ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-xg75-q3q5-cqmv | Denial of Service in http-swagger | ### Impact
Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system.
### Patches
Yes. Please upgrade to v1.2.6.
### Workarounds
A workaround is to restrict the path prefix to the "GET" method. As shown below
```
func main() {
r := mux.NewRouter()
r.PathPrefix("/swagger/").Handler(httpSwagger.Handler(
httpSwagger.URL("http://localhost:1323/swagger/doc.json"), //The url pointing to API definition
httpSwagger.DeepLinking(true),
httpSwagger.DocExpansion("none"),
httpSwagger.DomID("#swagger-ui"),
)).Methods(http.MethodGet)
```
### References
Reporter dongguangli from https://www.huoxian.cn/ company
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http-swagger](https://github.com/swaggo/http-swagger/issues)
| {'CVE-2022-24863'} | 2022-04-28T18:12:34Z | 2022-04-22T20:55:52Z | HIGH | 7.5 | {'CWE-400', 'CWE-755'} | {'https://github.com/swaggo/http-swagger/pull/62', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863', 'https://github.com/swaggo/http-swagger/releases/tag/v1.2.6', 'https://github.com/advisories/GHSA-xg75-q3q5-cqmv', 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv', 'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'} | null | {'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'} | {'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'} |
GHSA | GHSA-g74r-ffvr-5q9f | Memory Exposure in concat-stream | Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()`
Versions <1.3.0 are not affected due to not using unguarded Buffer constructor.
## Recommendation
Update to version 1.5.2, 1.4.11, 1.3.2 or later.
If you are unable to update make sure user provided input into the `write()` function is not a number. | null | 2021-08-04T20:40:21Z | 2019-06-03T17:26:44Z | MODERATE | 0 | {'CWE-200'} | {'https://github.com/advisories/GHSA-g74r-ffvr-5q9f', 'https://github.com/maxogden/concat-stream/pull/47', 'https://nodesecurity.io/advisories/597', 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'} | null | {'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'} | {'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'} |
GHSA | GHSA-2gwj-7jmv-h26r | SQL Injection in Django | An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs. | {'CVE-2022-28346'} | 2022-04-22T23:29:02Z | 2022-04-13T00:00:33Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200', 'https://groups.google.com/forum/#!forum/django-announce', 'https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346', 'https://github.com/advisories/GHSA-2gwj-7jmv-h26r'} | null | {'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200'} | {'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200'} |
GHSA | GHSA-8rcj-c8pj-v3m3 | Reachable Assertion in Tensorflow | ### Impact
When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes.
### Patches
We have patched the issue in GitHub commit [14fea662350e7c26eb5fe1be2ac31704e5682ee6](https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23564'} | 2022-02-11T15:07:07Z | 2022-02-09T23:55:28Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-8rcj-c8pj-v3m3', 'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23564', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3'} | null | {'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'} | {'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'} |
GHSA | GHSA-5fg8-2547-mr8q | Misinterpretation of malicious XML input | ### Impact
xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications.
### Patches
Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0`)
See issue #271 for the status of publishing `xmldom` to npm or join #270 for Q&A/discussion until it's resolved.
### Workarounds
Downstream applications can validate the input and reject the maliciously crafted documents.
### References
Similar to this one reported on the Go standard library:
- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
- https://mattermost.com/blog/securing-xml-implementations-across-the-web/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom)
* Email us: send an email to **all** addresses that are shown by `npm owner ls @xmldom/xmldom`
| {'CVE-2021-32796'} | 2022-01-04T19:36:30Z | 2021-08-03T16:57:05Z | MODERATE | 6.5 | {'CWE-116'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b', 'https://github.com/advisories/GHSA-5fg8-2547-mr8q', 'https://mattermost.com/blog/securing-xml-implementations-across-the-web/', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://www.npmjs.com/package/@xmldom/xmldom'} | null | {'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'} | {'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'} |
GHSA | GHSA-fq6p-x6j3-cmmq | Denial of service in three | This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms") | {'CVE-2020-28496'} | 2021-03-01T19:57:16Z | 2021-03-01T19:57:16Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/advisories/GHSA-fq6p-x6j3-cmmq', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931'} | null | {'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'} | {'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'} |
GHSA | GHSA-8948-ffc6-jg52 | Insecure Default Configuration in redbird | Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable.
## Recommendation
Upgrade to version 0.9.1 or later. | null | 2021-08-04T20:58:53Z | 2019-06-06T15:32:21Z | MODERATE | 4.2 | {'CWE-20'} | {'https://github.com/OptimalBits/redbird/pull/207', 'https://www.npmjs.com/advisories/828', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455', 'https://github.com/advisories/GHSA-8948-ffc6-jg52', 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'} | null | {'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'} | {'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'} |
GHSA | GHSA-qmqc-x3r4-6v39 | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. | {'CVE-2019-14893'} | 2021-02-25T20:18:58Z | 2020-05-15T18:59:07Z | HIGH | 0 | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2020:0729', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20200327-0006/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893', 'https://github.com/advisories/GHSA-qmqc-x3r4-6v39'} | null | {'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'} | {'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'} |
GHSA | GHSA-84j7-475p-hp8v | HTTP Response Splitting in Puma | In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header,
an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content,
such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting.
While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server.
This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters. | {'CVE-2020-5247'} | 2021-01-08T20:28:16Z | 2020-02-28T16:53:55Z | MODERATE | 6.5 | {'CWE-113'} | {'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://github.com/advisories/GHSA-84j7-475p-hp8v'} | null | {'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'} | {'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'} |
GHSA | GHSA-jp4j-47f9-2vc3 | Integer Overflow or Wraparound in NATS Server | An integer overflow in NATS Server 2.0.0 allows a remote attacker to crash the server by sending a crafted request. | {'CVE-2019-13126'} | 2021-05-18T18:14:55Z | 2021-05-18T18:14:55Z | HIGH | 7.1 | {'CWE-190'} | {'https://github.com/nats-io/nats-server/commits/master', 'https://github.com/advisories/GHSA-jp4j-47f9-2vc3', 'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda', 'https://github.com/nats-io/nats-server/pull/1053', 'https://github.com/nats-io/nats-server/pull/1441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13126', 'https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/'} | null | {'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'} | {'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'} |
GHSA | GHSA-mpgr-2cx9-327h | Information disclosure in SSB-DB | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately.
**There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.**
The `get()` method is supposed to only decrypt messages when you explicitly ask it to, but there's a bug where it's decrypting any message that it can. This means that it's returning the decrypted content of private messages, which a malicious peer could use to get access to private data. This only affects peers running SSB-DB@20.0.0 who also have private messages, and is only known to be exploitable if you're also running SSB-OOO (default in SSB-Server), which exposes a thin wrapper around `get()` to anonymous peers.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, please upgrade to SSB-DB 20.0.1 (or SSB-Server 16.0.1) immediately.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
You may be able to disable the most obvious attack vector, SSB-OOO, by disabling the plugin, but you should upgrade immediately anyway.
### For more information
If you have any questions or comments about this advisory, open an issue in [SSB-DB](https://github.com/ssbc/ssb-db/) | {'CVE-2020-4045'} | 2022-04-19T19:02:28Z | 2020-06-11T21:09:04Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h', 'https://github.com/advisories/GHSA-mpgr-2cx9-327h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'} | null | {'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'} | {'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'} |
GHSA | GHSA-p48w-vf3c-rqjx | Cross-Site Scripting in Bootstrap Package | ### Problem
It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
The following templates are affected by the vulnerability:
* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html`
* `Resources/Private/Partials/ContentElements/Header/SubHeader.html`
Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b).
### Solution
Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described.
Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. | {'CVE-2021-21365'} | 2022-04-19T19:02:55Z | 2021-04-29T21:51:21Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/advisories/GHSA-p48w-vf3c-rqjx'} | null | {'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} | {'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} |
GHSA | GHSA-qpw2-xchm-655q | Out-of-Bounds read in stringstream | Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
# WITHDRAWN
This is a duplicate of GHSA-mf6x-7mm4-x2g7 | null | 2022-01-06T20:31:08Z | 2022-01-06T20:31:01Z | MODERATE | 6.5 | {'CWE-125'} | {'https://github.com/mhart/StringStream/issues/7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21270', 'https://github.com/advisories/GHSA-qpw2-xchm-655q', 'https://www.npmjs.com/advisories/664', 'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274', 'https://hackerone.com/reports/321670'} | null | {'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'} | {'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'} |
GHSA | GHSA-f5fj-7265-jxhj | Information Exposure | Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1. | {'CVE-2018-1000803'} | 2022-04-12T22:02:36Z | 2022-02-15T01:57:18Z | MODERATE | 5.3 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000803', 'https://github.com/advisories/GHSA-f5fj-7265-jxhj', 'https://github.com/go-gitea/gitea/pull/4664', 'https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57', 'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'} | null | {'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'} | {'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'} |
GHSA | GHSA-w89r-qch4-8jv5 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0912'} | 2021-03-29T20:59:59Z | 2021-03-29T20:59:59Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://github.com/advisories/GHSA-w89r-qch4-8jv5'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'} |
GHSA | GHSA-wmg4-8cp2-hpg9 | Denial of service attack via memory exhaustion | ### Impact
Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service.
Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service.
This affects any server which accepts registration requests from untrusted clients.
### Patches
Patched by 89071a1, 0523511, f56eee3.
### Workarounds
Request sizes can be limited in an HTTP reverse-proxy.
There are no known workarounds for the problem with overlarge responses.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | {'CVE-2021-29430'} | 2021-04-19T14:54:04Z | 2021-04-19T14:54:04Z | LOW | 0 | {'CWE-20', 'CWE-400'} | {'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430', 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7'} | null | {'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7', 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'} | {'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7', 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'} |
GHSA | GHSA-p5w8-wqhj-9hhf | StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) | ### Impact
The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments.
### Patches
The issues has been fixed in sqlparse 0.4.2.
### Workarounds
Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool.
### References
This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues)
* Email us at [albrecht.andi@gmail.com](mailto:albrecht.andi@gmail.com)
| {'CVE-2021-32839'} | 2022-04-19T19:03:08Z | 2021-09-10T17:56:06Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32839', 'https://github.com/advisories/GHSA-p5w8-wqhj-9hhf', 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf', 'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb', 'https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/'} | null | {'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb'} | {'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb'} |
GHSA | GHSA-686h-j8r8-wmfm | Data races in rcu_cell | Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`.
This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`.
This can result in memory corruption caused by data races. | {'CVE-2020-36451'} | 2021-08-25T20:57:14Z | 2021-08-25T20:57:14Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://github.com/advisories/GHSA-686h-j8r8-wmfm', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://github.com/Xudong-Huang/rcu_cell/pull/4', 'https://github.com/Xudong-Huang/rcu_cell/issues/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36451', 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'} | null | {'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'} | {'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'} |
GHSA | GHSA-93wh-35r4-6qmw | Exposure of Sensitive Information to an Unauthorized Actor in moodle | It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | {'CVE-2021-20281'} | 2021-03-29T20:43:23Z | 2021-03-29T20:43:23Z | MODERATE | 5.3 | {'CWE-200'} | {'https://github.com/advisories/GHSA-93wh-35r4-6qmw', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939041', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281'} | null | {'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'} | {'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'} |
GHSA | GHSA-2x75-mf24-588m | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1092'} | 2021-03-29T20:59:11Z | 2021-03-29T20:59:11Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-2x75-mf24-588m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1092', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} |
GHSA | GHSA-g6v7-vqhx-6v6c | XML External Entity Reference in org.opencms:opencms-core | An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document. | {'CVE-2021-3312'} | 2021-10-18T18:40:16Z | 2021-10-12T17:23:40Z | MODERATE | 6.5 | {'CWE-611'} | {'https://github.com/advisories/GHSA-g6v7-vqhx-6v6c', 'https://github.com/alkacon/opencms-core/issues/721', 'https://github.com/alkacon/opencms-core/releases', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312', 'https://github.com/alkacon/opencms-core/issues/725'} | null | {'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'} | {'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'} |
GHSA | GHSA-cgfm-62j4-v4rf | Heap out of bounds access in sparse reduction operations | ### Impact
The implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data:
```python
import tensorflow as tf
x = tf.SparseTensor(
indices=[[773, 773, 773], [773, 773, 773]],
values=[1, 1],
dense_shape=[337, 337, 337])
tf.sparse.reduce_sum(x, 1)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor.
### Patches
We have patched the issue in GitHub commit [87158f43f05f2720a374f3e6d22a7aaa3a33f750](https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37635'} | 2021-08-25T14:44:17Z | 2021-08-25T14:44:17Z | HIGH | 7.3 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf', 'https://github.com/advisories/GHSA-cgfm-62j4-v4rf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37635'} | null | {'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750'} | {'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750'} |
GHSA | GHSA-g475-pch5-6wvv | Authentication bypass in MAGMI | MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication. | {'CVE-2020-5777'} | 2021-05-06T18:54:35Z | 2021-05-06T18:54:35Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://github.com/advisories/GHSA-g475-pch5-6wvv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://www.tenable.com/security/research/tra-2020-51'} | null | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'} | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'} |
GHSA | GHSA-4g9f-63rx-5cw4 | Segfault in Tensorflow | ### Impact
The [`tf.raw_ops.Switch`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Switch) operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor.
However, the eager runtime traverses all tensors in the output:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/common_runtime/eager/kernel_and_device.cc#L308-L313
Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault
### Patches
We have patched the issue in da8558533d925694483d2c136a9220d6d49d843c and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15190'} | 2021-08-26T15:09:20Z | 2020-09-25T18:28:14Z | MODERATE | 5.3 | {'CWE-20', 'CWE-476'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4', 'https://github.com/advisories/GHSA-4g9f-63rx-5cw4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15190', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c'} | {'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c'} |
GHSA | GHSA-w24h-v9qh-8gxj | SQL Injection in Django | A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. | {'CVE-2022-28347'} | 2022-04-22T23:29:02Z | 2022-04-13T00:00:33Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-28347', 'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81', 'https://groups.google.com/forum/#!forum/django-announce', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'https://github.com/advisories/GHSA-w24h-v9qh-8gxj'} | null | {'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81'} | {'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81'} |
GHSA | GHSA-rfmp-jvr7-hx78 | Inadequate Encryption Strength in Apache NiFi | In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1. | {'CVE-2020-9491'} | 2022-04-29T20:27:44Z | 2022-01-06T20:41:06Z | HIGH | 7.5 | {'CWE-327'} | {'https://nifi.apache.org/security#CVE-2020-9491', 'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-rfmp-jvr7-hx78', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491'} | null | {'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'} | {'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'} |
GHSA | GHSA-wg4r-q74r-p7c8 | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0941'} | 2022-03-23T15:42:50Z | 2022-03-15T00:01:03Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/advisories/GHSA-wg4r-q74r-p7c8', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} | null | {'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} | {'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} |
GHSA | GHSA-xwjr-6fj7-fc6h | Local File Inclusion by unauthenticated users | ### Impact
An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request.
### Patches
Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
### Workarounds
Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469.
### References
Reported by [ka1n4t](https://github.com/ka1n4t)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1105" alt="Screen Shot 2020-10-10 at 1 05 19 PM" src="https://user-images.githubusercontent.com/7253840/95663086-4ffc4780-0af9-11eb-9bb6-fd40cf11c033.png"> | {'CVE-2020-15246'} | 2022-04-19T19:02:37Z | 2020-11-23T19:48:12Z | HIGH | 7.5 | {'CWE-863', 'CWE-22'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246', 'https://github.com/advisories/GHSA-xwjr-6fj7-fc6h'} | null | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} |
GHSA | GHSA-823f-cwm9-4g74 | Splash authentication credentials potentially leaked to target websites | ### Impact
If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`.
### Patches
Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely.
### Workarounds
If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth).
Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots).
