ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-gfh2-7jg5-653p | Denial of Service in docker2aci | docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain. | {'CVE-2016-8579'} | 2022-04-12T22:38:28Z | 2022-02-15T01:57:18Z | MODERATE | 4 | {'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-8579', 'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f', 'https://github.com/advisories/GHSA-gfh2-7jg5-653p', 'https://github.com/appc/docker2aci/issues/203', 'https://www.securityfocus.com/bid/93560', 'https://github.com/appc/docker2aci/releases/tag/v0.13.0', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8579'} | null | {'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'} | {'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'} |
GHSA | GHSA-q9vw-wr57-xjv3 | Information Exposure in Heketi | An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file. | {'CVE-2017-15104'} | 2022-04-12T22:38:47Z | 2022-02-15T01:57:18Z | HIGH | 7.8 | {'CWE-200', 'CWE-552'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-15104', 'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00', 'https://github.com/advisories/GHSA-q9vw-wr57-xjv3', 'https://access.redhat.com/security/cve/CVE-2017-15104', 'https://github.com/heketi/heketi/releases/tag/v5.0.1', 'https://access.redhat.com/errata/RHSA-2017:3481', 'https://bugzilla.redhat.com/show_bug.cgi?id=1510149'} | null | {'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'} | {'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'} |
GHSA | GHSA-wxr6-29pv-ch68 | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4164'} | 2022-01-21T23:44:17Z | 2022-01-21T23:44:17Z | HIGH | 7.6 | {'CWE-352'} | {'https://github.com/advisories/GHSA-wxr6-29pv-ch68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4164', 'https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758', 'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'} | null | {'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'} | {'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'} |
GHSA | GHSA-9vxc-g2jx-qj3p | API Admin Auth Weakness in tomato | Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests.
## Details
The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access.
Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key.
## Proof of Concept
This is the snippet of code that does the comparison to authorize requests.
```
if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) {
```
For an access_key that is set to anything that includes the letter 'a' the following request would be authorized.
```
$ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a"
{
"cmd": "ls",
"path": ".",
"stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n",
"stderr": ""
}
```
## Recommendation
Update to version 0.0.6 or later. | {'CVE-2013-7379'} | 2021-09-23T21:00:30Z | 2020-08-31T22:59:07Z | CRITICAL | 0 | {'CWE-287'} | {'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://www.npmjs.com/advisories/38', 'https://github.com/advisories/GHSA-9vxc-g2jx-qj3p', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'} | null | {'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'} | {'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'} |
GHSA | GHSA-x84v-xcm2-53pg | Moderate severity vulnerability that affects requests | The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. | {'CVE-2018-18074'} | 2021-09-21T22:17:47Z | 2018-10-29T19:06:46Z | HIGH | 7.5 | {'CWE-522'} | {'https://usn.ubuntu.com/3790-2/', 'https://github.com/requests/requests/pull/4718', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html', 'https://github.com/requests/requests/issues/4716', 'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff', 'https://usn.ubuntu.com/3790-1/', 'https://bugs.debian.org/910766', 'http://docs.python-requests.org/en/master/community/updates/#release-and-version-history', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18074', 'https://github.com/advisories/GHSA-x84v-xcm2-53pg', 'https://access.redhat.com/errata/RHSA-2019:2035'} | null | {'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff'} | {'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff'} |
GHSA | GHSA-f77h-m9w2-vvg2 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4017'} | 2021-12-03T20:38:57Z | 2021-12-03T20:38:57Z | HIGH | 8.8 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4017', 'https://github.com/advisories/GHSA-f77h-m9w2-vvg2', 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | null | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} |
GHSA | GHSA-h395-qcrw-5vmq | Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin | This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header. | {'CVE-2020-28483'} | 2021-06-23T17:53:21Z | 2021-06-23T17:53:21Z | HIGH | 7.1 | {'CWE-113', 'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28483', 'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711', 'https://github.com/advisories/GHSA-h395-qcrw-5vmq', 'https://github.com/gin-gonic/gin/pull/2632', 'https://github.com/gin-gonic/gin/pull/2474%23issuecomment-729696437', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736', 'https://github.com/gin-gonic/gin/releases/tag/v1.7.0'} | null | {'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'} | {'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'} |
GHSA | GHSA-whr9-vfh2-7hm6 | Memory corruption in `DrawBoundingBoxesV2` | ### Impact
The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs:
```python
import tensorflow as tf
images = tf.fill([10, 96, 0, 1], 0.)
boxes = tf.fill([10, 53, 0], 0.)
colors = tf.fill([0, 1], 0.)
tf.raw_ops.DrawBoundingBoxesV2(images=images, boxes=boxes, colors=colors)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption:
```cc
const auto tboxes = boxes.tensor<T, 3>();
for (int64 bb = 0; bb < num_boxes; ++bb) {
...
const int64 min_box_row = static_cast<float>(tboxes(b, bb, 0)) * (height - 1);
const int64 max_box_row = static_cast<float>(tboxes(b, bb, 2)) * (height - 1);
const int64 min_box_col = static_cast<float>(tboxes(b, bb, 1)) * (width - 1);
const int64 max_box_col = static_cast<float>(tboxes(b, bb, 3)) * (width - 1);
...
