ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-xg75-q3q5-cqmv
Denial of Service in http-swagger
### Impact Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system. ### Patches Yes. Please upgrade to v1.2.6. ### Workarounds A workaround is to restrict the path prefix to the "GET" method. As shown below ``` func main() { r := mux.NewRouter() r.PathPrefix("/swagger/").Handler(httpSwagger.Handler( httpSwagger.URL("http://localhost:1323/swagger/doc.json"), //The url pointing to API definition httpSwagger.DeepLinking(true), httpSwagger.DocExpansion("none"), httpSwagger.DomID("#swagger-ui"), )).Methods(http.MethodGet) ``` ### References Reporter dongguangli from https://www.huoxian.cn/ company ### For more information If you have any questions or comments about this advisory: * Open an issue in [http-swagger](https://github.com/swaggo/http-swagger/issues)
{'CVE-2022-24863'}
2022-04-28T18:12:34Z
2022-04-22T20:55:52Z
HIGH
7.5
{'CWE-400', 'CWE-755'}
{'https://github.com/swaggo/http-swagger/pull/62', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863', 'https://github.com/swaggo/http-swagger/releases/tag/v1.2.6', 'https://github.com/advisories/GHSA-xg75-q3q5-cqmv', 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv', 'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'}
null
{'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'}
{'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'}
GHSA
GHSA-g74r-ffvr-5q9f
Memory Exposure in concat-stream
Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()` Versions <1.3.0 are not affected due to not using unguarded Buffer constructor. ## Recommendation Update to version 1.5.2, 1.4.11, 1.3.2 or later. If you are unable to update make sure user provided input into the `write()` function is not a number.
null
2021-08-04T20:40:21Z
2019-06-03T17:26:44Z
MODERATE
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-g74r-ffvr-5q9f', 'https://github.com/maxogden/concat-stream/pull/47', 'https://nodesecurity.io/advisories/597', 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'}
null
{'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'}
{'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'}
GHSA
GHSA-2gwj-7jmv-h26r
SQL Injection in Django
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
{'CVE-2022-28346'}
2022-04-22T23:29:02Z
2022-04-13T00:00:33Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200', 'https://groups.google.com/forum/#!forum/django-announce', 'https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346', 'https://github.com/advisories/GHSA-2gwj-7jmv-h26r'}
null
{'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200'}
{'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200'}
GHSA
GHSA-8rcj-c8pj-v3m3
Reachable Assertion in Tensorflow
### Impact When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes. ### Patches We have patched the issue in GitHub commit [14fea662350e7c26eb5fe1be2ac31704e5682ee6](https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23564'}
2022-02-11T15:07:07Z
2022-02-09T23:55:28Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-8rcj-c8pj-v3m3', 'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23564', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3'}
null
{'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'}
{'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'}
GHSA
GHSA-5fg8-2547-mr8q
Misinterpretation of malicious XML input
### Impact xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0`) See issue #271 for the status of publishing `xmldom` to npm or join #270 for Q&A/discussion until it's resolved. ### Workarounds Downstream applications can validate the input and reject the maliciously crafted documents. ### References Similar to this one reported on the Go standard library: - https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ - https://mattermost.com/blog/securing-xml-implementations-across-the-web/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) * Email us: send an email to **all** addresses that are shown by `npm owner ls @xmldom/xmldom`
{'CVE-2021-32796'}
2022-01-04T19:36:30Z
2021-08-03T16:57:05Z
MODERATE
6.5
{'CWE-116'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b', 'https://github.com/advisories/GHSA-5fg8-2547-mr8q', 'https://mattermost.com/blog/securing-xml-implementations-across-the-web/', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://www.npmjs.com/package/@xmldom/xmldom'}
null
{'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'}
{'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'}
GHSA
GHSA-fq6p-x6j3-cmmq
Denial of service in three
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms")
{'CVE-2020-28496'}
2021-03-01T19:57:16Z
2021-03-01T19:57:16Z
HIGH
0
{'CWE-400'}
{'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/advisories/GHSA-fq6p-x6j3-cmmq', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931'}
null
{'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'}
{'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'}
GHSA
GHSA-8948-ffc6-jg52
Insecure Default Configuration in redbird
Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable. ## Recommendation Upgrade to version 0.9.1 or later.
null
2021-08-04T20:58:53Z
2019-06-06T15:32:21Z
MODERATE
4.2
{'CWE-20'}
{'https://github.com/OptimalBits/redbird/pull/207', 'https://www.npmjs.com/advisories/828', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455', 'https://github.com/advisories/GHSA-8948-ffc6-jg52', 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'}
null
{'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'}
{'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'}
GHSA
GHSA-qmqc-x3r4-6v39
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
{'CVE-2019-14893'}
2021-02-25T20:18:58Z
2020-05-15T18:59:07Z
HIGH
0
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2020:0729', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20200327-0006/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893', 'https://github.com/advisories/GHSA-qmqc-x3r4-6v39'}
null
{'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'}
{'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317'}
GHSA
GHSA-84j7-475p-hp8v
HTTP Response Splitting in Puma
In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
{'CVE-2020-5247'}
2021-01-08T20:28:16Z
2020-02-28T16:53:55Z
MODERATE
6.5
{'CWE-113'}
{'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://github.com/advisories/GHSA-84j7-475p-hp8v'}
null
{'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'}
{'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'}
GHSA
GHSA-jp4j-47f9-2vc3
Integer Overflow or Wraparound in NATS Server
An integer overflow in NATS Server 2.0.0 allows a remote attacker to crash the server by sending a crafted request.
{'CVE-2019-13126'}
2021-05-18T18:14:55Z
2021-05-18T18:14:55Z
HIGH
7.1
{'CWE-190'}
{'https://github.com/nats-io/nats-server/commits/master', 'https://github.com/advisories/GHSA-jp4j-47f9-2vc3', 'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda', 'https://github.com/nats-io/nats-server/pull/1053', 'https://github.com/nats-io/nats-server/pull/1441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13126', 'https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/'}
null
{'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'}
{'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'}
GHSA
GHSA-mpgr-2cx9-327h
Information disclosure in SSB-DB
### Impact _What kind of vulnerability is it? Who is impacted?_ Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately. **There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.** The `get()` method is supposed to only decrypt messages when you explicitly ask it to, but there's a bug where it's decrypting any message that it can. This means that it's returning the decrypted content of private messages, which a malicious peer could use to get access to private data. This only affects peers running SSB-DB@20.0.0 who also have private messages, and is only known to be exploitable if you're also running SSB-OOO (default in SSB-Server), which exposes a thin wrapper around `get()` to anonymous peers. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, please upgrade to SSB-DB 20.0.1 (or SSB-Server 16.0.1) immediately. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ You may be able to disable the most obvious attack vector, SSB-OOO, by disabling the plugin, but you should upgrade immediately anyway. ### For more information If you have any questions or comments about this advisory, open an issue in [SSB-DB](https://github.com/ssbc/ssb-db/)
{'CVE-2020-4045'}
2022-04-19T19:02:28Z
2020-06-11T21:09:04Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h', 'https://github.com/advisories/GHSA-mpgr-2cx9-327h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'}
null
{'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'}
{'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'}
GHSA
GHSA-p48w-vf3c-rqjx
Cross-Site Scripting in Bootstrap Package
### Problem It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. The following templates are affected by the vulnerability: * `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html` * `Resources/Private/Partials/ContentElements/Header/SubHeader.html` Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b). ### Solution Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
{'CVE-2021-21365'}
2022-04-19T19:02:55Z
2021-04-29T21:51:21Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/advisories/GHSA-p48w-vf3c-rqjx'}
null
{'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
{'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
GHSA
GHSA-qpw2-xchm-655q
Out-of-Bounds read in stringstream
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x). # WITHDRAWN This is a duplicate of GHSA-mf6x-7mm4-x2g7
null
2022-01-06T20:31:08Z
2022-01-06T20:31:01Z
MODERATE
6.5
{'CWE-125'}
{'https://github.com/mhart/StringStream/issues/7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21270', 'https://github.com/advisories/GHSA-qpw2-xchm-655q', 'https://www.npmjs.com/advisories/664', 'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274', 'https://hackerone.com/reports/321670'}
null
{'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'}
{'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'}
GHSA
GHSA-f5fj-7265-jxhj
Information Exposure
Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1.
