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'}
GHSA
GHSA-m539-j985-hcr8
Crash in `max_pool3d` when size argument is 0 or negative
### Impact The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative: ```python import tensorflow as tf pool_size = [2, 2, 0] layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size) input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32) res = layer(input_tensor) ``` This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. ### Patches We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936).
{'CVE-2021-41196'}
2021-11-10T19:36:21Z
2021-11-10T19:36:21Z
MODERATE
5.5
{'CWE-191'}
{'https://github.com/advisories/GHSA-m539-j985-hcr8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41196'}
null
{'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'}
{'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'}
GHSA
GHSA-rqjh-jp2r-59cj
nltk is vulnerable to Inefficient Regular Expression Complexity
nltk is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3842'}
2022-01-06T22:24:14Z
2022-01-06T22:24:14Z
HIGH
7.5
{'CWE-1333'}
{'https://github.com/advisories/GHSA-rqjh-jp2r-59cj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3842', 'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d', 'https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a'}
null
{'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d'}
{'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d'}
GHSA
GHSA-r587-7jh2-4qr3
Server secret was included in static assets and served to clients
### Impact Server JWT signing secret was included in static assets and served to clients. This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**. ### Background Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`. Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood. ### Patches Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components. Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend). ### Workarounds Users shall upgrade if they use Flood's builtin authentication system. While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments. > Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication. Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions. ### References [Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions) [Introduction to JSON Web Tokens](https://jwt.io/introduction/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [issue tracker](https://github.com/jesec/flood/issues) * Email us at [jc@linux.com](mailto:jc@linux.com)
null
2022-04-19T19:02:33Z
2020-08-26T19:32:50Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'}
null
{'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'}
{'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'}
GHSA
GHSA-652h-xwhf-q4h6
OS Command Injection in ssh2
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
{'CVE-2020-26301'}
2021-09-21T16:50:46Z
2021-09-21T16:50:46Z
HIGH
7.5
{'CWE-78'}
{'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/', 'https://www.npmjs.com/package/ssh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21', 'https://github.com/advisories/GHSA-652h-xwhf-q4h6'}
null
{'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'}
{'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'}
GHSA
GHSA-6jmm-mp6w-4rrg
OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser
### Impact NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0. ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/HtmlUnit/htmlunit-neko](https://github.com/HtmlUnit/htmlunit-neko) * Email us at [rbri at rbri.de]
{'CVE-2022-29546'}
2022-05-02T19:49:44Z
2022-04-26T21:14:57Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-6jmm-mp6w-4rrg', 'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg'}
null
{'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'}
{'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'}