}
```
If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices.
### Patches
We have patched the issue in GitHub commit [79865b542f9ffdc9caeb255631f7c56f1d4b6517](https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29571'} | 2021-05-21T14:25:28Z | 2021-05-21T14:25:28Z | MODERATE | 4.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-whr9-vfh2-7hm6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29571', 'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6'} | null | {'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517'} | {'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517'} |
GHSA | GHSA-97wf-p777-86jq | Division by zero in TFLite's implementation of Split | ### Impact
The implementation of the `Split` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65):
```cc
TF_LITE_ENSURE_MSG(context, input_size % num_splits == 0, "Not an even split");
const int slice_size = input_size / num_splits;
```
An attacker can craft a model such that `num_splits` would be 0.
### Patches
We have patched the issue in GitHub commit [b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d](https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29599'} | 2021-05-21T14:28:01Z | 2021-05-21T14:28:01Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-97wf-p777-86jq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29599', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97wf-p777-86jq', 'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'} | null | {'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'} | {'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'} |
GHSA | GHSA-qmw8-3v4g-gwj4 | Prefix escape | ### Impact
By crafting a specific URL, it is possible to escape the prefix of the proxied backend service.
If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is.
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N)
### Patches
A patch have been submitted by Corey Farrell git@cfware.com, the reporter.
All releases after v4.0.2 include the fix.
### Workarounds
There are no workaround available.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from)
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com) | {'CVE-2021-21321'} | 2021-03-03T17:50:05Z | 2021-03-03T01:52:05Z | CRITICAL | 10 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'} | null | {'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'} | {'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'} |
GHSA | GHSA-h9mj-fghc-664w | Denial of Service in mqtt | Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.
The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.
## Proof of Concept
The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead.
```
var mqttp = require('mqtt-packet');
var packets = [];
for(var i=0; i<=1000;i++){
packets.push(
mqttp.generate({
cmd:'publish',
topic:Buffer.from('hello'),
payload:Buffer.from('world'),
retain: false,
dup: false,
messageId: ++i,
qos: 1
})
)
}
```
## Recommendation
Update to version 2.15.0 or later. | {'CVE-2017-10910'} | 2021-09-14T17:16:40Z | 2017-12-28T22:51:58Z | MODERATE | 6.5 | {'CWE-674'} | {'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923', 'https://jvn.jp/en/jp/JVN45494523/index.html', 'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json'} | null | {'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'} | {'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'} |
GHSA | GHSA-v592-xf75-856p | Erroneous Proof of Work calculation in geth | ### Impact
An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected.
### Patches
This issue is also fixed as of 1.9.24. Thanks to @slavikus for bringing the issue to our attention and writing the fix.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org) | {'CVE-2020-26240'} | 2022-04-19T19:02:40Z | 2021-06-29T21:12:56Z | MODERATE | 5.3 | {'CWE-682'} | {'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26240', 'https://github.com/ethereum/go-ethereum/pull/21793', 'https://github.com/advisories/GHSA-v592-xf75-856p'} | null | {'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'} | {'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'} |
GHSA | GHSA-4cx6-fj7j-pjx9 | Code injection in Stripe CLI on windows | ### Impact
A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected.
An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run.
There has been no evidence of exploitation of this vulnerability.
### Recommendation
Upgrade to Stripe CLI v1.7.13.
### Acknowledgments
Thanks to [trungpabc](https://hackerone.com/trungpabc) for reporting the issue.
### For more information
Email us at [security@stripe.com](mailto:security@stripe.com).
| {'CVE-2022-24753'} | 2022-03-18T21:10:50Z | 2022-03-10T18:17:50Z | HIGH | 7.7 | {'CWE-78'} | {'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd', 'https://github.com/advisories/GHSA-4cx6-fj7j-pjx9', 'https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24753'} | null | {'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'} | {'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'} |
GHSA | GHSA-356r-77q8-f64f | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1 | {'CVE-2021-3819'} | 2021-10-04T13:58:41Z | 2021-09-29T17:12:37Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-356r-77q8-f64f', 'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5', 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'} | {'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'} |
GHSA | GHSA-5w9c-rv96-fr7g | Removal of functional code in faker.js | Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/GHSA-gh88-3pxp-6fm8).
The functional code for this package was forked and can be found [here](https://github.com/faker-js/faker). | null | 2022-03-23T16:01:20Z | 2022-03-22T19:28:24Z | HIGH | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://github.com/advisories/GHSA-5w9c-rv96-fr7g', 'https://www.npmjs.com/package/faker', 'https://www.npmjs.com/package/@faker-js/faker', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906'} | null | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} |
GHSA | GHSA-v7wg-cpwc-24m4 | Unchecked Class Instantiation when providing Plugin Classes | pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The first impacted version is REL9.4.1208 (it introduced `socketFactory` connection property). | {'CVE-2022-21724'} | 2022-04-17T16:42:44Z | 2022-02-02T00:04:20Z | HIGH | 7 | {'CWE-665', 'CWE-668', 'CWE-74'} | {'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://github.com/advisories/GHSA-v7wg-cpwc-24m4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724'} | null | {'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'} | {'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'} |
GHSA | GHSA-738m-f33v-qc2r | SMTP Injection in PHPMailer | ### Impact
Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
### Patches
Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0).