{'CVE-2018-1000803'}
2022-04-12T22:02:36Z
2022-02-15T01:57:18Z
MODERATE
5.3
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000803', 'https://github.com/advisories/GHSA-f5fj-7265-jxhj', 'https://github.com/go-gitea/gitea/pull/4664', 'https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57', 'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'}
null
{'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'}
{'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'}
GHSA
GHSA-w89r-qch4-8jv5
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0912'}
2021-03-29T20:59:59Z
2021-03-29T20:59:59Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://github.com/advisories/GHSA-w89r-qch4-8jv5'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'}
GHSA
GHSA-wmg4-8cp2-hpg9
Denial of service attack via memory exhaustion
### Impact Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service. Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service. This affects any server which accepts registration requests from untrusted clients. ### Patches Patched by 89071a1, 0523511, f56eee3. ### Workarounds Request sizes can be limited in an HTTP reverse-proxy. There are no known workarounds for the problem with overlarge responses. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-29430'}
2021-04-19T14:54:04Z
2021-04-19T14:54:04Z
LOW
0
{'CWE-20', 'CWE-400'}
{'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430', 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7'}
null
{'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7', 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'}
{'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7', 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'}
GHSA
GHSA-p5w8-wqhj-9hhf
StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)
### Impact The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments. ### Patches The issues has been fixed in sqlparse 0.4.2. ### Workarounds Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool. ### References This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/). ### For more information If you have any questions or comments about this advisory: * Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues) * Email us at [albrecht.andi@gmail.com](mailto:albrecht.andi@gmail.com)
{'CVE-2021-32839'}
2022-04-19T19:03:08Z
2021-09-10T17:56:06Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32839', 'https://github.com/advisories/GHSA-p5w8-wqhj-9hhf', 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf', 'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb', 'https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/'}
null
{'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb'}
{'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb'}
GHSA
GHSA-686h-j8r8-wmfm
Data races in rcu_cell
Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`. This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`. This can result in memory corruption caused by data races.
{'CVE-2020-36451'}
2021-08-25T20:57:14Z
2021-08-25T20:57:14Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://github.com/advisories/GHSA-686h-j8r8-wmfm', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://github.com/Xudong-Huang/rcu_cell/pull/4', 'https://github.com/Xudong-Huang/rcu_cell/issues/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36451', 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}
null
{'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}
{'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}
GHSA
GHSA-93wh-35r4-6qmw
Exposure of Sensitive Information to an Unauthorized Actor in moodle
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
{'CVE-2021-20281'}
2021-03-29T20:43:23Z
2021-03-29T20:43:23Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-93wh-35r4-6qmw', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939041', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281'}
null
{'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}
{'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}
GHSA
GHSA-2x75-mf24-588m
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1092'}
2021-03-29T20:59:11Z
2021-03-29T20:59:11Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-2x75-mf24-588m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1092', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'}
GHSA
GHSA-g6v7-vqhx-6v6c
XML External Entity Reference in org.opencms:opencms-core
An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.
{'CVE-2021-3312'}
2021-10-18T18:40:16Z
2021-10-12T17:23:40Z
MODERATE
6.5
{'CWE-611'}
{'https://github.com/advisories/GHSA-g6v7-vqhx-6v6c', 'https://github.com/alkacon/opencms-core/issues/721', 'https://github.com/alkacon/opencms-core/releases', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312', 'https://github.com/alkacon/opencms-core/issues/725'}
null
{'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}
{'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}
GHSA
GHSA-cgfm-62j4-v4rf
Heap out of bounds access in sparse reduction operations
### Impact The implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data: ```python import tensorflow as tf x = tf.SparseTensor( indices=[[773, 773, 773], [773, 773, 773]], values=[1, 1], dense_shape=[337, 337, 337]) tf.sparse.reduce_sum(x, 1) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. ### Patches We have patched the issue in GitHub commit [87158f43f05f2720a374f3e6d22a7aaa3a33f750](https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37635'}
2021-08-25T14:44:17Z
2021-08-25T14:44:17Z
HIGH
7.3
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf', 'https://github.com/advisories/GHSA-cgfm-62j4-v4rf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37635'}
null
{'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750'}
{'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750'}
GHSA
GHSA-g475-pch5-6wvv
Authentication bypass in MAGMI
MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication.
{'CVE-2020-5777'}
2021-05-06T18:54:35Z
2021-05-06T18:54:35Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://github.com/advisories/GHSA-g475-pch5-6wvv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://www.tenable.com/security/research/tra-2020-51'}
null
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'}
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'}
GHSA
GHSA-4g9f-63rx-5cw4
Segfault in Tensorflow
### Impact The [`tf.raw_ops.Switch`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Switch) operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/common_runtime/eager/kernel_and_device.cc#L308-L313 Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault ### Patches We have patched the issue in da8558533d925694483d2c136a9220d6d49d843c and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15190'}
2021-08-26T15:09:20Z
2020-09-25T18:28:14Z
MODERATE
5.3
{'CWE-20', 'CWE-476'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4', 'https://github.com/advisories/GHSA-4g9f-63rx-5cw4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15190', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c'}
{'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c'}
GHSA
GHSA-w24h-v9qh-8gxj
SQL Injection in Django
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
{'CVE-2022-28347'}
2022-04-22T23:29:02Z
2022-04-13T00:00:33Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28347', 'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81', 'https://groups.google.com/forum/#!forum/django-announce', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'https://github.com/advisories/GHSA-w24h-v9qh-8gxj'}
null
{'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81'}
{'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81'}
GHSA
GHSA-rfmp-jvr7-hx78
Inadequate Encryption Strength in Apache NiFi
In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.
{'CVE-2020-9491'}
2022-04-29T20:27:44Z
2022-01-06T20:41:06Z
HIGH
7.5
{'CWE-327'}
{'https://nifi.apache.org/security#CVE-2020-9491', 'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-rfmp-jvr7-hx78', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491'}
null
{'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}
{'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}
GHSA
GHSA-wg4r-q74r-p7c8
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0941'}
2022-03-23T15:42:50Z
2022-03-15T00:01:03Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/advisories/GHSA-wg4r-q74r-p7c8', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
null
{'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
{'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
GHSA
GHSA-xwjr-6fj7-fc6h
Local File Inclusion by unauthenticated users
### Impact An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. ### Patches Issue has been patched in Build 469 (v1.0.469) and v1.1.0. ### Workarounds Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469. ### References Reported by [ka1n4t](https://github.com/ka1n4t) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1105" alt="Screen Shot 2020-10-10 at 1 05 19 PM" src="https://user-images.githubusercontent.com/7253840/95663086-4ffc4780-0af9-11eb-9bb6-fd40cf11c033.png">
{'CVE-2020-15246'}
2022-04-19T19:02:37Z
2020-11-23T19:48:12Z
HIGH
7.5
{'CWE-863', 'CWE-22'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246', 'https://github.com/advisories/GHSA-xwjr-6fj7-fc6h'}
null
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
GHSA
GHSA-823f-cwm9-4g74
Splash authentication credentials potentially leaked to target websites
### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. ### Patches Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. ### Workarounds If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots). ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy-plugins/scrapy-splash/issues) * [Email us](mailto:opensource@zyte.com)
{'CVE-2021-41124'}
2021-10-06T17:49:23Z
2021-10-06T17:49:23Z
HIGH
7.4
{'CWE-200'}
{'https://github.com/advisories/GHSA-823f-cwm9-4g74', 'https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74', 'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41124'}
null
{'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'}
{'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'}
GHSA
GHSA-4w82-r329-3q67
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
{'CVE-2020-8840'}
2022-04-07T22:42:01Z
2020-03-04T20:52:14Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2620', 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E', 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en', 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840', 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E', 'https://github.com/advisories/GHSA-4w82-r329-3q67', 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200327-0002/', 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E'}
null
{'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497'}
{'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b'}
GHSA
GHSA-fq6p-6334-8gr4
Memory leak in decoding PNG images
### Impact When [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416) TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur. ### Patches We have patched the issue in GitHub commit [ab51e5b813573dc9f51efa335aebcf2994125ee9](https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23585'}
2022-02-11T20:36:40Z
2022-02-09T23:26:08Z
MODERATE
4.3
{'CWE-401'}
{'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23585', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416', 'https://github.com/advisories/GHSA-fq6p-6334-8gr4'}
null
{'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'}
{'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'}
GHSA
GHSA-2598-2f59-rmhq
SQL Injection in sequelize
Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 3.35.1 or later.