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/scrapy-plugins/scrapy-splash/issues)
* [Email us](mailto:opensource@zyte.com)
| {'CVE-2021-41124'} | 2021-10-06T17:49:23Z | 2021-10-06T17:49:23Z | HIGH | 7.4 | {'CWE-200'} | {'https://github.com/advisories/GHSA-823f-cwm9-4g74', 'https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74', 'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41124'} | null | {'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'} | {'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'} |
GHSA | GHSA-4w82-r329-3q67 | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. | {'CVE-2020-8840'} | 2022-04-07T22:42:01Z | 2020-03-04T20:52:14Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2620', 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E', 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en', 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840', 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E', 'https://github.com/advisories/GHSA-4w82-r329-3q67', 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200327-0002/', 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E'} | null | {'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497'} | {'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b'} |
GHSA | GHSA-fq6p-6334-8gr4 | Memory leak in decoding PNG images | ### Impact
When [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416) TensorFlow can produce a memory leak if the image is invalid.
After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur.
### Patches
We have patched the issue in GitHub commit [ab51e5b813573dc9f51efa335aebcf2994125ee9](https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23585'} | 2022-02-11T20:36:40Z | 2022-02-09T23:26:08Z | MODERATE | 4.3 | {'CWE-401'} | {'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23585', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416', 'https://github.com/advisories/GHSA-fq6p-6334-8gr4'} | null | {'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'} | {'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'} |
GHSA | GHSA-2598-2f59-rmhq | SQL Injection in sequelize | Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 3.35.1 or later. | {'CVE-2019-10749'} | 2021-08-18T22:10:20Z | 2019-11-08T17:05:17Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://github.com/advisories/GHSA-2598-2f59-rmhq', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68', 'https://www.npmjs.com/advisories/1017', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222'} | null | {'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'} | {'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'} |
GHSA | GHSA-r5gm-4p5w-pq2p | Remote code execution in verot/class.upload.php | class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions. | {'CVE-2019-19576'} | 2021-08-19T16:24:47Z | 2020-01-16T22:17:40Z | CRITICAL | 9.8 | {'CWE-434'} | {'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/advisories/GHSA-r5gm-4p5w-pq2p', 'https://github.com/jra89/CVE-2019-19576', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19576', 'https://www.verot.net/php_class_upload.htm', 'http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3', 'https://www.verot.net'} | null | {'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'} | {'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124'} |
GHSA | GHSA-cf4h-3jhx-xvhq | Arbitrary Code Execution in underscore | The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized. | {'CVE-2021-23358'} | 2021-08-25T17:37:26Z | 2021-05-06T16:09:43Z | HIGH | 9.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23358', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://www.tenable.com/security/tns-2021-14', 'https://www.debian.org/security/2021/dsa-4883', 'https://github.com/jashkenas/underscore/pull/2917', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505', 'https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984', 'https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503', 'https://github.com/jashkenas/underscore/releases/tag/1.12.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/', 'https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html', 'https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E', 'https://github.com/advisories/GHSA-cf4h-3jhx-xvhq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/', 'https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504', 'https://www.npmjs.com/package/underscore'} | null | {'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'} | {'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'} |
GHSA | GHSA-4g77-cvgw-grvw | Prototype Pollution in putil-merge | This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077 | {'CVE-2021-23470'} | 2022-02-11T16:15:46Z | 2022-02-05T00:00:31Z | HIGH | 8.2 | {'CWE-1321'} | {'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://github.com/advisories/GHSA-4g77-cvgw-grvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470', 'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487'} | null | {'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'} | {'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'} |
GHSA | GHSA-cq8r-fc3q-6hg2 | Denial of Service (DoS) via the unsetByPath function in jsjoints | The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function. | {'CVE-2020-28479'} | 2021-04-13T15:29:40Z | 2021-04-13T15:29:40Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://github.com/advisories/GHSA-cq8r-fc3q-6hg2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039'} | null | {'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'} | {'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'} |
GHSA | GHSA-269q-hmxg-m83q | Local Information Disclosure Vulnerability in io.netty:netty-codec-http | ### Description ###
[GHSA-5mcr-gq6c-3hq2](https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2) (CVE-2021-21290) contains an insufficient fix for the vulnerability identified.
### Impact ###
When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled.
This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users.
### Vulnerability Details ###
To fix the vulnerability the code was changed to the following:
```java
@SuppressJava6Requirement(reason = "Guarded by version check")
public static File createTempFile(String prefix, String suffix, File directory) throws IOException {
if (javaVersion() >= 7) {
if (directory == null) {
return Files.createTempFile(prefix, suffix).toFile();
}
return Files.createTempFile(directory.toPath(), prefix, suffix).toFile();
}
if (directory == null) {
return File.createTempFile(prefix, suffix);
}
File file = File.createTempFile(prefix, suffix, directory);
// Try to adjust the perms, if this fails there is not much else we can do...
file.setReadable(false, false);
file.setReadable(true, true);
return file;
}
```
Unfortunately, this logic path was left vulnerable:
```java
if (directory == null) {
return File.createTempFile(prefix, suffix);
}
```
This file is still readable by all local users.
### Patches ###
Update to 4.1.77.Final
### Workarounds ###
Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user or update to Java 7 or above.
### References ###
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
### For more information ###
If you have any questions or comments about this advisory:
Open an issue in [netty](https://github.com/netty/netty)
| {'CVE-2022-24823'} | 2022-05-10T08:46:52Z | 2022-05-10T08:46:50Z | MODERATE | 5.5 | {'CWE-379', 'CWE-668', 'CWE-378'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24823', 'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q', 'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1', 'https://github.com/advisories/GHSA-269q-hmxg-m83q'} | null | {'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1'} | {'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1'} |
GHSA | GHSA-jj6m-r8jc-2gp7 | Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings | ### Impact
All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding.
### Patches
Users should upgrade to `1.4.4`.
### Workarounds
There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created.
### For more information
If you have any questions or comments about this advisory:
* Contact us on [Discord](https://discord.gg/pterodactyl)
* Email us at `dane ät pterodactyl dot io` | {'CVE-2021-32699'} | 2021-10-21T13:26:04Z | 2021-06-23T18:03:18Z | MODERATE | 6.5 | {'CWE-405'} | {'https://github.com/advisories/GHSA-jj6m-r8jc-2gp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699', 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3', 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7'} | null | {'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'} | {'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'} |
GHSA | GHSA-7r83-w6r8-fh6w | Reflected Cross-site Scripting (XSS) in ACS Commons | ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful. | {'CVE-2021-21043'} | 2021-12-13T21:34:09Z | 2021-05-13T22:31:14Z | MODERATE | 6.1 | {'CWE-787', 'CWE-79'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/indesign/apsb21-22.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/advisories/GHSA-7r83-w6r8-fh6w', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'} | null | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'} |
GHSA | GHSA-qc22-qwm9-j8rx | Remote Code Execution in npm-groovy-lint | Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable. | null | 2021-12-20T16:59:31Z | 2021-12-20T16:59:31Z | CRITICAL | 0 | {'CWE-20'} | {'https://github.com/advisories/GHSA-qc22-qwm9-j8rx', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/nvuillam/npm-groovy-lint/issues/194'} | null | {'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'} | {'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'} |
GHSA | GHSA-p6jh-p7q8-pcrg | Prototype Pollution in nodee-utils | All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function. | {'CVE-2020-7722'} | 2021-07-29T22:08:42Z | 2021-05-06T18:26:21Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-p6jh-p7q8-pcrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679'} | null | {'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'} | {'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'} |
GHSA | GHSA-566m-qj78-rww5 | Regular Expression Denial of Service in postcss | The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). | {'CVE-2021-23382'} | 2022-04-19T19:03:24Z | 2022-01-07T00:21:36Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641', 'https://github.com/postcss/postcss/releases/tag/7.0.36', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382', 'https://github.com/advisories/GHSA-566m-qj78-rww5'} | null | {'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'} | {'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'} |
GHSA | GHSA-cqqh-49mx-fq63 | Prototype Pollution in merge | merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3645'} | 2021-09-24T13:11:10Z | 2021-09-13T20:16:54Z | MODERATE | 6.8 | {'CWE-1321', 'CWE-915'} | {'https://github.com/advisories/GHSA-cqqh-49mx-fq63', 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'} | null | {'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'} | {'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'} |
GHSA | GHSA-265q-28rp-chq5 | Insecure Entropy Source - Math.random() in node-uuid | Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's.