### Workarounds
Manually strip line breaks from email addresses before passing them to PHPMailer.
### References
https://nvd.nist.gov/vuln/detail/CVE-2015-8476
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | {'CVE-2015-8476'} | 2021-08-19T19:39:12Z | 2020-03-05T22:09:19Z | LOW | 0 | {'CWE-20'} | {'https://github.com/advisories/GHSA-738m-f33v-qc2r', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.securityfocus.com/bid/78619', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0', 'http://www.openwall.com/lists/oss-security/2015/12/05/1', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://www.debian.org/security/2015/dsa-3416', 'http://www.openwall.com/lists/oss-security/2015/12/04/5', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html'} | null | {'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'} | {'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'} |
GHSA | GHSA-mmj4-777p-fpq9 | Validation bypass in frourio-express | ## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。
### さらなる情報
このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。
* [frourio](https://github.com/frouriojs/frourio)にIssueを開く。
## English
### Impact
Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives)
### Patches
Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project.
### Workarounds
Validate objects from request with class-transformer in controllers by yourself, or prevent using validators.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [frourio](https://github.com/frouriojs/frourio)
| {'CVE-2022-23624'} | 2022-04-19T19:03:22Z | 2022-02-07T22:38:37Z | HIGH | 8.1 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'} | null | {'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'} | {'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'} |
GHSA | GHSA-q97v-764g-r2rp | High severity vulnerability that affects gollum and gollum-lib | The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags. | {'CVE-2014-9489'} | 2021-09-16T19:42:57Z | 2017-11-16T01:47:37Z | HIGH | 8.8 | {'CWE-284'} | {'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7', 'https://github.com/gollum/gollum/issues/913', 'https://github.com/advisories/GHSA-q97v-764g-r2rp', 'http://www.securityfocus.com/bid/71499', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489', 'http://www.openwall.com/lists/oss-security/2015/01/03/19'} | null | {'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'} | {'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'} |
GHSA | GHSA-4vmm-mhcq-4x9j | Sandbox Bypass Leading to Arbitrary Code Execution in constantinople | Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution.
## Recommendation
Update to version 3.1.1 or later. | null | 2021-08-16T16:06:39Z | 2019-06-14T16:15:14Z | CRITICAL | 10 | null | {'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://snyk.io/vuln/npm:constantinople:20180421', 'https://www.npmjs.com/advisories/568', 'https://nodesecurity.io/advisories/568', 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703', 'https://github.com/advisories/GHSA-4vmm-mhcq-4x9j'} | null | {'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'} | {'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'} |
GHSA | GHSA-q65m-pv3f-wr5r | XSS in Bleach when noscript and raw tag whitelisted | ### Impact
A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option.
### Patches
v3.1.1
### Workarounds
* modify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags:
```
title
textarea
script
style
noembed
noframes
iframe
xmp
```
* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.
### References
* https://bugzilla.mozilla.org/show_bug.cgi?id=1615315
* https://cure53.de/fp170.pdf
* https://nvd.nist.gov/vuln/detail/CVE-2020-6802
* https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
### Credits
* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)
* Email us at [security@mozilla.org](mailto:security@mozilla.org)
| {'CVE-2020-6802'} | 2021-08-19T17:32:15Z | 2020-02-24T17:33:44Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-q65m-pv3f-wr5r', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1615315', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6802', 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r', 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/', 'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/', 'https://cure53.de/fp170.pdf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/', 'https://advisory.checkmarx.net/advisory/CX-2020-4276'} | null | {'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd'} | {'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd'} |
GHSA | GHSA-g25h-jr74-qp5j | Incomplete validation in `QuantizeV2` | ### Impact
Due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays:
```python
import tensorflow as tf
tf.raw_ops.QuantizeV2(
input=[1,2,3],
min_range=[1,2],
max_range=[],
T=tf.qint32,
mode='SCALED',
round_mode='HALF_AWAY_FROM_ZERO',
narrow_range=False,
axis=1,
ensure_minimum_range=3)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor.
### Patches
We have patched the issue in GitHub commit [6da6620efad397c85493b8f8667b821403516708](https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37663'} | 2021-08-25T14:42:23Z | 2021-08-25T14:42:23Z | HIGH | 7.8 | {'CWE-20'} | {'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37663', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j', 'https://github.com/advisories/GHSA-g25h-jr74-qp5j'} | null | {'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'} | {'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'} |
GHSA | GHSA-m2q3-53fq-7h66 | Moderate severity vulnerability that affects gollum | The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check. | {'CVE-2015-7314'} | 2021-09-14T22:05:23Z | 2018-08-28T22:33:51Z | MODERATE | 0 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-7314', 'https://github.com/gollum/gollum/issues/1070', 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1', 'http://jvn.jp/en/jp/JVN27548431/index.html', 'https://github.com/advisories/GHSA-m2q3-53fq-7h66', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149', 'http://www.openwall.com/lists/oss-security/2015/09/22/12'} | null | {'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'} | {'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'} |
GHSA | GHSA-gpfj-4j6g-c4w9 | Clipboard-based DOM-XSS | ### Impact
A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected.
The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**.