{'CVE-2019-10749'}
2021-08-18T22:10:20Z
2019-11-08T17:05:17Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://github.com/advisories/GHSA-2598-2f59-rmhq', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68', 'https://www.npmjs.com/advisories/1017', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222'}
null
{'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
{'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
GHSA
GHSA-r5gm-4p5w-pq2p
Remote code execution in verot/class.upload.php
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
{'CVE-2019-19576'}
2021-08-19T16:24:47Z
2020-01-16T22:17:40Z
CRITICAL
9.8
{'CWE-434'}
{'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/advisories/GHSA-r5gm-4p5w-pq2p', 'https://github.com/jra89/CVE-2019-19576', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19576', 'https://www.verot.net/php_class_upload.htm', 'http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3', 'https://www.verot.net'}
null
{'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'}
{'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124'}
GHSA
GHSA-cf4h-3jhx-xvhq
Arbitrary Code Execution in underscore
The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
{'CVE-2021-23358'}
2021-08-25T17:37:26Z
2021-05-06T16:09:43Z
HIGH
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23358', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://www.tenable.com/security/tns-2021-14', 'https://www.debian.org/security/2021/dsa-4883', 'https://github.com/jashkenas/underscore/pull/2917', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505', 'https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984', 'https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503', 'https://github.com/jashkenas/underscore/releases/tag/1.12.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/', 'https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html', 'https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E', 'https://github.com/advisories/GHSA-cf4h-3jhx-xvhq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/', 'https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504', 'https://www.npmjs.com/package/underscore'}
null
{'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'}
{'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'}
GHSA
GHSA-4g77-cvgw-grvw
Prototype Pollution in putil-merge
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
{'CVE-2021-23470'}
2022-02-11T16:15:46Z
2022-02-05T00:00:31Z
HIGH
8.2
{'CWE-1321'}
{'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://github.com/advisories/GHSA-4g77-cvgw-grvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470', 'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487'}
null
{'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'}
{'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'}
GHSA
GHSA-cq8r-fc3q-6hg2
Denial of Service (DoS) via the unsetByPath function in jsjoints
The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.
{'CVE-2020-28479'}
2021-04-13T15:29:40Z
2021-04-13T15:29:40Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://github.com/advisories/GHSA-cq8r-fc3q-6hg2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039'}
null
{'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}
{'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}
GHSA
GHSA-269q-hmxg-m83q
Local Information Disclosure Vulnerability in io.netty:netty-codec-http
### Description ### [GHSA-5mcr-gq6c-3hq2](https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2) (CVE-2021-21290) contains an insufficient fix for the vulnerability identified. ### Impact ### When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Vulnerability Details ### To fix the vulnerability the code was changed to the following: ```java @SuppressJava6Requirement(reason = "Guarded by version check") public static File createTempFile(String prefix, String suffix, File directory) throws IOException { if (javaVersion() >= 7) { if (directory == null) { return Files.createTempFile(prefix, suffix).toFile(); } return Files.createTempFile(directory.toPath(), prefix, suffix).toFile(); } if (directory == null) { return File.createTempFile(prefix, suffix); } File file = File.createTempFile(prefix, suffix, directory); // Try to adjust the perms, if this fails there is not much else we can do... file.setReadable(false, false); file.setReadable(true, true); return file; } ``` Unfortunately, this logic path was left vulnerable: ```java if (directory == null) { return File.createTempFile(prefix, suffix); } ``` This file is still readable by all local users. ### Patches ### Update to 4.1.77.Final ### Workarounds ### Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user or update to Java 7 or above. ### References ### - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information ### If you have any questions or comments about this advisory: Open an issue in [netty](https://github.com/netty/netty)
{'CVE-2022-24823'}
2022-05-10T08:46:52Z
2022-05-10T08:46:50Z
MODERATE
5.5
{'CWE-379', 'CWE-668', 'CWE-378'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24823', 'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q', 'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1', 'https://github.com/advisories/GHSA-269q-hmxg-m83q'}
null
{'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1'}
{'https://github.com/netty/netty/commit/185f8b2756a36aaa4f973f1a2a025e7d981823f1'}
GHSA
GHSA-jj6m-r8jc-2gp7
Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings
### Impact All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding. ### Patches Users should upgrade to `1.4.4`. ### Workarounds There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created. ### For more information If you have any questions or comments about this advisory: * Contact us on [Discord](https://discord.gg/pterodactyl) * Email us at `dane ät pterodactyl dot io`
{'CVE-2021-32699'}
2021-10-21T13:26:04Z
2021-06-23T18:03:18Z
MODERATE
6.5
{'CWE-405'}
{'https://github.com/advisories/GHSA-jj6m-r8jc-2gp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699', 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3', 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7'}
null
{'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}
{'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}
GHSA
GHSA-7r83-w6r8-fh6w
Reflected Cross-site Scripting (XSS) in ACS Commons
ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful.
{'CVE-2021-21043'}
2021-12-13T21:34:09Z
2021-05-13T22:31:14Z
MODERATE
6.1
{'CWE-787', 'CWE-79'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/indesign/apsb21-22.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/advisories/GHSA-7r83-w6r8-fh6w', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
null
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6'}
GHSA
GHSA-qc22-qwm9-j8rx
Remote Code Execution in npm-groovy-lint
Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable.
null
2021-12-20T16:59:31Z
2021-12-20T16:59:31Z
CRITICAL
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-qc22-qwm9-j8rx', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/nvuillam/npm-groovy-lint/issues/194'}
null
{'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'}
{'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'}
GHSA
GHSA-p6jh-p7q8-pcrg
Prototype Pollution in nodee-utils
All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function.
{'CVE-2020-7722'}
2021-07-29T22:08:42Z
2021-05-06T18:26:21Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-p6jh-p7q8-pcrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679'}
null
{'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'}
{'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'}
GHSA
GHSA-566m-qj78-rww5
Regular Expression Denial of Service in postcss
The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
{'CVE-2021-23382'}
2022-04-19T19:03:24Z
2022-01-07T00:21:36Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641', 'https://github.com/postcss/postcss/releases/tag/7.0.36', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382', 'https://github.com/advisories/GHSA-566m-qj78-rww5'}
null
{'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'}
{'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'}
GHSA
GHSA-cqqh-49mx-fq63
Prototype Pollution in merge
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3645'}
2021-09-24T13:11:10Z
2021-09-13T20:16:54Z
MODERATE
6.8
{'CWE-1321', 'CWE-915'}
{'https://github.com/advisories/GHSA-cqqh-49mx-fq63', 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'}
null
{'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'}
{'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'}
GHSA
GHSA-265q-28rp-chq5
Insecure Entropy Source - Math.random() in node-uuid
Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's. ## Recommendation Update to version 1.4.4 or later.