## Recommendation
Update to version 1.4.4 or later. | {'CVE-2015-8851'} | 2021-08-23T15:25:55Z | 2020-04-16T03:14:50Z | HIGH | 7.5 | {'CWE-331'} | {'https://github.com/broofa/node-uuid/issues/122', 'https://nodesecurity.io/advisories/93', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851', 'https://www.npmjs.com/advisories/93', 'https://github.com/broofa/node-uuid/issues/108', 'http://www.openwall.com/lists/oss-security/2016/04/13/8', 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://github.com/advisories/GHSA-265q-28rp-chq5'} | null | {'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'} | {'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'} |
GHSA | GHSA-3xph-cp8f-2229 | Prototype Pollution in @fabiocaccamo/utils.js | utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). | {'CVE-2021-3815'} | 2021-12-13T13:10:41Z | 2021-12-10T20:31:32Z | HIGH | 8 | {'CWE-1321'} | {'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0', 'https://github.com/advisories/GHSA-3xph-cp8f-2229', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815'} | null | {'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'} | {'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'} |
GHSA | GHSA-97cc-825c-399g | Cross site scripting in remdex/livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4050'} | 2021-12-10T20:33:29Z | 2021-12-10T20:33:29Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05', 'https://github.com/advisories/GHSA-97cc-825c-399g'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'} | {'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'} |
GHSA | GHSA-xrjf-phvv-r4vr | Command injection in strapi | When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user input. | {'CVE-2022-0764'} | 2022-03-09T20:26:22Z | 2022-02-27T00:00:15Z | MODERATE | 6.1 | {'CWE-77', 'CWE-78'} | {'https://github.com/advisories/GHSA-xrjf-phvv-r4vr', 'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'} | null | {'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'} | {'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'} |
GHSA | GHSA-m5vx-8chx-qvmm | Form validation can be skipped | ### Impact
By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators.
We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified.
That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent.
### Patches
https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246
### Workarounds
Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data.
Alternatively a custom Finisher can be added as first finisher.
### References
This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567
Original report: https://tickets.neos.io/#ticket/zoom/411 (internal) | {'CVE-2021-32697'} | 2022-04-19T19:02:59Z | 2021-06-22T15:15:08Z | MODERATE | 6.5 | {'CWE-20'} | {'https://github.com/advisories/GHSA-m5vx-8chx-qvmm', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm', 'https://github.com/neos/form/releases/tag/5.1.3'} | null | {'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'} | {'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'} |
GHSA | GHSA-q2xp-75m7-gv52 | Moderate severity vulnerability that affects net.sf.robocode:robocode.api | Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL. | {'CVE-2019-10648'} | 2021-07-27T20:33:52Z | 2019-04-02T15:36:49Z | CRITICAL | 9.8 | {'CWE-862', 'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10648', 'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f', 'https://sourceforge.net/p/robocode/bugs/406/'} | null | {'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'} | {'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'} |
GHSA | GHSA-3hfw-x7gx-437c | Path traversal in Matrix Synapse | ### Impact
Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory.
The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact.
Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected.
### Patches
Server administrators should upgrade to 1.47.1 or later.
### Workarounds
Server administrators using a reverse proxy could, at the expense of losing media functionality, block the following endpoints:
* `/_matrix/media/r0/download/{serverName}/{mediaId}`
* `/_matrix/media/r0/download/{serverName}/{mediaId}/{fileName}`
* `/_matrix/media/r0/thumbnail/{serverName}/{mediaId}`
Alternatively, non-containerized deployments can be adapted to use the hardened systemd config, located at `contrib/systemd/override-hardened.conf`.
### References
n/a
### For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
| {'CVE-2021-41281'} | 2021-12-10T18:30:50Z | 2021-11-23T21:58:56Z | HIGH | 7.5 | {'CWE-22'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EU7QRE55U4IUEDLKT5IYPWL3UXMELFAS/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41281', 'https://github.com/matrix-org/synapse/commit/91f2bd090', 'https://github.com/advisories/GHSA-3hfw-x7gx-437c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N3WY56LCEZ4ZECLWV5KMAXF2PSMUB4F2/', 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1'} | null | {'https://github.com/matrix-org/synapse/commit/91f2bd090'} | {'https://github.com/matrix-org/synapse/commit/91f2bd090'} |
GHSA | GHSA-mrvj-7q4f-5p42 | Cross-site scripting in eZ Platform Kernel | ### Impact
In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.
### Patches
The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at:
https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109
### Important note
You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content. | null | 2021-03-19T19:56:42Z | 2021-03-19T19:56:42Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42'} | null | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'} |
GHSA | GHSA-jj8r-p9f5-fmvv | Cross-site Scripting in TYPO3 extension | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. | {'CVE-2021-36785'} | 2021-08-30T17:22:25Z | 2021-08-30T17:22:25Z | MODERATE | 8.5 | {'CWE-79'} | {'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://github.com/advisories/GHSA-jj8r-p9f5-fmvv', 'https://typo3.org/help/security-advisories/security', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'} | null | {'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'} | {'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'} |
GHSA | GHSA-mr6h-chqp-p9g2 | SQL Injection in gogs.io/gogs | SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues. | {'CVE-2014-8681'} | 2021-06-29T18:32:44Z | 2021-06-29T18:32:44Z | MODERATE | 6.5 | {'CWE-89'} | {'http://seclists.org/fulldisclosure/2014/Nov/31', 'http://gogs.io/docs/intro/change_log.html', 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695', 'https://www.exploit-db.com/exploits/35237', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8681', 'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8', 'https://github.com/advisories/GHSA-mr6h-chqp-p9g2', 'https://github.com/gogits/gogs/releases/tag/v0.5.8'} | null | {'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'} | {'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'} |
GHSA | GHSA-wvh7-5p38-2qfc | Storing Password in Local Storage | The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, "We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext."
Example Code:
```js
async () => {
const user = Parse.User.current()
if (user) {
user.setPassword('newpass')
await user.save()
}
}
```
After running the above code, the new password will be stored in localStorage as a property named "password".
Proposed Solution:
Before saving anything to localStorage, Parse should strip out any properties named "password" that are attempting to be stored with a Parse.User type object.
Configuration:
Parse SDK: 2.9.1
Parse Server: 3.9.0 | null | 2022-04-19T19:02:31Z | 2020-07-23T18:20:10Z | MODERATE | 0 | {'CWE-256'} | {'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'} | null | {'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'} | {'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'} |
GHSA | GHSA-c7j7-p5jq-26ff | Low severity vulnerability that affects passenger | Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. | {'CVE-2014-1831'} | 2021-12-03T14:11:35Z | 2018-10-10T17:29:20Z | LOW | 0 | null | {'http://openwall.com/lists/oss-security/2014/01/30/3', 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://github.com/phusion/passenger/commit/34b1087870c2', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'http://openwall.com/lists/oss-security/2014/01/28/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'} | null | {'https://github.com/phusion/passenger/commit/34b1087870c2'} | {'https://github.com/phusion/passenger/commit/34b1087870c2'} |
GHSA | GHSA-hxmr-5gv9-6p8v | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0. | {'CVE-2022-0575'} | 2022-02-24T13:06:38Z | 2022-02-15T00:02:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d', 'https://github.com/advisories/GHSA-hxmr-5gv9-6p8v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'} | null | {'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'} | {'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'} |
GHSA | GHSA-g3h8-cg9x-47qw | PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby | ### Impact
An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file.
Visitors without Panel access *cannot* use this attack vector.
### Patches
The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.4.5](https://github.com/getkirby/kirby/releases/tag/3.4.5). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
**Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.
### Workarounds
Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881).
### Credits
Thanks to Thore Imhof of Accenture for reporting the problem. | {'CVE-2020-26255'} | 2021-01-07T22:37:41Z | 2020-12-08T14:42:08Z | LOW | 6.8 | {'CWE-434'} | {'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://packagist.org/packages/getkirby/panel', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26255', 'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'https://github.com/advisories/GHSA-g3h8-cg9x-47qw', 'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881'} | null | {'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'} | {'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'} |
GHSA | GHSA-m38j-pmg3-v5x5 | Timing attack on django-basic-auth-ip-whitelist | ### Impact
Potential timing attack exists on websites where the basic authentication is used or configured, i.e. `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` is set. Currently the string comparison between configured credentials and the ones provided by users is performed through a character-by-character string comparison. This enables a possibility that attacker may time the time it takes the server to validate different usernames and password, and use this knowledge to work out the valid credentials. This attack is understood not to be realistic over the Internet. However, it may be achieved from within local networks where the website is hosted, e.g. from inside a data centre where a website's server is located.