```typescript
function generateText(transfer: DataTransfer): string | undefined {
if (Array.from(transfer.types).indexOf('text/html') === -1) return
let html = transfer.getData('text/html')
if (!/<table/i.test(html)) return
html = html.replace(/<meta.*?>/, '')
const el = document.createElement('div')
el.innerHTML = html
const tables = el.querySelectorAll('table')
for (const table of tables) {
if (table.closest('[data-paste-markdown-skip]')) {
table.replaceWith(new Text(table.textContent || ''))
}
const formattedTable = tableMarkdown(table)
table.replaceWith(new Text(formattedTable))
}
return el.innerHTML
}
```
### Patches
A security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4).
### Workarounds
A Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers.
<!--
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
*
-->
| {'CVE-2021-37700'} | 2022-04-19T19:03:05Z | 2021-08-12T20:42:17Z | MODERATE | 6.5 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37700', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4', 'https://github.com/advisories/GHSA-gpfj-4j6g-c4w9', 'https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9', 'https://www.npmjs.com/package/@github/paste-markdown'} | null | {'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'} | {'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'} |
GHSA | GHSA-hfvc-g252-rp4g | Denial of Service in i18n | This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | {'CVE-2020-7791'} | 2021-05-10T15:32:30Z | 2020-12-14T19:50:22Z | MODERATE | 7.5 | {'CWE-20', 'CWE-400'} | {'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-hfvc-g252-rp4g', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E'} | null | {'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'} | {'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'} |
GHSA | GHSA-pxcf-v868-m492 | Injection and Cross-site Scripting in osm-static-maps | This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read. | {'CVE-2020-7749'} | 2021-08-02T15:31:50Z | 2021-05-10T18:43:45Z | HIGH | 7.6 | {'CWE-74', 'CWE-79'} | {'https://github.com/advisories/GHSA-pxcf-v868-m492', 'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/pull/24', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7749'} | null | {'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'} | {'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'} |
GHSA | GHSA-jgpq-g82g-6c39 | confinit vulnerable to prototype pollution | confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload. | {'CVE-2020-7638'} | 2021-07-28T23:16:45Z | 2020-04-07T15:52:05Z | MODERATE | 5.3 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433', 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7638', 'https://github.com/advisories/GHSA-jgpq-g82g-6c39'} | null | {'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'} | {'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'} |
GHSA | GHSA-jjhw-5mxp-2g2q | Cross-site Scripting in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms. | {'CVE-2021-25933'} | 2021-05-28T22:27:51Z | 2021-05-25T18:47:01Z | MODERATE | 4.8 | {'CWE-79'} | {'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.com/advisories/GHSA-jjhw-5mxp-2g2q', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'} | null | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'} |
GHSA | GHSA-gvcj-pfq2-wxj7 | High severity vulnerability that affects electron | Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line. | {'CVE-2016-1202'} | 2021-09-13T12:46:47Z | 2017-10-24T18:33:35Z | HIGH | 7.8 | {'CWE-426'} | {'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d', 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7', 'https://github.com/electron/electron/pull/2976', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054', 'http://jvn.jp/en/jp/JVN00324715/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202'} | null | {'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'} | {'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'} |
GHSA | GHSA-mh3m-8c74-74xh | Denial of Service in graphql-go | ### Impact
This is a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. To make things worse the only mitigation in affected versions creates opportunities for other attacks. This issue is only available if you are using `graphql.MaxDepth` option in your schema (which is highly recommended in most cases).
### Patches
The issue has been patched in version `v1.3.0`. We have been trying to maintain backwards compatibility and avoid breaking changes so upgrading should not be problematic.
### Workarounds
The best workaround is to patch to a version greater than or equal to `v1.3.0`.
Otherwise, the only workaround in versions prior to `v1.3.0` is to disable the `graphql.MaxDepth` option from your schema. Unfortunately, this could potentially create opportunities for other attacks.
### References
There are no references or links. This issue was reported privately and was fixed before creating this Security Advisory.
### For more information
If you have any questions or comments feel free to reach out to @pavelnikolov or @tony on the Gopher Slack. | {'CVE-2022-21708'} | 2022-04-19T19:03:20Z | 2022-01-27T15:28:06Z | MODERATE | 6.5 | {'CWE-400'} | {'https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh', 'https://github.com/advisories/GHSA-mh3m-8c74-74xh', 'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21708'} | null | {'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'} | {'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'} |
GHSA | GHSA-6w5m-jgc5-8cgc | orchardcore is vulnerable to Cross-site Scripting | orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0159'} | 2022-01-21T23:57:49Z | 2022-01-21T23:57:49Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/advisories/GHSA-6w5m-jgc5-8cgc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} | null | {'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} | {'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} |
GHSA | GHSA-6q5w-m3c5-rv95 | Data races in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via VTab / VTabCursor. | {'CVE-2020-35866'} | 2021-08-25T20:47:59Z | 2021-08-25T20:47:59Z | CRITICAL | 9.8 | {'CWE-362'} | {'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35866', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/advisories/GHSA-6q5w-m3c5-rv95', 'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f'} | null | {'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f'} | {'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f'} |
GHSA | GHSA-cf36-985g-v73c | Moderate severity vulnerability that affects omniauth-facebook | The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter. | {'CVE-2013-4562'} | 2021-09-08T22:01:45Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-352'} | {'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ', 'https://github.com/advisories/GHSA-cf36-985g-v73c', 'http://seclists.org/oss-sec/2013/q4/267', 'http://www.osvdb.org/99693', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562', 'http://seclists.org/oss-sec/2013/q4/264', 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7', 'http://osvdb.org/ref/99/omniauth-facebook_gem.txt'} | null | {'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'} | {'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'} |
GHSA | GHSA-4286-h47h-m5v6 | Improper Authentication in showdoc | ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions. | {'CVE-2021-41745'} | 2021-10-28T17:10:57Z | 2021-10-25T19:43:24Z | HIGH | 0 | {'CWE-287', 'CWE-434'} | {'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability', 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://github.com/advisories/GHSA-4286-h47h-m5v6'} | null | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'} | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'} |
GHSA | GHSA-6fmv-q269-55cw | Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit template.