{'CVE-2015-8851'}
2021-08-23T15:25:55Z
2020-04-16T03:14:50Z
HIGH
7.5
{'CWE-331'}
{'https://github.com/broofa/node-uuid/issues/122', 'https://nodesecurity.io/advisories/93', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851', 'https://www.npmjs.com/advisories/93', 'https://github.com/broofa/node-uuid/issues/108', 'http://www.openwall.com/lists/oss-security/2016/04/13/8', 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://github.com/advisories/GHSA-265q-28rp-chq5'}
null
{'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'}
{'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'}
GHSA
GHSA-3xph-cp8f-2229
Prototype Pollution in @fabiocaccamo/utils.js
utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
{'CVE-2021-3815'}
2021-12-13T13:10:41Z
2021-12-10T20:31:32Z
HIGH
8
{'CWE-1321'}
{'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0', 'https://github.com/advisories/GHSA-3xph-cp8f-2229', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815'}
null
{'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'}
{'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'}
GHSA
GHSA-97cc-825c-399g
Cross site scripting in remdex/livehelperchat
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4050'}
2021-12-10T20:33:29Z
2021-12-10T20:33:29Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05', 'https://github.com/advisories/GHSA-97cc-825c-399g'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}
{'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}
GHSA
GHSA-xrjf-phvv-r4vr
Command injection in strapi
When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user input.
{'CVE-2022-0764'}
2022-03-09T20:26:22Z
2022-02-27T00:00:15Z
MODERATE
6.1
{'CWE-77', 'CWE-78'}
{'https://github.com/advisories/GHSA-xrjf-phvv-r4vr', 'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'}
null
{'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'}
{'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'}
GHSA
GHSA-m5vx-8chx-qvmm
Form validation can be skipped
### Impact By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. ### Patches https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246 ### Workarounds Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. ### References This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567 Original report: https://tickets.neos.io/#ticket/zoom/411 (internal)
{'CVE-2021-32697'}
2022-04-19T19:02:59Z
2021-06-22T15:15:08Z
MODERATE
6.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-m5vx-8chx-qvmm', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm', 'https://github.com/neos/form/releases/tag/5.1.3'}
null
{'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'}
{'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'}
GHSA
GHSA-q2xp-75m7-gv52
Moderate severity vulnerability that affects net.sf.robocode:robocode.api
Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL.
{'CVE-2019-10648'}
2021-07-27T20:33:52Z
2019-04-02T15:36:49Z
CRITICAL
9.8
{'CWE-862', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10648', 'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f', 'https://sourceforge.net/p/robocode/bugs/406/'}
null
{'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'}
{'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f'}
GHSA
GHSA-3hfw-x7gx-437c
Path traversal in Matrix Synapse
### Impact Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory. The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact. Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected. ### Patches Server administrators should upgrade to 1.47.1 or later. ### Workarounds Server administrators using a reverse proxy could, at the expense of losing media functionality, block the following endpoints: * `/_matrix/media/r0/download/{serverName}/{mediaId}` * `/_matrix/media/r0/download/{serverName}/{mediaId}/{fileName}` * `/_matrix/media/r0/thumbnail/{serverName}/{mediaId}` Alternatively, non-containerized deployments can be adapted to use the hardened systemd config, located at `contrib/systemd/override-hardened.conf`. ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
{'CVE-2021-41281'}
2021-12-10T18:30:50Z
2021-11-23T21:58:56Z
HIGH
7.5
{'CWE-22'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EU7QRE55U4IUEDLKT5IYPWL3UXMELFAS/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41281', 'https://github.com/matrix-org/synapse/commit/91f2bd090', 'https://github.com/advisories/GHSA-3hfw-x7gx-437c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N3WY56LCEZ4ZECLWV5KMAXF2PSMUB4F2/', 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1'}
null
{'https://github.com/matrix-org/synapse/commit/91f2bd090'}
{'https://github.com/matrix-org/synapse/commit/91f2bd090'}
GHSA
GHSA-mrvj-7q4f-5p42
Cross-site scripting in eZ Platform Kernel
### Impact In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims. ### Patches The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at: https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109 ### Important note You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.
null
2021-03-19T19:56:42Z
2021-03-19T19:56:42Z
HIGH
0
{'CWE-79'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42'}
null
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}
GHSA
GHSA-jj8r-p9f5-fmvv
Cross-site Scripting in TYPO3 extension
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.
{'CVE-2021-36785'}
2021-08-30T17:22:25Z
2021-08-30T17:22:25Z
MODERATE
8.5
{'CWE-79'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://github.com/advisories/GHSA-jj8r-p9f5-fmvv', 'https://typo3.org/help/security-advisories/security', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}
null
{'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}
{'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}
GHSA
GHSA-mr6h-chqp-p9g2
SQL Injection in gogs.io/gogs
SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues.
{'CVE-2014-8681'}
2021-06-29T18:32:44Z
2021-06-29T18:32:44Z
MODERATE
6.5
{'CWE-89'}
{'http://seclists.org/fulldisclosure/2014/Nov/31', 'http://gogs.io/docs/intro/change_log.html', 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695', 'https://www.exploit-db.com/exploits/35237', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8681', 'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8', 'https://github.com/advisories/GHSA-mr6h-chqp-p9g2', 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}
null
{'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}
{'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}
GHSA
GHSA-wvh7-5p38-2qfc
Storing Password in Local Storage
The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, "We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext." Example Code: ```js async () => { const user = Parse.User.current() if (user) { user.setPassword('newpass') await user.save() } } ``` After running the above code, the new password will be stored in localStorage as a property named "password". Proposed Solution: Before saving anything to localStorage, Parse should strip out any properties named "password" that are attempting to be stored with a Parse.User type object. Configuration: Parse SDK: 2.9.1 Parse Server: 3.9.0
null
2022-04-19T19:02:31Z
2020-07-23T18:20:10Z
MODERATE
0
{'CWE-256'}
{'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}
null
{'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}
{'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}
GHSA
GHSA-c7j7-p5jq-26ff
Low severity vulnerability that affects passenger
Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
{'CVE-2014-1831'}
2021-12-03T14:11:35Z
2018-10-10T17:29:20Z
LOW
0
null
{'http://openwall.com/lists/oss-security/2014/01/30/3', 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://github.com/phusion/passenger/commit/34b1087870c2', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'http://openwall.com/lists/oss-security/2014/01/28/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'}
null
{'https://github.com/phusion/passenger/commit/34b1087870c2'}
{'https://github.com/phusion/passenger/commit/34b1087870c2'}
GHSA
GHSA-hxmr-5gv9-6p8v
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0575'}
2022-02-24T13:06:38Z
2022-02-15T00:02:47Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d', 'https://github.com/advisories/GHSA-hxmr-5gv9-6p8v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
null
{'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
{'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
GHSA
GHSA-g3h8-cg9x-47qw
PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby
### Impact An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel access *cannot* use this attack vector. ### Patches The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.4.5](https://github.com/getkirby/kirby/releases/tag/3.4.5). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. **Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14. ### Workarounds Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881). ### Credits Thanks to Thore Imhof of Accenture for reporting the problem.
{'CVE-2020-26255'}
2021-01-07T22:37:41Z
2020-12-08T14:42:08Z
LOW
6.8
{'CWE-434'}
{'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://packagist.org/packages/getkirby/panel', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26255', 'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'https://github.com/advisories/GHSA-g3h8-cg9x-47qw', 'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881'}
null
{'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'}
{'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'}
GHSA
GHSA-m38j-pmg3-v5x5
Timing attack on django-basic-auth-ip-whitelist
### Impact Potential timing attack exists on websites where the basic authentication is used or configured, i.e. `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` is set. Currently the string comparison between configured credentials and the ones provided by users is performed through a character-by-character string comparison. This enables a possibility that attacker may time the time it takes the server to validate different usernames and password, and use this knowledge to work out the valid credentials. This attack is understood not to be realistic over the Internet. However, it may be achieved from within local networks where the website is hosted, e.g. from inside a data centre where a website's server is located. Sites protected by IP address whitelisting only are unaffected by this vulnerability. ### Patches This vulnerability has been fixed on version 0.3.4 of django-basic-auth-ip-whitelist. Update to version 0.3.4 as soon as possible and change basic authentication username and password configured on a Django project using this package. ### Workarounds Stop using basic authentication and use the IP whitelisting component only. It can be achieved by not setting `BASIC_AUTH_LOGIN` and `BASIC_AUTH_PASSWORD` in Django project settings. ### References - [Django mailing list discussion](https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ) ### For more information If you have any questions or comments about this advisory: * Open an issue at https://github.com/tm-kn/django-basic-auth-ip-whitelist/issues * Email us at the email specified on the [security policy](https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/policy). ### Acknowledgements Thanks to Thibaud Colas for reporting this.