Sites protected by IP address whitelisting only are unaffected by this vulnerability.
### Patches
This vulnerability has been fixed on version 0.3.4 of django-basic-auth-ip-whitelist. Update to version 0.3.4 as soon as possible and change basic authentication username and password configured on a Django project using this package.
### Workarounds
Stop using basic authentication and use the IP whitelisting component only. It can be achieved by not setting `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` in Django project settings.
### References
- [Django mailing list discussion](https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue at https://github.com/tm-kn/django-basic-auth-ip-whitelist/issues
* Email us at the email specified on the [security policy](https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/policy).
### Acknowledgements
Thanks to Thibaud Colas for reporting this. | {'CVE-2020-4071'} | 2022-04-19T19:02:29Z | 2020-06-23T19:58:27Z | LOW | 2.2 | {'CWE-208'} | {'https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/advisories/GHSA-m38j-pmg3-v5x5', 'https://github.com/advisories/GHSA-m38j-pmg3-v5x5', 'https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4071', 'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6'} | null | {'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6'} | {'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6'} |
GHSA | GHSA-cvcq-gmc3-q6m8 | Plain text storage of passwords in Apache Airflow | In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field. | {'CVE-2020-17511'} | 2020-12-17T21:00:56Z | 2020-12-17T21:00:56Z | MODERATE | 0 | {'CWE-312'} | {'https://github.com/advisories/GHSA-cvcq-gmc3-q6m8', 'https://lists.apache.org/thread.html/ree782a29d927b96bf0b39fb92e2f1f09ea3112a985f7a08ce93765ac%40%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17511', 'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665'} | null | {'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665'} | {'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665'} |
GHSA | GHSA-mxr5-mc97-63rc | Account Takeover in Octobercms | ### Impact
An attacker can request an account password reset and then gain access to the account using a specially crafted request.
- To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form.
### Patches
- Issue has been patched in Build 472 and v1.1.5
- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
### Workarounds
Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
### Recommendations
We recommend the following steps to make sure your server stays secure:
- Keep server OS and system software up to date.
- Keep October CMS software up to date.
- Use a multi-factor authentication plugin.
- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
### References
Bugs found as part of Solar Security CMS Research. Credits to:
• Andrey Basarygin
• Andrey Guzei
• Mikhail Khramenkov
• Alexander Sidukov
• Maxim Teplykh
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
| {'CVE-2021-32648'} | 2022-02-23T22:21:06Z | 2021-08-30T16:13:02Z | HIGH | 8.2 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9'} | null | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} |
GHSA | GHSA-9f8f-574q-8jmf | Manipulation of product reviews via API | ### Impact
Manipulation of product reviews via API
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| {'CVE-2021-37707'} | 2021-08-30T16:14:00Z | 2021-08-30T16:14:00Z | MODERATE | 6.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} | null | {'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} | {'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} |
GHSA | GHSA-cjw5-f2x5-r4q5 | Cross-site Scripting in TastyIgniter | TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS). | {'CVE-2022-0602'} | 2022-04-19T14:12:53Z | 2022-04-06T00:01:29Z | HIGH | 7.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0602', 'https://github.com/advisories/GHSA-cjw5-f2x5-r4q5', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'} | null | {'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'} | {'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'} |
GHSA | GHSA-6m8p-4fxj-pgc2 | OS Command Injection in mversion | The issue occurs because tagName user input is formatted inside the exec function is executed without any checks. | {'CVE-2020-7688'} | 2021-05-17T21:01:08Z | 2021-05-17T21:01:08Z | MODERATE | 7.8 | {'CWE-78'} | {'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482', 'https://github.com/advisories/GHSA-6m8p-4fxj-pgc2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688', 'https://github.com/418sec/huntr/pull/102', 'https://snyk.io/vuln/SNYK-JS-MVERSION-573174'} | null | {'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'} | {'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'} |
GHSA | GHSA-735v-wx75-xmmm | Cross-site Scripting in grav | In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering. | {'CVE-2022-0268'} | 2022-01-31T21:45:05Z | 2022-01-27T18:27:56Z | MODERATE | 5.7 | {'CWE-79'} | {'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/advisories/GHSA-735v-wx75-xmmm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} | null | {'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} | {'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} |
GHSA | GHSA-4fqx-74rv-638w | SQL Injection | Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data. | {'CVE-2019-3792'} | 2022-04-12T22:10:26Z | 2022-02-15T01:57:18Z | HIGH | 5.6 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-3792', 'https://github.com/concourse/concourse/blob/master/release-notes/v5.0.1.md#v501-note-1', 'https://github.com/advisories/GHSA-4fqx-74rv-638w', 'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727', 'https://pivotal.io/security/cve-2019-3792'} | null | {'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'} | {'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'} |
GHSA | GHSA-68hw-vfh7-xvg8 | Forced Logout in keycloak-connect | Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely.
## Recommendation
Upgrade to version 4.4.0 or later. | {'CVE-2019-10157'} | 2021-08-16T15:25:09Z | 2019-06-13T20:38:09Z | MODERATE | 5.5 | {'CWE-287', 'CWE-345'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157', 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920', 'http://www.securityfocus.com/bid/108734', 'https://www.npmjs.com/advisories/978', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157', 'https://github.com/advisories/GHSA-68hw-vfh7-xvg8', 'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'} | null | {'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'} | {'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'} |
GHSA | GHSA-2452-3rwv-x89c | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300. | {'CVE-2019-1298'} | 2021-03-29T20:56:01Z | 2021-03-29T20:56:01Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/advisories/GHSA-2452-3rwv-x89c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298'} | null | {'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782'} |
GHSA | GHSA-q5vh-6whw-x745 | Improper Authorization and Origin Validation Error in OneFuzz | ## Impact
Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance.
To be vulnerable, a OneFuzz deployment must be:
* Version 2.12.0 or greater
* Deployed with the non-default [`--multi_tenant_domain`](https://github.com/microsoft/onefuzz/blob/2.30.0/src/deployment/deploy.py#L1021) option
This can result in read/write access to private data such as:
* Software vulnerability and crash information
* Security testing tools
* Proprietary code and symbols
Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources.
## Patches
This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist.
## Workarounds
Users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option.
## References
You can find an overview of the Microsoft Identity Platform [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-overview). This vulnerability applies to the multi-tenant application pattern, as described [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant).
## For more information
If you have any questions or comments about this advisory:
* Open an issue in [OneFuzz](https://github.com/microsoft/onefuzz)
* Email us at [fuzzing@microsoft.com](mailto:fuzzing@microsoft.com) | {'CVE-2021-37705'} | 2021-08-26T21:15:35Z | 2021-08-13T20:16:32Z | CRITICAL | 10 | {'CWE-346', 'CWE-285'} | {'https://github.com/advisories/GHSA-q5vh-6whw-x745', 'https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745', 'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1', 'https://github.com/microsoft/onefuzz/releases/tag/2.31.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37705', 'https://github.com/microsoft/onefuzz/pull/1153', 'https://pypi.org/project/onefuzz/'} | null | {'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1'} | {'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1'} |
GHSA | GHSA-w6rc-q387-vpgq | Moderate severity vulnerability that affects passenger | ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/. | {'CVE-2013-4136'} | 2021-08-30T14:56:55Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-59'} | {'https://github.com/advisories/GHSA-w6rc-q387-vpgq', 'http://www.openwall.com/lists/oss-security/2013/07/16/6', 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136', 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b', 'https://code.google.com/p/phusion-passenger/issues/detail?id=910', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'} | null | {'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'} | {'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'} |
GHSA | GHSA-wcv5-vrvr-3rx2 | Integer Overflow or Wraparound in TensorFlow | ### Impact
The Grappler component of TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) in [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L963-L1035):
```cc
for (const auto& output_prop : output_props) {
const PartialTensorShape output_shape(output_prop.shape());
// ...