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by Aquilao Null | {'CVE-2020-15277'} | 2022-04-19T19:02:38Z | 2020-10-30T17:05:59Z | HIGH | 7.2 | {'CWE-434', 'CWE-74'} | {'https://basercms.net/security/20201029', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw', 'https://github.com/advisories/GHSA-6fmv-q269-55cw'} | null | {'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} | {'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} |
GHSA | GHSA-557g-r22w-9wvx | Incorrect Permission Assignment for Critical Resource in Singularity | An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host. | {'CVE-2019-11328'} | 2021-12-20T18:25:33Z | 2021-12-20T18:25:33Z | HIGH | 8.8 | {'CWE-269'} | {'http://www.openwall.com/lists/oss-security/2019/05/16/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/', 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31', 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/', 'https://github.com/sylabs/singularity/releases/tag/v3.2.0', 'http://www.securityfocus.com/bid/108360', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11328', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/', 'https://github.com/advisories/GHSA-557g-r22w-9wvx'} | null | {'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'} | {'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'} |
GHSA | GHSA-vrxp-mg9f-hwf3 | Improperly Implemented path matching for in-toto-golang | ### Impact
Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo).
### Patches
The problem has been fixed in version 0.3.0.
### Workarounds
Exploiting this vulnerability is dependent on the specific policy applied.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [in-toto-golang](http://github.com/in-toto/in-toto-golang)
* Email us at [in-toto-public](mailto:in-toto-public@googlegroups.com)
* If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
| {'CVE-2021-41087'} | 2022-04-19T19:03:09Z | 2021-09-22T20:37:09Z | MODERATE | 5.6 | {'CWE-22', 'CWE-345'} | {'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290', 'https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41087', 'https://github.com/advisories/GHSA-vrxp-mg9f-hwf3'} | null | {'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'} | {'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'} |
GHSA | GHSA-55j9-849x-26h4 | Remote Code Execution in Red Discord Bot | ### Impact
A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
### Patches
This critical exploit has been fixed on version 3.3.11.
### Workarounds
Unloading the Trivia module with ``unload trivia`` can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue.
### References
https://github.com/Cog-Creators/Red-DiscordBot/pull/4175
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red) | {'CVE-2020-15140'} | 2022-04-19T19:02:32Z | 2020-08-21T16:30:52Z | HIGH | 8.2 | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15140', 'https://github.com/advisories/GHSA-55j9-849x-26h4', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-55j9-849x-26h4'} | null | {'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81'} | {'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81'} |
GHSA | GHSA-7w54-gp8x-f33m | Potential exposure of tokens to an Unauthorized Actor | ### Impact
When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account).
### Patches
This was patched in 7.3.1, by updating the address of the fallback WebSocket polling proxy to the new one.
### Workarounds
Specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`:
```typescript
const connectOptions: ConnectArgs = {
// ...
pollingHost: 'gp-v2.replit.com',
};
client.connect(connectOptions);
```
### For more information
Thanks to https://hackerone.com/orlserg for disclosing this.
If you have any questions or comments about this advisory:
* Open an issue in [replit/crosis](https://github.com/replit/crosis)
* Email us at [security@replit.com](mailto:security@replit.com) | {'CVE-2022-21671'} | 2022-01-25T17:03:48Z | 2022-01-12T22:44:47Z | HIGH | 0 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21671', 'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m', 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281', 'https://github.com/advisories/GHSA-7w54-gp8x-f33m'} | null | {'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'} | {'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'} |
GHSA | GHSA-jmhf-9fj8-88gh | Open Redirect in AllTube | ### Impact
Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain.