{'CVE-2020-4071'}
2022-04-19T19:02:29Z
2020-06-23T19:58:27Z
LOW
2.2
{'CWE-208'}
{'https://github.com/tm-kn/django-basic-auth-ip-whitelist/security/advisories/GHSA-m38j-pmg3-v5x5', 'https://github.com/advisories/GHSA-m38j-pmg3-v5x5', 'https://groups.google.com/forum/#!msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4071', 'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6'}
null
{'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6'}
{'https://github.com/tm-kn/django-basic-auth-ip-whitelist/commit/effe05ed1ed9e1ccc675a65b69d36217e5c5dfc6'}
GHSA
GHSA-cvcq-gmc3-q6m8
Plain text storage of passwords in Apache Airflow
In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.
{'CVE-2020-17511'}
2020-12-17T21:00:56Z
2020-12-17T21:00:56Z
MODERATE
0
{'CWE-312'}
{'https://github.com/advisories/GHSA-cvcq-gmc3-q6m8', 'https://lists.apache.org/thread.html/ree782a29d927b96bf0b39fb92e2f1f09ea3112a985f7a08ce93765ac%40%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17511', 'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665'}
null
{'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665'}
{'https://github.com/apache/airflow/commit/4e32546faf227a6497ce8b282fff7450cae6f665'}
GHSA
GHSA-mxr5-mc97-63rc
Account Takeover in Octobercms
### Impact An attacker can request an account password reset and then gain access to the account using a specially crafted request. - To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form. ### Patches - Issue has been patched in Build 472 and v1.1.5 - [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) ### Workarounds Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. [**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. ### Recommendations We recommend the following steps to make sure your server stays secure: - Keep server OS and system software up to date. - Keep October CMS software up to date. - Use a multi-factor authentication plugin. - Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. - Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. ### References Bugs found as part of Solar Security CMS Research. Credits to: • Andrey Basarygin • Andrey Guzei • Mikhail Khramenkov • Alexander Sidukov • Maxim Teplykh ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-32648'}
2022-02-23T22:21:06Z
2021-08-30T16:13:02Z
HIGH
8.2
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9'}
null
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
GHSA
GHSA-9f8f-574q-8jmf
Manipulation of product reviews via API
### Impact Manipulation of product reviews via API ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
{'CVE-2021-37707'}
2021-08-30T16:14:00Z
2021-08-30T16:14:00Z
MODERATE
6.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
null
{'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
{'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
GHSA
GHSA-cjw5-f2x5-r4q5
Cross-site Scripting in TastyIgniter
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
{'CVE-2022-0602'}
2022-04-19T14:12:53Z
2022-04-06T00:01:29Z
HIGH
7.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0602', 'https://github.com/advisories/GHSA-cjw5-f2x5-r4q5', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'}
null
{'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}
{'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}
GHSA
GHSA-6m8p-4fxj-pgc2
OS Command Injection in mversion
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
{'CVE-2020-7688'}
2021-05-17T21:01:08Z
2021-05-17T21:01:08Z
MODERATE
7.8
{'CWE-78'}
{'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482', 'https://github.com/advisories/GHSA-6m8p-4fxj-pgc2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688', 'https://github.com/418sec/huntr/pull/102', 'https://snyk.io/vuln/SNYK-JS-MVERSION-573174'}
null
{'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'}
{'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'}
GHSA
GHSA-735v-wx75-xmmm
Cross-site Scripting in grav
In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering.
{'CVE-2022-0268'}
2022-01-31T21:45:05Z
2022-01-27T18:27:56Z
MODERATE
5.7
{'CWE-79'}
{'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/advisories/GHSA-735v-wx75-xmmm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
null
{'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
{'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
GHSA
GHSA-4fqx-74rv-638w
SQL Injection
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.
{'CVE-2019-3792'}
2022-04-12T22:10:26Z
2022-02-15T01:57:18Z
HIGH
5.6
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3792', 'https://github.com/concourse/concourse/blob/master/release-notes/v5.0.1.md#v501-note-1', 'https://github.com/advisories/GHSA-4fqx-74rv-638w', 'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727', 'https://pivotal.io/security/cve-2019-3792'}
null
{'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'}
{'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'}
GHSA
GHSA-68hw-vfh7-xvg8
Forced Logout in keycloak-connect
Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely. ## Recommendation Upgrade to version 4.4.0 or later.
{'CVE-2019-10157'}
2021-08-16T15:25:09Z
2019-06-13T20:38:09Z
MODERATE
5.5
{'CWE-287', 'CWE-345'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157', 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920', 'http://www.securityfocus.com/bid/108734', 'https://www.npmjs.com/advisories/978', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157', 'https://github.com/advisories/GHSA-68hw-vfh7-xvg8', 'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'}
null
{'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'}
{'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'}
GHSA
GHSA-2452-3rwv-x89c
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300.
{'CVE-2019-1298'}
2021-03-29T20:56:01Z
2021-03-29T20:56:01Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/advisories/GHSA-2452-3rwv-x89c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298'}
null
{'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782'}
GHSA
GHSA-q5vh-6whw-x745
Improper Authorization and Origin Validation Error in OneFuzz
## Impact Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable, a OneFuzz deployment must be: * Version 2.12.0 or greater * Deployed with the non-default [`--multi_tenant_domain`](https://github.com/microsoft/onefuzz/blob/2.30.0/src/deployment/deploy.py#L1021) option This can result in read/write access to private data such as: * Software vulnerability and crash information * Security testing tools * Proprietary code and symbols Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources. ## Patches This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. ## Workarounds Users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option. ## References You can find an overview of the Microsoft Identity Platform [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-overview). This vulnerability applies to the multi-tenant application pattern, as described [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant). ## For more information If you have any questions or comments about this advisory: * Open an issue in [OneFuzz](https://github.com/microsoft/onefuzz) * Email us at [fuzzing@microsoft.com](mailto:fuzzing@microsoft.com)
{'CVE-2021-37705'}
2021-08-26T21:15:35Z
2021-08-13T20:16:32Z
CRITICAL
10
{'CWE-346', 'CWE-285'}
{'https://github.com/advisories/GHSA-q5vh-6whw-x745', 'https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745', 'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1', 'https://github.com/microsoft/onefuzz/releases/tag/2.31.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37705', 'https://github.com/microsoft/onefuzz/pull/1153', 'https://pypi.org/project/onefuzz/'}
null
{'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1'}
{'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1'}
GHSA
GHSA-w6rc-q387-vpgq
Moderate severity vulnerability that affects passenger
ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/.