}
```
The `output_prop` tensor has a shape that is controlled by user input and this can result in triggering one of the `CHECK`s in the `PartialTensorShape` constructor. This is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197).
### Patches
We have patched the issue in GitHub commit [be7b286d40bc68cb0b56f702186cc4837d508058](https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | null | 2022-02-09T23:34:06Z | 2022-02-09T23:34:06Z | MODERATE | 5.5 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2', 'https://github.com/advisories/GHSA-wcv5-vrvr-3rx2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'} | null | {'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058'} | {'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058'} |
GHSA | GHSA-cchx-mfrc-fwqr | Improper authentication in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security. | {'CVE-2019-10911'} | 2021-09-30T18:40:16Z | 2020-02-12T18:45:08Z | HIGH | 7.5 | {'CWE-200', 'CWE-287'} | {'https://github.com/advisories/GHSA-cchx-mfrc-fwqr', 'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911', 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml', 'https://symfony.com/cve-2019-10911', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19'} | null | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'} | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'} |
GHSA | GHSA-p6rw-44q7-3fw4 | Stored XSS in Jupyter nbdime | ### Impact
Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected.
### Patches
Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package.
#### Python
- nbdime 1.x: Patched in v. 1.1.1
- nbdime 2.x: Patched in v. 2.1.1
- nbdime 3.x: Patched in v. 3.1.1
#### npm
- nbdime 6.x version: Patched in 6.1.2
- nbdime 5.x version: Patched in 5.0.2
- nbdime-jupyterlab 1.x version: Patched in 1.0.1
- nbdime-jupyterlab 2.x version: Patched in 2.1.1
### For more information
If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org).
| {'CVE-2021-41134'} | 2022-04-19T19:03:10Z | 2021-11-08T18:09:27Z | HIGH | 8.7 | {'CWE-79'} | {'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea', 'https://github.com/advisories/GHSA-p6rw-44q7-3fw4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134'} | null | {'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'} | {'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'} |
GHSA | GHSA-fx95-883v-4q4h | Path traversal in github.com/valyala/fasthttp | The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only. | {'CVE-2022-21221'} | 2022-03-29T22:03:10Z | 2022-03-18T00:01:11Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866', 'https://github.com/advisories/GHSA-fx95-883v-4q4h', 'https://github.com/valyala/fasthttp/issues/1226', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21221', 'https://github.com/valyala/fasthttp/releases/tag/v1.34.0'} | null | {'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1'} | {'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1'} |
GHSA | GHSA-5rwj-j5m3-3chj | Missing Release of Memory after Effective Lifetime in detect-character-encoding | ### Impact
In detect-character-encoding v0.3.0 and earlier, allocated memory is not released.
### Patches
The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, using detect-character-encoding in a program accessible over the internet which becomes unavailable when running out of memory. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const detectCharacterEncoding = require("detect-character-encoding");
const app = express();
app.get("/", (req, res) => {
detectCharacterEncoding(Buffer.from("foo"));
res.end();
});
app.listen(3000);
```
`hey -n 1000000 http://localhost:3000` ([`hey`](https://github.com/rakyll/hey)) causes the Node.js process to consume more and more memory.
### References
- https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588
- https://github.com/sonicdoe/detect-character-encoding/pull/6 | {'CVE-2021-39176'} | 2022-04-19T19:03:06Z | 2021-09-01T18:25:16Z | HIGH | 7.5 | {'CWE-401'} | {'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1', 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588', 'https://github.com/sonicdoe/detect-character-encoding/pull/6', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj', 'https://github.com/advisories/GHSA-5rwj-j5m3-3chj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39176'} | null | {'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'} | {'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'} |
GHSA | GHSA-36hf-6hp2-9g4c | Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms | In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp. | {'CVE-2019-13237'} | 2022-04-19T20:07:03Z | 2019-11-12T22:58:14Z | MODERATE | 4.3 | {'CWE-200', 'CWE-22'} | {'https://github.com/advisories/GHSA-36hf-6hp2-9g4c', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237'} | null | {'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'} | {'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'} |
GHSA | GHSA-2h3j-m7gr-25xj | Excessive Iteration Denial of Service in Apache PDFBox | A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | {'CVE-2021-27807'} | 2022-04-22T18:28:01Z | 2021-06-16T17:56:46Z | MODERATE | 5.5 | {'CWE-834'} | {'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-4892', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E', 'https://svn.apache.org/viewvc?view=revision&revision=1886911', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27807', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://github.com/advisories/GHSA-2h3j-m7gr-25xj', 'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null | {'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'} | {'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'} |
GHSA | GHSA-h6jh-7gv5-28vg | Bad alloc in `StringNGrams` caused by integer conversion | ### Impact
The implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value.
```python
import tensorflow as tf
tf.raw_ops.StringNGrams(
data=['',''],
data_splits=[0,2],
separator=' '*100,
ngram_widths=[-80,0,0,-60],
left_pad=' ',
right_pad=' ',
pad_width=100,
preserve_short_sequences=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer.
### Patches
We have patched the issue in GitHub commit [c283e542a3f422420cfdb332414543b62fc4e4a5](https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37646'} | 2021-08-25T14:43:34Z | 2021-08-25T14:43:34Z | MODERATE | 5.5 | {'CWE-681'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg', 'https://github.com/advisories/GHSA-h6jh-7gv5-28vg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37646', 'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'} | null | {'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'} | {'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'} |
GHSA | GHSA-49r3-2549-3633 | omniauth-apple allows attacker to fake their email address during authentication | ### Impact
This vulnerability impacts applications using the [omniauth-apple](https://github.com/nhosoya/omniauth-apple) strategy of OmniAuth and using the `info.email` field of OmniAuth's [Auth Hash Schema](https://github.com/omniauth/omniauth/wiki/Auth-Hash-Schema) for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users.
For example, an application using omniauth-apple with the following code will be impacted:
```ruby
def omniauth_callback
auth_hash = request.env['omniauth.auth']
@authenticated_user = User.find_by(email: auth_hash.info.email)
end
```
Applications not using `info.email` for identification but are instead using the `uid` field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of `info.email` is being used for other purposes.
### Patches
Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later.
### Workarounds
If unable to upgrade to a patched version, monkey patching `OmniAuth::Strategies::Apple#email` as follows is advised as a workaround:
```ruby
module OmniAuth
module Strategies
class Apple
def email
id_info['email']
end
end
end
end
``` | {'CVE-2020-26254'} | 2022-04-19T19:02:41Z | 2020-12-08T14:18:19Z | LOW | 7.7 | {'CWE-290'} | {'https://github.com/nhosoya/omniauth-apple/security/advisories/GHSA-49r3-2549-3633', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26254', 'https://github.com/nhosoya/omniauth-apple/blob/master/CHANGELOG.md#101---2020-12-03', 'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016', 'https://github.com/advisories/GHSA-49r3-2549-3633'} | null | {'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016'} | {'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016'} |
GHSA | GHSA-4cxw-hq44-r344 | Off-by-one Error in v2fly/v2ray-core | v2fly/v2ray-core prior to 4.44.0 is vulnerable to an off-by-one error. Indexing operations on arrays, slices, or strings should use an index at most one less than the length. If the index is checked for being less than or equal to the length (`<=`), instead of less than the length (`<`), the index could be out of bounds. | {'CVE-2021-4070'} | 2022-03-03T19:17:50Z | 2022-02-24T00:00:52Z | CRITICAL | 9.1 | {'CWE-193'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4070', 'https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877', 'https://github.com/advisories/GHSA-4cxw-hq44-r344', 'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'} | null | {'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'} | {'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'} |
GHSA | GHSA-prcg-wp5q-rv7p | Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes | ### Impact
TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary.
For example [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408) calls should be replaced by [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440).
This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs).
### Patches
We have patched the issue in GitHub commits [7c1692bd417eb4f9b33ead749a41166d6080af85](https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85) (merging [#51732](https://github.com/tensorflow/tensorflow/pull/51732)), [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51717](https://github.com/tensorflow/tensorflow/pull/51717)), [a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf](https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf) (merging [#51658](https://github.com/tensorflow/tensorflow/pull/51658)), and [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51973](https://github.com/tensorflow/tensorflow/pull/51973)). It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered.