### Patches
3.0.1 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
### References
* https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a
* https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203/
* https://nvd.nist.gov/vuln/detail/CVE-2022-0692 | {'CVE-2022-0692'} | 2022-04-19T19:03:24Z | 2022-02-23T21:15:01Z | MODERATE | 6.1 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/advisories/GHSA-jmhf-9fj8-88gh'} | null | {'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | {'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} |
GHSA | GHSA-c53v-qmrx-93hg | Open redirect in shopware | ### Impact
Arbitrary redirect while using certain URLs
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
| {'CVE-2022-21651'} | 2022-01-06T23:49:19Z | 2022-01-06T23:49:19Z | MODERATE | 6.8 | {'CWE-601'} | {'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/advisories/GHSA-c53v-qmrx-93hg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} | null | {'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} | {'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} |
GHSA | GHSA-rpg7-q4cv-p466 | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4123'} | 2022-01-04T18:52:37Z | 2021-12-17T20:00:16Z | MODERATE | 6.5 | {'CWE-352'} | {'https://github.com/advisories/GHSA-rpg7-q4cv-p466', 'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'} | {'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'} |
GHSA | GHSA-6hwh-rqwf-cxxr | Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util | vega-util prior to 1.13.1 allows manipulation of object prototype. The 'vega.mergeConfig' method within vega-util could be tricked into adding or modifying properties of the Object.prototype. | {'CVE-2019-10806'} | 2021-07-28T18:36:57Z | 2021-05-07T16:32:02Z | MODERATE | 4.3 | {'CWE-20', 'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10806', 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b', 'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223', 'https://github.com/advisories/GHSA-6hwh-rqwf-cxxr'} | null | {'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b'} | {'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b'} |
GHSA | GHSA-9m6j-fcg5-2442 | Path traversal in url-parse | url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path. | {'CVE-2021-27515'} | 2021-05-06T16:31:23Z | 2021-05-06T16:10:51Z | HIGH | 5.3 | {'CWE-23'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27515', 'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0', 'https://advisory.checkmarx.net/advisory/CX-2021-4306', 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0', 'https://github.com/unshiftio/url-parse/pull/197', 'https://github.com/advisories/GHSA-9m6j-fcg5-2442'} | null | {'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0'} | {'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0'} |
GHSA | GHSA-q4qf-3fc6-8x34 | Segfault and data corruption in tensorflow-lite | ### Impact
To mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reduce.h#L68-L72
If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption.
### Patches
We have patched the issue in 2d88f470dea2671b430884260f3626b1fe99830a and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15207'} | 2021-11-19T15:11:40Z | 2020-09-25T18:28:43Z | HIGH | 8.7 | {'CWE-119', 'CWE-787'} | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34', 'https://github.com/advisories/GHSA-q4qf-3fc6-8x34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15207', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'} | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'} |
GHSA | GHSA-hwch-749c-rv63 | Potential Command Injection in hubot-scripts | Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module.
### Mitigating Factors
The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts.
## Recommendation
Update hubot-scripts to version 2.4.4 or later. | {'CVE-2013-7378'} | 2021-04-12T21:34:55Z | 2020-08-31T22:46:38Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://www.npmjs.com/advisories/13', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7378', 'https://web.archive.org/web/20140731222413/', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee', 'https://github.com/advisories/GHSA-hwch-749c-rv63', 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782', 'https://', 'http://www.openwall.com/lists/oss-security/2014/05/15/2'} | null | {'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782'} | {'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782'} |
GHSA | GHSA-8vv3-jxm8-f4vf | Prototype Pollution in connie-lang | The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie. | {'CVE-2020-7706'} | 2021-07-29T22:00:16Z | 2021-05-06T17:29:25Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7706', 'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853', 'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a', 'https://github.com/advisories/GHSA-8vv3-jxm8-f4vf'} | null | {'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'} | {'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'} |
GHSA | GHSA-5w65-6875-rhq8 | Undefined Behavior in sailsjs-cacheman | All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-21T17:05:45Z | 2019-09-11T23:01:57Z | LOW | 0 | null | {'https://github.com/gayanhewa/sailsjs-cacheman/pull/10', 'https://www.npmjs.com/advisories/752', 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f', 'https://github.com/advisories/GHSA-5w65-6875-rhq8'} | null | {'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'} | {'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'} |
GHSA | GHSA-9x4c-63pf-525f | Arbitrary Code Generation | ### Impact
Clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution.
Giving this a CVSS of 8.0 (high) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:U/RC:C .
### Patches
Fix will be included in version 0.5.3
### Workarounds
Inspect OpenAPI documents before generating, or inspect generated code before executing.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues)
* Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com) | {'CVE-2020-15142'} | 2022-04-19T19:02:33Z | 2020-08-20T14:38:24Z | HIGH | 8 | {'CWE-94'} | {'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13', 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-9x4c-63pf-525f', 'https://github.com/advisories/GHSA-9x4c-63pf-525f', 'https://pypi.org/project/openapi-python-client/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15142', 'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'} | null | {'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'} | {'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'} |
GHSA | GHSA-q3x2-jvp3-wj78 | Unrestricted XML files leading to cross-site scripting in Microweber | Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack. | {'CVE-2022-0963'} | 2022-03-29T21:18:46Z | 2022-03-16T00:00:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c', 'https://github.com/advisories/GHSA-q3x2-jvp3-wj78', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'} | null | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'} | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'} |
GHSA | GHSA-98pq-pmw9-4gpm | SQL Injection in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection in locations where user input is passed into the `limit` or `order` parameters of `sequelize` query calls, such as `findOne` or `findAll`.