{'CVE-2013-4136'}
2021-08-30T14:56:55Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-59'}
{'https://github.com/advisories/GHSA-w6rc-q387-vpgq', 'http://www.openwall.com/lists/oss-security/2013/07/16/6', 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136', 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b', 'https://code.google.com/p/phusion-passenger/issues/detail?id=910', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'}
null
{'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'}
{'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'}
GHSA
GHSA-wcv5-vrvr-3rx2
Integer Overflow or Wraparound in TensorFlow
### Impact The Grappler component of TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) in [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L963-L1035): ```cc for (const auto& output_prop : output_props) { const PartialTensorShape output_shape(output_prop.shape()); // ... } ``` The `output_prop` tensor has a shape that is controlled by user input and this can result in triggering one of the `CHECK`s in the `PartialTensorShape` constructor. This is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197). ### Patches We have patched the issue in GitHub commit [be7b286d40bc68cb0b56f702186cc4837d508058](https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
null
2022-02-09T23:34:06Z
2022-02-09T23:34:06Z
MODERATE
5.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2', 'https://github.com/advisories/GHSA-wcv5-vrvr-3rx2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'}
null
{'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058'}
{'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058'}
GHSA
GHSA-cchx-mfrc-fwqr
Improper authentication in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
{'CVE-2019-10911'}
2021-09-30T18:40:16Z
2020-02-12T18:45:08Z
HIGH
7.5
{'CWE-200', 'CWE-287'}
{'https://github.com/advisories/GHSA-cchx-mfrc-fwqr', 'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911', 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml', 'https://symfony.com/cve-2019-10911', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19'}
null
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}
GHSA
GHSA-p6rw-44q7-3fw4
Stored XSS in Jupyter nbdime
### Impact Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected. ### Patches Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package. #### Python - nbdime 1.x: Patched in v. 1.1.1 - nbdime 2.x: Patched in v. 2.1.1 - nbdime 3.x: Patched in v. 3.1.1 #### npm - nbdime 6.x version: Patched in 6.1.2 - nbdime 5.x version: Patched in 5.0.2 - nbdime-jupyterlab 1.x version: Patched in 1.0.1 - nbdime-jupyterlab 2.x version: Patched in 2.1.1 ### For more information If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org).
{'CVE-2021-41134'}
2022-04-19T19:03:10Z
2021-11-08T18:09:27Z
HIGH
8.7
{'CWE-79'}
{'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea', 'https://github.com/advisories/GHSA-p6rw-44q7-3fw4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134'}
null
{'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}
{'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}
GHSA
GHSA-fx95-883v-4q4h
Path traversal in github.com/valyala/fasthttp
The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.
{'CVE-2022-21221'}
2022-03-29T22:03:10Z
2022-03-18T00:01:11Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866', 'https://github.com/advisories/GHSA-fx95-883v-4q4h', 'https://github.com/valyala/fasthttp/issues/1226', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21221', 'https://github.com/valyala/fasthttp/releases/tag/v1.34.0'}
null
{'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1'}
{'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1'}
GHSA
GHSA-5rwj-j5m3-3chj
Missing Release of Memory after Effective Lifetime in detect-character-encoding
### Impact In detect-character-encoding v0.3.0 and earlier, allocated memory is not released. ### Patches The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, using detect-character-encoding in a program accessible over the internet which becomes unavailable when running out of memory. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const detectCharacterEncoding = require("detect-character-encoding"); const app = express(); app.get("/", (req, res) => { detectCharacterEncoding(Buffer.from("foo")); res.end(); }); app.listen(3000); ``` `hey -n 1000000 http://localhost:3000` ([`hey`](https://github.com/rakyll/hey)) causes the Node.js process to consume more and more memory. ### References - https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588 - https://github.com/sonicdoe/detect-character-encoding/pull/6
{'CVE-2021-39176'}
2022-04-19T19:03:06Z
2021-09-01T18:25:16Z
HIGH
7.5
{'CWE-401'}
{'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1', 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588', 'https://github.com/sonicdoe/detect-character-encoding/pull/6', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj', 'https://github.com/advisories/GHSA-5rwj-j5m3-3chj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39176'}
null
{'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'}
{'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'}
GHSA
GHSA-36hf-6hp2-9g4c
Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms
In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.
{'CVE-2019-13237'}
2022-04-19T20:07:03Z
2019-11-12T22:58:14Z
MODERATE
4.3
{'CWE-200', 'CWE-22'}
{'https://github.com/advisories/GHSA-36hf-6hp2-9g4c', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237'}
null
{'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}
{'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}
GHSA
GHSA-2h3j-m7gr-25xj
Excessive Iteration Denial of Service in Apache PDFBox
A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
{'CVE-2021-27807'}
2022-04-22T18:28:01Z
2021-06-16T17:56:46Z
MODERATE
5.5
{'CWE-834'}
{'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-4892', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E', 'https://svn.apache.org/viewvc?view=revision&revision=1886911', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27807', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://github.com/advisories/GHSA-2h3j-m7gr-25xj', 'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
{'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'}
{'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'}
GHSA
GHSA-h6jh-7gv5-28vg
Bad alloc in `StringNGrams` caused by integer conversion
### Impact The implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ```python import tensorflow as tf tf.raw_ops.StringNGrams( data=['',''], data_splits=[0,2], separator=' '*100, ngram_widths=[-80,0,0,-60], left_pad=' ', right_pad=' ', pad_width=100, preserve_short_sequences=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer. ### Patches We have patched the issue in GitHub commit [c283e542a3f422420cfdb332414543b62fc4e4a5](https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37646'}
2021-08-25T14:43:34Z
2021-08-25T14:43:34Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg', 'https://github.com/advisories/GHSA-h6jh-7gv5-28vg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37646', 'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'}
null
{'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'}
{'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'}
GHSA
GHSA-49r3-2549-3633
omniauth-apple allows attacker to fake their email address during authentication
### Impact This vulnerability impacts applications using the [omniauth-apple](https://github.com/nhosoya/omniauth-apple) strategy of OmniAuth and using the `info.email` field of OmniAuth's [Auth Hash Schema](https://github.com/omniauth/omniauth/wiki/Auth-Hash-Schema) for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users. For example, an application using omniauth-apple with the following code will be impacted: ```ruby def omniauth_callback auth_hash = request.env['omniauth.auth'] @authenticated_user = User.find_by(email: auth_hash.info.email) end ``` Applications not using `info.email` for identification but are instead using the `uid` field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of `info.email` is being used for other purposes. ### Patches Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later. ### Workarounds If unable to upgrade to a patched version, monkey patching `OmniAuth::Strategies::Apple#email` as follows is advised as a workaround: ```ruby module OmniAuth module Strategies class Apple def email id_info['email'] end end end end ```
{'CVE-2020-26254'}
2022-04-19T19:02:41Z
2020-12-08T14:18:19Z
LOW
7.7
{'CWE-290'}
{'https://github.com/nhosoya/omniauth-apple/security/advisories/GHSA-49r3-2549-3633', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26254', 'https://github.com/nhosoya/omniauth-apple/blob/master/CHANGELOG.md#101---2020-12-03', 'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016', 'https://github.com/advisories/GHSA-49r3-2549-3633'}
null
{'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016'}
{'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016'}
GHSA
GHSA-4cxw-hq44-r344
Off-by-one Error in v2fly/v2ray-core
v2fly/v2ray-core prior to 4.44.0 is vulnerable to an off-by-one error. Indexing operations on arrays, slices, or strings should use an index at most one less than the length. If the index is checked for being less than or equal to the length (`<=`), instead of less than the length (`<`), the index could be out of bounds.
{'CVE-2021-4070'}
2022-03-03T19:17:50Z
2022-02-24T00:00:52Z
CRITICAL
9.1
{'CWE-193'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4070', 'https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877', 'https://github.com/advisories/GHSA-4cxw-hq44-r344', 'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}
null
{'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}
{'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}
GHSA
GHSA-prcg-wp5q-rv7p
Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes
### Impact TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. For example [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408) calls should be replaced by [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440). This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs). ### Patches We have patched the issue in GitHub commits [7c1692bd417eb4f9b33ead749a41166d6080af85](https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85) (merging [#51732](https://github.com/tensorflow/tensorflow/pull/51732)), [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51717](https://github.com/tensorflow/tensorflow/pull/51717)), [a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf](https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf) (merging [#51658](https://github.com/tensorflow/tensorflow/pull/51658)), and [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51973](https://github.com/tensorflow/tensorflow/pull/51973)). It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46890), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51618) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51908).