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46890), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51618) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51908). | {'CVE-2021-41197'} | 2021-11-10T19:35:35Z | 2021-11-10T19:35:35Z | MODERATE | 5.5 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://github.com/tensorflow/tensorflow/issues/46890', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p', 'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41197', 'https://github.com/tensorflow/tensorflow/issues/51908', 'https://github.com/advisories/GHSA-prcg-wp5q-rv7p'} | null | {'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15', 'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf'} | {'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'} |
GHSA | GHSA-hr32-mgpm-qf2f | Generation of Error Message Containing Sensitive Information in RESTEasy client | A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality. | {'CVE-2020-25633'} | 2022-04-19T19:03:26Z | 2021-06-03T23:41:34Z | MODERATE | 5.3 | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25633', 'https://issues.redhat.com/browse/RESTEASY-2820', 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633', 'https://github.com/advisories/GHSA-hr32-mgpm-qf2f'} | null | {'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'} | {'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'} |
GHSA | GHSA-688c-3x49-6rqj | Moderate severity vulnerability that affects rack-protection | Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0. | {'CVE-2018-1000119'} | 2021-09-02T15:42:02Z | 2018-03-07T22:22:22Z | MODERATE | 5.9 | {'CWE-203'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119', 'https://www.debian.org/security/2018/dsa-4247', 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109', 'https://github.com/advisories/GHSA-688c-3x49-6rqj', 'https://access.redhat.com/errata/RHSA-2018:1060', 'https://github.com/sinatra/rack-protection/pull/98'} | null | {'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb'} | {'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb'} |
GHSA | GHSA-pjc4-3w99-j7v4 | Open redirect in Flask-Unchained | This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | {'CVE-2021-23393'} | 2022-01-10T21:33:31Z | 2021-06-15T15:56:59Z | MODERATE | 5.4 | {'CWE-601'} | {'https://github.com/advisories/GHSA-pjc4-3w99-j7v4', 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23393', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad', 'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40'} | null | {'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'} | {'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'} |
GHSA | GHSA-465w-gg5p-85c9 | Insufficient Session Expiration in Kiali | An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration. | {'CVE-2020-1762'} | 2021-05-18T21:09:01Z | 2021-05-18T21:09:01Z | HIGH | 8.6 | {'CWE-384', 'CWE-613', 'CWE-295'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762', 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1762', 'https://bugzilla.redhat.com/show_bug.cgi?id=1810387', 'https://kiali.io/news/security-bulletins/kiali-security-001/', 'https://github.com/advisories/GHSA-465w-gg5p-85c9', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1'} | null | {'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1'} | {'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1', 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c'} |
GHSA | GHSA-f9p3-h6cg-2cjr | Improper neutralization of formula elements in yii-helpers | Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data. | {'CVE-2022-1544'} | 2022-05-04T03:01:04Z | 2022-05-03T00:00:46Z | HIGH | 0 | {'CWE-1236'} | {'https://github.com/advisories/GHSA-f9p3-h6cg-2cjr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} | null | {'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} | {'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} |
GHSA | GHSA-jf5r-8hm2-f872 | Incorrect hostname / protocol due to unstripped leading control characters. | Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.
If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect.
This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example:
`````
const parse = require('url-parse')
const express = require('express')
const app = express()
const port = 3000
url = parse(\"\\bjavascript:alert(1)\")
console.log(url)
app.get('/', (req, res) => {
if (url.protocol !== \"javascript:\") {res.send(\"<a href=\\'\" + url.href + \"\\'>CLICK ME!</a>\")}
})
app.listen(port, () => {
console.log(`Example app listening on port ${port}`)
})
````` | {'CVE-2022-0691'} | 2022-03-29T22:16:44Z | 2022-02-22T00:00:30Z | MODERATE | 6.5 | {'CWE-639'} | {'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63', 'https://github.com/advisories/GHSA-jf5r-8hm2-f872', 'https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691'} | null | {'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'} | {'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'} |
GHSA | GHSA-4r65-35qq-ch8j | Ansible discloses sensitive information in traceback error message | Ansible is an IT automation system that handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. A flaw was found in Ansible Engine's ansible-connection module where sensitive information, such as the Ansible user credentials, is disclosed by default in the traceback error message when Ansible receives an unexpected response from `set_options`. The highest threat from this vulnerability is confidentiality. | {'CVE-2021-3620'} | 2022-04-05T19:53:27Z | 2022-03-04T00:00:17Z | MODERATE | 5.5 | {'CWE-209'} | {'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2022-164.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3620', 'https://github.com/advisories/GHSA-4r65-35qq-ch8j', 'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0', 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes', 'https://bugzilla.redhat.com/show_bug.cgi?id=1975767'} | null | {'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0'} | {'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0'} |
GHSA | GHSA-63qx-x74g-jcr7 | Path traversal and dereference of symlinks in Argo CD | ### Impact
All versions of Argo CD are vulnerable to a path traversal bug that allows to pass arbitrary values files to be consumed by Helm charts.
Additionally, it is possible to craft special Helm chart packages containing value files that are actually symbolic links, pointing to arbitrary files outside the repository's root directory.
If an attacker with permissions to create or update Applications knows or can guess the full path to a file containing valid YAML, they can create a malicious Helm chart to consume that YAML as values files, thereby gaining access to data they would otherwise have no access to.
The impact can especially become critical in environments that make use of encrypted value files (e.g. using plugins with git-crypt or SOPS) containing sensitive or confidential data, and decrypt these secrets to disk before rendering the Helm chart.
Also, because any error message from `helm template` is passed back to the user, and these error messages are quite verbose, enumeration of files on the repository server's file system is possible.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.3.0
* v2.2.4
* v2.1.9
We urge users of Argo CD to update their installation to one of the fixed versions as listed above.
### Workarounds
No workaround for this issue.
### References
* https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24348
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd`
### Credits
The path traversal vulnerability was discovered and reported by Moshe Zioni, VP Security Research, [Apiiro](https://www.apiiro.com).
During the development of a fix for the path traversal vulnerability, the Argo CD team discovered the related issue with symbolic links.
The Argo CD team would like to thank Moshe Zioni for the responsible disclosure, and the constructive discussions during handling this issue!
| {'CVE-2022-24348'} | 2022-02-11T22:52:24Z | 2022-02-07T19:06:18Z | HIGH | 7.7 | {'CWE-200', 'CWE-22'} | {'https://github.com/advisories/GHSA-63qx-x74g-jcr7', 'https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments/', 'https://github.com/argoproj/argo-cd/releases/tag/v2.1.9', 'https://github.com/argoproj/argo-cd/releases/tag/v2.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24348', 'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-63qx-x74g-jcr7'} | null | {'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'} | {'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'} |
GHSA | GHSA-mh83-jcw5-rjh8 | XML External Entity Reference in edu.stanford.nlp:stanford-corenlp | The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks. | {'CVE-2022-0198'} | 2022-01-20T15:33:36Z | 2022-01-14T21:07:23Z | MODERATE | 6.1 | {'CWE-611'} | {'https://github.com/advisories/GHSA-mh83-jcw5-rjh8', 'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d', 'https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0198'} | null | {'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'} | {'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'} |
GHSA | GHSA-7x2h-3v2v-24p9 | Cross-Site Request Forgery in microweber | microweber version 1.2.10 and prior is vulnerable to cross-site request forgery. | {'CVE-2022-0505'} | 2022-02-15T00:17:23Z | 2022-02-09T00:00:31Z | MODERATE | 6.5 | {'CWE-352'} | {'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292', 'https://github.com/advisories/GHSA-7x2h-3v2v-24p9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'} | null | {'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'} | {'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'} |
GHSA | GHSA-hxf9-7h4c-f5jv | Django-Anymail prone to a timing attack | webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events. | {'CVE-2018-6596'} | 2022-04-26T18:07:14Z | 2018-07-12T20:30:40Z | CRITICAL | 9.1 | {'CWE-200'} | {'https://github.com/anymail/django-anymail/releases/tag/v1.3', 'https://github.com/anymail/django-anymail/releases/tag/v1.2.1', 'https://github.com/advisories/GHSA-hxf9-7h4c-f5jv', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6596', 'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://bugs.debian.org/889450', 'https://www.debian.org/security/2018/dsa-4107'} | null | {'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5'} | {'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5'} |
GHSA | GHSA-897m-rjf5-jp39 | Prototype Pollution in copy-props | The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality. | {'CVE-2020-28503'} | 2022-01-06T20:35:05Z | 2022-01-06T20:35:05Z | HIGH | 7.3 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-897m-rjf5-jp39', 'https://github.com/gulpjs/copy-props/pull/7', 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047', 'https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870'} | null | {'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'} | {'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'} |
GHSA | GHSA-9qmh-276g-x5pj | Prototype Pollution in immer | ## Overview
Affected versions of immer are vulnerable to Prototype Pollution.