## Recommendation
Update to version 3.17.0 or later. | {'CVE-2016-10550'} | 2021-01-08T19:05:38Z | 2019-02-18T23:54:34Z | HIGH | 0 | {'CWE-89'} | {'https://github.com/advisories/GHSA-98pq-pmw9-4gpm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10550', 'https://www.npmjs.com/advisories/112', 'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03', 'https://nodesecurity.io/advisories/112'} | null | {'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03'} | {'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03'} |
GHSA | GHSA-w8h4-vw8f-rvvj | Improper Control of Dynamically-Managed Code Resources in config-shield | scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data. | {'CVE-2021-26276'} | 2022-04-27T20:27:31Z | 2021-04-13T15:30:09Z | MODERATE | 5.3 | {'CWE-913'} | {'https://github.com/advisories/GHSA-w8h4-vw8f-rvvj', 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6', 'https://advisory.checkmarx.net/advisory/CX-2021-4773', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'} | null | {'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'} | {'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'} |
GHSA | GHSA-wvcv-832q-fjg7 | RSA weakness in tslite-ng | ### Impact
The code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant.
In particular, code in current (as of 0.8.0-alpha38) master
https://github.com/tlsfuzzer/tlslite-ng/blob/0812ed60860fa61a6573b2c0e18771414958f46d/tlslite/utils/rsakey.py#L407-L441
and code in 0.7.5 branch
https://github.com/tlsfuzzer/tlslite-ng/blob/acdde3161124d6ae37c506b3476aea9996d12e97/tlslite/utils/rsakey.py#L394-L425
has multiple ways in which it leaks information (for one, it aborts as soon as the plaintext doesn't start with 0x00, 0x02) about the decrypted ciphertext (both the bit length of the decrypted message as well as where the first unexpected byte lays).
All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable.
All previous versions of tlslite-ng are vulnerable.
### Patches
The patches to fix it are proposed in
https://github.com/tlsfuzzer/tlslite-ng/pull/438
https://github.com/tlsfuzzer/tlslite-ng/pull/439
Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not be the case: https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/
As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the [security policy](https://github.com/tlsfuzzer/tlslite-ng/blob/master/SECURITY.md) of tlslite-ng.
### Workarounds
There is no way to workaround this issue.
### References
https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/
### For more information
If you have any questions or comments about this advisory please open an issue in [tlslite-ng](https://github.com/tlsfuzzer/tlslite-ng/issues). | {'CVE-2020-26263'} | 2022-04-19T19:02:42Z | 2020-12-21T16:56:37Z | LOW | 7.5 | {'CWE-326'} | {'https://github.com/tlsfuzzer/tlslite-ng/pull/439', 'https://pypi.org/project/tlslite-ng/', 'https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/', 'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26263', 'https://github.com/tlsfuzzer/tlslite-ng/security/advisories/GHSA-wvcv-832q-fjg7', 'https://github.com/tlsfuzzer/tlslite-ng/pull/438', 'https://github.com/advisories/GHSA-wvcv-832q-fjg7'} | null | {'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368'} | {'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368'} |
GHSA | GHSA-2mm9-c2fx-c7m4 | XSS in docsify | This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters | {'CVE-2021-23342'} | 2021-03-15T23:55:40Z | 2021-03-01T19:44:27Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe', 'http://seclists.org/fulldisclosure/2021/Feb/71', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://github.com/advisories/GHSA-2mm9-c2fx-c7m4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23342', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593', 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017', 'https://www.npmjs.com/package/docsify'} | null | {'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'} | {'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'} |
GHSA | GHSA-9w2p-5mgw-p94c | Integer overflow due to conversion to unsigned | ### Impact
The implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value.
```python
import tensorflow as tf
tf.raw_ops.QuantizeAndDequantizeV4Grad(
gradients=[1.0,2.0],
input=[1.0,1.0],
input_min=[0.0],
input_max=[10.0],
axis=-100)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L126) uses the `axis` value as the size argument to `absl::InlinedVector` constructor. But, the constructor uses an unsigned type for the argument, so the implicit conversion transforms the negative value to a large integer.
### Patches
We have patched the issue in GitHub commit [96f364a1ca3009f98980021c4b32be5fdcca33a1](https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, and TensorFlow 2.4.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37645'} | 2021-08-25T14:43:37Z | 2021-08-25T14:43:37Z | MODERATE | 5.5 | {'CWE-681'} | {'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37645', 'https://github.com/advisories/GHSA-9w2p-5mgw-p94c'} | null | {'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1'} | {'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1'} |
GHSA | GHSA-3227-r97m-8j95 | Relative Path Traversal in afire serve_static | ### Impact
This vulnerability effects the built-in afire serve_static extension allowing paths containing `//....` to bypass the previous path sanitation and request files in higher directories that should not be accessible.
### Patches
The issue has been fixed in [afire 1.1.0](https://crates.io/crates/afire/1.1.0).
If you can, just update to the newest version of afire.
### Workarounds
If you can't update afire you can simply disallow paths containing `/..` with the following middleware.
Make sure this is the last middleware added to the server so it runs first, stopping the bad requests.
```rust
use afire::prelude::*;
struct PathTraversalFix;
impl Middleware for PathTraversalFix {
fn pre(&self, req: Request) -> MiddleRequest {
if req.path.replace("\\", "/").contains("/..") {
return MiddleRequest::Send(
Response::new()
.status(400)
.text("Paths containing `..` are not allowed"),
);
}
MiddleRequest::Continue
}
}
```
```rust
let mut server = Server::new(host, port);
PathTraversalFix.attach(&mut server);
```
### References
You can read about the new changes to afire in 1.1.0 [here](https://connorcode.com/writing/afire/update-3)
### For more information
If you have any questions or comments about this advisory you can email me or message me on discord.