{'CVE-2021-41197'}
2021-11-10T19:35:35Z
2021-11-10T19:35:35Z
MODERATE
5.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://github.com/tensorflow/tensorflow/issues/46890', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p', 'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41197', 'https://github.com/tensorflow/tensorflow/issues/51908', 'https://github.com/advisories/GHSA-prcg-wp5q-rv7p'}
null
{'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15', 'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf'}
{'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'}
GHSA
GHSA-hr32-mgpm-qf2f
Generation of Error Message Containing Sensitive Information in RESTEasy client
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
{'CVE-2020-25633'}
2022-04-19T19:03:26Z
2021-06-03T23:41:34Z
MODERATE
5.3
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25633', 'https://issues.redhat.com/browse/RESTEASY-2820', 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633', 'https://github.com/advisories/GHSA-hr32-mgpm-qf2f'}
null
{'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'}
{'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'}
GHSA
GHSA-688c-3x49-6rqj
Moderate severity vulnerability that affects rack-protection
Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.
{'CVE-2018-1000119'}
2021-09-02T15:42:02Z
2018-03-07T22:22:22Z
MODERATE
5.9
{'CWE-203'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119', 'https://www.debian.org/security/2018/dsa-4247', 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109', 'https://github.com/advisories/GHSA-688c-3x49-6rqj', 'https://access.redhat.com/errata/RHSA-2018:1060', 'https://github.com/sinatra/rack-protection/pull/98'}
null
{'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb'}
{'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb'}
GHSA
GHSA-pjc4-3w99-j7v4
Open redirect in Flask-Unchained
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
{'CVE-2021-23393'}
2022-01-10T21:33:31Z
2021-06-15T15:56:59Z
MODERATE
5.4
{'CWE-601'}
{'https://github.com/advisories/GHSA-pjc4-3w99-j7v4', 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23393', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad', 'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40'}
null
{'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'}
{'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'}
GHSA
GHSA-465w-gg5p-85c9
Insufficient Session Expiration in Kiali
An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.
{'CVE-2020-1762'}
2021-05-18T21:09:01Z
2021-05-18T21:09:01Z
HIGH
8.6
{'CWE-384', 'CWE-613', 'CWE-295'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762', 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1762', 'https://bugzilla.redhat.com/show_bug.cgi?id=1810387', 'https://kiali.io/news/security-bulletins/kiali-security-001/', 'https://github.com/advisories/GHSA-465w-gg5p-85c9', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1'}
null
{'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1'}
{'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1', 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c'}
GHSA
GHSA-f9p3-h6cg-2cjr
Improper neutralization of formula elements in yii-helpers
Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.
{'CVE-2022-1544'}
2022-05-04T03:01:04Z
2022-05-03T00:00:46Z
HIGH
0
{'CWE-1236'}
{'https://github.com/advisories/GHSA-f9p3-h6cg-2cjr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
null
{'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
{'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
GHSA
GHSA-jf5r-8hm2-f872
Incorrect hostname / protocol due to unstripped leading control characters.
Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL. If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect. This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example: ````` const parse = require('url-parse') const express = require('express') const app = express() const port = 3000 url = parse(\"\\bjavascript:alert(1)\") console.log(url) app.get('/', (req, res) => { if (url.protocol !== \"javascript:\") {res.send(\"<a href=\\'\" + url.href + \"\\'>CLICK ME!</a>\")} }) app.listen(port, () => { console.log(`Example app listening on port ${port}`) }) `````
{'CVE-2022-0691'}
2022-03-29T22:16:44Z
2022-02-22T00:00:30Z
MODERATE
6.5
{'CWE-639'}
{'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63', 'https://github.com/advisories/GHSA-jf5r-8hm2-f872', 'https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691'}
null
{'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'}
{'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'}
GHSA
GHSA-4r65-35qq-ch8j
Ansible discloses sensitive information in traceback error message
Ansible is an IT automation system that handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. A flaw was found in Ansible Engine's ansible-connection module where sensitive information, such as the Ansible user credentials, is disclosed by default in the traceback error message when Ansible receives an unexpected response from `set_options`. The highest threat from this vulnerability is confidentiality.
{'CVE-2021-3620'}
2022-04-05T19:53:27Z
2022-03-04T00:00:17Z
MODERATE
5.5
{'CWE-209'}
{'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2022-164.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3620', 'https://github.com/advisories/GHSA-4r65-35qq-ch8j', 'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0', 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes', 'https://bugzilla.redhat.com/show_bug.cgi?id=1975767'}
null
{'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0'}
{'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0'}
GHSA
GHSA-63qx-x74g-jcr7
Path traversal and dereference of symlinks in Argo CD
### Impact All versions of Argo CD are vulnerable to a path traversal bug that allows to pass arbitrary values files to be consumed by Helm charts. Additionally, it is possible to craft special Helm chart packages containing value files that are actually symbolic links, pointing to arbitrary files outside the repository's root directory. If an attacker with permissions to create or update Applications knows or can guess the full path to a file containing valid YAML, they can create a malicious Helm chart to consume that YAML as values files, thereby gaining access to data they would otherwise have no access to. The impact can especially become critical in environments that make use of encrypted value files (e.g. using plugins with git-crypt or SOPS) containing sensitive or confidential data, and decrypt these secrets to disk before rendering the Helm chart. Also, because any error message from `helm template` is passed back to the user, and these error messages are quite verbose, enumeration of files on the repository server's file system is possible. ### Patches A patch for this vulnerability has been released in the following Argo CD versions: * v2.3.0 * v2.2.4 * v2.1.9 We urge users of Argo CD to update their installation to one of the fixed versions as listed above. ### Workarounds No workaround for this issue. ### References * https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24348 ### For more information * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd` ### Credits The path traversal vulnerability was discovered and reported by Moshe Zioni, VP Security Research, [Apiiro](https://www.apiiro.com). During the development of a fix for the path traversal vulnerability, the Argo CD team discovered the related issue with symbolic links. The Argo CD team would like to thank Moshe Zioni for the responsible disclosure, and the constructive discussions during handling this issue!
{'CVE-2022-24348'}
2022-02-11T22:52:24Z
2022-02-07T19:06:18Z
HIGH
7.7
{'CWE-200', 'CWE-22'}
{'https://github.com/advisories/GHSA-63qx-x74g-jcr7', 'https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments/', 'https://github.com/argoproj/argo-cd/releases/tag/v2.1.9', 'https://github.com/argoproj/argo-cd/releases/tag/v2.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24348', 'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-63qx-x74g-jcr7'}
null
{'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'}
{'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'}
GHSA
GHSA-mh83-jcw5-rjh8
XML External Entity Reference in edu.stanford.nlp:stanford-corenlp
The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
{'CVE-2022-0198'}
2022-01-20T15:33:36Z
2022-01-14T21:07:23Z
MODERATE
6.1
{'CWE-611'}
{'https://github.com/advisories/GHSA-mh83-jcw5-rjh8', 'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d', 'https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0198'}
null
{'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'}
{'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'}
GHSA
GHSA-7x2h-3v2v-24p9
Cross-Site Request Forgery in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site request forgery.
{'CVE-2022-0505'}
2022-02-15T00:17:23Z
2022-02-09T00:00:31Z
MODERATE
6.5
{'CWE-352'}
{'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292', 'https://github.com/advisories/GHSA-7x2h-3v2v-24p9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'}
null
{'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}
{'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}
GHSA
GHSA-hxf9-7h4c-f5jv
Django-Anymail prone to a timing attack
webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events.