## Proof of exploit
```
const {applyPatches, enablePatches} = require("immer");
enablePatches();
let obj = {};
console.log("Before : " + obj.polluted);
applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]);
// applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]);
console.log("After : " + obj.polluted);
```
## Remediation
Version 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended. | {'CVE-2020-28477'} | 2021-01-20T21:27:56Z | 2021-01-20T21:27:56Z | HIGH | 0 | {'CWE-471'} | {'https://github.com/immerjs/immer/issues/738', 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213', 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986', 'https://github.com/advisories/GHSA-9qmh-276g-x5pj', 'https://snyk.io/vuln/SNYK-JS-IMMER-1019369', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28477', 'https://www.npmjs.com/package/immer'} | null | {'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'} | {'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'} |
GHSA | GHSA-p4jg-pccf-h82c | Insecure Temporary File in SWHKD | SWHKD is a display protocol-independent hotkey daemon made in Rust. In SWHKD versions 1.1.5 and prior, SWHKD uses the /tmp/swhkd.pid pathname. As /tmp is accessible to all users, there can be an information leak or denial of service. No known workarounds exist. A patch is available on the `1.1.0` branch of the repository. | {'CVE-2022-27815'} | 2022-04-19T18:21:49Z | 2022-03-31T00:00:24Z | CRITICAL | 9.1 | {'CWE-377'} | {'https://github.com/advisories/GHSA-p4jg-pccf-h82c', 'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa', 'http://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27815', 'https://github.com/waycrate/swhkd/releases'} | null | {'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'} | {'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'} |
GHSA | GHSA-35jh-r3h4-6jhm | Command Injection in lodash | `lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function. | {'CVE-2021-23337'} | 2022-04-19T19:03:27Z | 2021-05-06T16:05:51Z | HIGH | 7.2 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23337', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928', 'https://snyk.io/vuln/SNYK-JS-LODASH-1040724', 'https://github.com/advisories/GHSA-35jh-r3h4-6jhm', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851', 'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c', 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931'} | null | {'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'} | {'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'} |
GHSA | GHSA-jq4p-mq33-w375 | Cross-site Scripting when rendering error messages in laminas-form | ### Impact
When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Site Scripting (XSS) attack.
### Patches
The following versions were issued to mitigate the vulnerability:
- 2.17.1
- 3.0.2
- 3.1.1
### Workarounds
At the top of a view script where you call the `formElementErrors()` view helper, place the following code:
```php
use Laminas\Form\ElementInterface;
use Laminas\View\PhpRenderer;
$escapeMessages = function (ElementInterface $formOrElement, PhpRenderer $renderer): void {
$messages = $element->getMessages();
if (! $messages) {
return;
}
$escaped = [];
array_walk_recursive(
$messages,
static function (string $item) use (&$escaped, $renderer): void {
$escaped[] = $renderer->escapeHtml($item);
}
};
$element->setMessages($escaped);
};
```
Before calling `formElementErrors()` with a form, fieldset, or element, call the above closure as follows
```php
// Usage with a form
// $this is the view renderer
$escapeMessages($form, $this);
// Usage with a fieldset
// $this is the view renderer
$escapeMessages($fieldset, $this);
// Usage with a form element
// $this is the view renderer
$escapeMessages($element, $this);
```
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/laminas/laminas-form/issues/new)
* Email us at [security@getlaminas.org](mailto:security@getlaminas.org) | {'CVE-2022-23598'} | 2022-02-11T21:08:54Z | 2022-01-28T23:08:29Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23598', 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFF6WJ5I7PSEBRF6I753WKE2BXFBGQXE/', 'https://github.com/advisories/GHSA-jq4p-mq33-w375', 'https://getlaminas.org/security/advisory/LP-2022-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLNABVK26CE4PFL57VLY242FW3QY4CPC/'} | null | {'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'} | {'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'} |
GHSA | GHSA-2457-2263-mm9f | Memory leak in micronaut-core | ### Impact
Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state.
### Patches
The problem is patched in Micronaut 3.2.7 and above.
### Workarounds
The default content type binder can be replaced in an existing Micronaut application to mitigate the issue:
```java
package example;
import java.util.List;
import io.micronaut.context.annotation.Replaces;
import io.micronaut.core.convert.ConversionService;
import io.micronaut.http.MediaType;
import io.micronaut.http.bind.DefaultRequestBinderRegistry;
import io.micronaut.http.bind.binders.RequestArgumentBinder;
import jakarta.inject.Singleton;
@Singleton
@Replaces(DefaultRequestBinderRegistry.class)
class FixedRequestBinderRegistry extends DefaultRequestBinderRegistry {
public FixedRequestBinderRegistry(ConversionService conversionService,
List<RequestArgumentBinder> binders) {
super(conversionService, binders);
}
@Override
protected void registerDefaultConverters(ConversionService<?> conversionService) {
super.registerDefaultConverters(conversionService);
conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> {
try {
return MediaType.of(charSequence);
} catch (IllegalArgumentException e) {
return null;
}
});
}
}
```
### References
Commit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues)
* Email us at [info@micronaut.io](mailto:info@micronaut.io)
| {'CVE-2022-21700'} | 2022-04-19T19:03:20Z | 2022-01-21T23:19:36Z | MODERATE | 5.3 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21700', 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3', 'https://github.com/advisories/GHSA-2457-2263-mm9f', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f'} | null | {'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'} | {'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'} |
GHSA | GHSA-2mq8-99q7-55wx | Code injection in keycloak | A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-20222'} | 2021-05-13T22:29:51Z | 2021-05-13T22:29:51Z | HIGH | 8.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-2mq8-99q7-55wx', 'https://bugzilla.redhat.com/show_bug.cgi?id=1924606', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20222', 'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741', 'https://access.redhat.com/security/cve/cve-2021-20222'} | null | {'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'} | {'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'} |
GHSA | GHSA-75p7-527p-w8wp | Server-Side Request Forgery and Open Redirect in AllTube Download | ### Impact
On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured).
The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.)
### Patches
3.0.3 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
The fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/3d092891044f2685ed66c73c870a021bee319c37/patches/youtube-dl-disable-generic.diff) to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched.
However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**.
### References
* https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a
* https://github.com/ytdl-org/youtube-dl/issues/30691
| {'CVE-2022-24739'} | 2022-04-19T19:03:26Z | 2022-03-09T15:17:31Z | HIGH | 7.3 | {'CWE-601', 'CWE-918'} | {'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/advisories/GHSA-75p7-527p-w8wp', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp'} | null | {'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | {'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'} |
GHSA | GHSA-c52f-pq47-2r9j | plugin.yaml file allows for duplicate entries in helm | ### Impact
During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack.
To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection).
### Patches
This issue has been patched in Helm 2.16.11 and Helm 3.3.2.
### Workarounds
Make sure to install plugins using a secure connection protocol like SSL. | {'CVE-2020-15187'} | 2021-11-19T15:21:03Z | 2021-05-24T16:57:21Z | LOW | 3 | {'CWE-74', 'CWE-694'} | {'https://github.com/helm/helm/security/advisories/GHSA-c52f-pq47-2r9j', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15187', 'https://github.com/advisories/GHSA-c52f-pq47-2r9j', 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b'} | null | {'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'} | {'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.