{'CVE-2018-6596'}
2022-04-26T18:07:14Z
2018-07-12T20:30:40Z
CRITICAL
9.1
{'CWE-200'}
{'https://github.com/anymail/django-anymail/releases/tag/v1.3', 'https://github.com/anymail/django-anymail/releases/tag/v1.2.1', 'https://github.com/advisories/GHSA-hxf9-7h4c-f5jv', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6596', 'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://bugs.debian.org/889450', 'https://www.debian.org/security/2018/dsa-4107'}
null
{'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5'}
{'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5'}
GHSA
GHSA-897m-rjf5-jp39
Prototype Pollution in copy-props
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
{'CVE-2020-28503'}
2022-01-06T20:35:05Z
2022-01-06T20:35:05Z
HIGH
7.3
{'CWE-1321'}
{'https://github.com/advisories/GHSA-897m-rjf5-jp39', 'https://github.com/gulpjs/copy-props/pull/7', 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047', 'https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870'}
null
{'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'}
{'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'}
GHSA
GHSA-9qmh-276g-x5pj
Prototype Pollution in immer
## Overview Affected versions of immer are vulnerable to Prototype Pollution. ## Proof of exploit ``` const {applyPatches, enablePatches} = require("immer"); enablePatches(); let obj = {}; console.log("Before : " + obj.polluted); applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]); // applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]); console.log("After : " + obj.polluted); ``` ## Remediation Version 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended.
{'CVE-2020-28477'}
2021-01-20T21:27:56Z
2021-01-20T21:27:56Z
HIGH
0
{'CWE-471'}
{'https://github.com/immerjs/immer/issues/738', 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213', 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986', 'https://github.com/advisories/GHSA-9qmh-276g-x5pj', 'https://snyk.io/vuln/SNYK-JS-IMMER-1019369', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28477', 'https://www.npmjs.com/package/immer'}
null
{'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'}
{'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'}
GHSA
GHSA-p4jg-pccf-h82c
Insecure Temporary File in SWHKD
SWHKD is a display protocol-independent hotkey daemon made in Rust. In SWHKD versions 1.1.5 and prior, SWHKD uses the /tmp/swhkd.pid pathname. As /tmp is accessible to all users, there can be an information leak or denial of service. No known workarounds exist. A patch is available on the `1.1.0` branch of the repository.
{'CVE-2022-27815'}
2022-04-19T18:21:49Z
2022-03-31T00:00:24Z
CRITICAL
9.1
{'CWE-377'}
{'https://github.com/advisories/GHSA-p4jg-pccf-h82c', 'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa', 'http://www.openwall.com/lists/oss-security/2022/04/14/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27815', 'https://github.com/waycrate/swhkd/releases'}
null
{'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'}
{'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'}
GHSA
GHSA-35jh-r3h4-6jhm
Command Injection in lodash
`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
{'CVE-2021-23337'}
2022-04-19T19:03:27Z
2021-05-06T16:05:51Z
HIGH
7.2
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23337', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928', 'https://snyk.io/vuln/SNYK-JS-LODASH-1040724', 'https://github.com/advisories/GHSA-35jh-r3h4-6jhm', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851', 'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c', 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931'}
null
{'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'}
{'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'}
GHSA
GHSA-jq4p-mq33-w375
Cross-site Scripting when rendering error messages in laminas-form
### Impact When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Site Scripting (XSS) attack. ### Patches The following versions were issued to mitigate the vulnerability: - 2.17.1 - 3.0.2 - 3.1.1 ### Workarounds At the top of a view script where you call the `formElementErrors()` view helper, place the following code: ```php use Laminas\Form\ElementInterface; use Laminas\View\PhpRenderer; $escapeMessages = function (ElementInterface $formOrElement, PhpRenderer $renderer): void { $messages = $element->getMessages(); if (! $messages) { return; } $escaped = []; array_walk_recursive( $messages, static function (string $item) use (&$escaped, $renderer): void { $escaped[] = $renderer->escapeHtml($item); } }; $element->setMessages($escaped); }; ``` Before calling `formElementErrors()` with a form, fieldset, or element, call the above closure as follows ```php // Usage with a form // $this is the view renderer $escapeMessages($form, $this); // Usage with a fieldset // $this is the view renderer $escapeMessages($fieldset, $this); // Usage with a form element // $this is the view renderer $escapeMessages($element, $this); ``` ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/laminas/laminas-form/issues/new) * Email us at [security@getlaminas.org](mailto:security@getlaminas.org)
{'CVE-2022-23598'}
2022-02-11T21:08:54Z
2022-01-28T23:08:29Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23598', 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFF6WJ5I7PSEBRF6I753WKE2BXFBGQXE/', 'https://github.com/advisories/GHSA-jq4p-mq33-w375', 'https://getlaminas.org/security/advisory/LP-2022-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLNABVK26CE4PFL57VLY242FW3QY4CPC/'}
null
{'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}
{'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}
GHSA
GHSA-2457-2263-mm9f
Memory leak in micronaut-core
### Impact Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state. ### Patches The problem is patched in Micronaut 3.2.7 and above. ### Workarounds The default content type binder can be replaced in an existing Micronaut application to mitigate the issue: ```java package example; import java.util.List; import io.micronaut.context.annotation.Replaces; import io.micronaut.core.convert.ConversionService; import io.micronaut.http.MediaType; import io.micronaut.http.bind.DefaultRequestBinderRegistry; import io.micronaut.http.bind.binders.RequestArgumentBinder; import jakarta.inject.Singleton; @Singleton @Replaces(DefaultRequestBinderRegistry.class) class FixedRequestBinderRegistry extends DefaultRequestBinderRegistry { public FixedRequestBinderRegistry(ConversionService conversionService, List<RequestArgumentBinder> binders) { super(conversionService, binders); } @Override protected void registerDefaultConverters(ConversionService<?> conversionService) { super.registerDefaultConverters(conversionService); conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> { try { return MediaType.of(charSequence); } catch (IllegalArgumentException e) { return null; } }); } } ``` ### References Commit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues) * Email us at [info@micronaut.io](mailto:info@micronaut.io)
{'CVE-2022-21700'}
2022-04-19T19:03:20Z
2022-01-21T23:19:36Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21700', 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3', 'https://github.com/advisories/GHSA-2457-2263-mm9f', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f'}
null
{'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'}
{'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'}
GHSA
GHSA-2mq8-99q7-55wx
Code injection in keycloak
A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20222'}
2021-05-13T22:29:51Z
2021-05-13T22:29:51Z
HIGH
8.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-2mq8-99q7-55wx', 'https://bugzilla.redhat.com/show_bug.cgi?id=1924606', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20222', 'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741', 'https://access.redhat.com/security/cve/cve-2021-20222'}
null
{'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'}
{'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741'}
GHSA
GHSA-75p7-527p-w8wp
Server-Side Request Forgery and Open Redirect in AllTube Download
### Impact On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) ### Patches 3.0.3 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) The fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/3d092891044f2685ed66c73c870a021bee319c37/patches/youtube-dl-disable-generic.diff) to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched. However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**. ### References * https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a * https://github.com/ytdl-org/youtube-dl/issues/30691
{'CVE-2022-24739'}
2022-04-19T19:03:26Z
2022-03-09T15:17:31Z
HIGH
7.3
{'CWE-601', 'CWE-918'}
{'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/advisories/GHSA-75p7-527p-w8wp', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp'}
null
{'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
{'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'}
GHSA
GHSA-c52f-pq47-2r9j
plugin.yaml file allows for duplicate entries in helm
### Impact During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack. To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection). ### Patches This issue has been patched in Helm 2.16.11 and Helm 3.3.2. ### Workarounds Make sure to install plugins using a secure connection protocol like SSL.
{'CVE-2020-15187'}
2021-11-19T15:21:03Z
2021-05-24T16:57:21Z
LOW
3
{'CWE-74', 'CWE-694'}
{'https://github.com/helm/helm/security/advisories/GHSA-c52f-pq47-2r9j', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15187', 'https://github.com/advisories/GHSA-c52f-pq47-2r9j', 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b'}
null
{'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'}
{'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b'}