[[https://connorcode.com/contact](https://connorcode.com/contact)] | null | 2022-04-22T20:16:47Z | 2022-04-22T20:16:45Z | HIGH | 0 | {'CWE-22', 'CWE-34'} | {'https://github.com/Basicprogrammer10/afire/security/advisories/GHSA-3227-r97m-8j95', 'https://github.com/Basicprogrammer10/afire/releases/tag/v1.1.0', 'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921', 'https://github.com/advisories/GHSA-3227-r97m-8j95'} | null | {'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921'} | {'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921'} |
GHSA | GHSA-9pgx-gcph-mpqr | XSS via the history parameter in SQL command | ### Impact
Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected.
### Patches
Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9).
### Workarounds
Use browser which encodes URL parameters (e.g. Chrome or Firefox).
### References
https://sourceforge.net/p/adminer/bugs-and-features/775/
### For more information
If you have any questions or comments about this advisory:
* Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/
| {'CVE-2020-35572'} | 2022-04-19T19:02:47Z | 2021-02-11T20:42:28Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-9pgx-gcph-mpqr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://sourceforge.net/p/adminer/news/', 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'} | null | {'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'} | {'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'} |
GHSA | GHSA-cm5x-837x-jf3c | Division by 0 in inplace operations | ### Impact
An attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0:
```python
import tensorflow as tf
tf.raw_ops.InplaceSub(x=[],i=[-99,-1,-1],v=[1,1,1])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`.
### Patches
We have patched the issue in GitHub commit [e86605c0a336c088b638da02135ea6f9f6753618](https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37660'} | 2021-08-25T14:42:44Z | 2021-08-25T14:42:44Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c', 'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618', 'https://github.com/advisories/GHSA-cm5x-837x-jf3c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37660'} | null | {'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'} | {'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'} |
GHSA | GHSA-2wx6-wc87-rmjm | GitHub personal access token leaking into temporary EasyBuild (debug) logs | ### Impact
The GitHub Personal Access Token (PAT) used by EasyBuild for the GitHub integration features (like `--new-pr`, `--from-pr`, etc.) is shown in plain text in EasyBuild debug log files.
Scope:
* the log message only appears in the top-level log file, *not* in the individual software installation logs (see https://easybuild.readthedocs.io/en/latest/Logfiles.html);
- as a consequence, tokens are *not* included in the partial log files that are uploaded into a gist when using `--upload-test-report` in combination with `--from-pr`, nor in the installation logs that are copied to the software installation directories;
* the message is only logged when using `--debug`, so it will not appear when using the default EasyBuild configuration (only info messages are logged by default);
* the log message is triggered via `--from-pr`, but also via various other GitHub integration options like `--new-pr`, `--merge-pr`, `--close-pr`, etc., but usually only appears in the temporary log file that is cleaned up automatically as soon as eb completes successfully;
* you may have several debug log files that include your GitHub token in `/tmp` (or a different location if you've set the `--tmpdir` EasyBuild configuration option) on the systems where you use EasyBuild, but they are located in a subdirectory that is only accessible to your account (permissions set to 700);
* the only way that a log file that may include your token could have been made public is *if you shared it yourself*, for example by copying the contents of the log file into a gist manually, or by sending a log file to someone;
* for log files uploaded to GitHub, your token would be revoked automatically when GitHub notices it;
### Patches
The issue is fixed with the changes in https://github.com/easybuilders/easybuild-framework/pull/3248.
This fix is included in EasyBuild v4.1.2 (released on Mon Mar 16th 2020), and in the `master`+ `develop` branches of the `easybuild-framework` repository since Mon Mar 16th 2020 (see https://github.com/easybuilders/easybuild-framework/pull/3248 and https://github.com/easybuilders/easybuild-framework/pull/3249 resp.).
**Make sure you revoke the existing GitHub tokens you're using with EasyBuild** (via https://github.com/settings/tokens), and install new ones using "`eb --install-github-token --force`" (see also https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html#installing-a-github-token-install-github-token).
### Workarounds
* avoid using the GitHub integration features (see https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html) with EasyBuild versions older than version 4.1.2;
* don't share top-level EasyBuild (debug) log files with others, unless you are sure your GitHub token is not included in them;
* clean up temporary EasyBuild log files in `/tmp`on the system(s) where you`re using EasyBuild
### References
* https://github.com/easybuilders/easybuild-framework/pull/3248 (PR that fixes the issue)
* (release announcement to EasyBuild mailing list)
### For more information
* Open an issue in [the `easybuild-framework` repository](https://github.com/easybuilders/easybuild-framework)
* Email us at [easybuild-admin@lists.ugent.be](mailto:easybuild-admin@lists.ugent.be) | {'CVE-2020-5262'} | 2022-04-19T19:02:45Z | 2020-03-19T17:29:58Z | MODERATE | 7.7 | {'CWE-532'} | {'https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm', 'https://github.com/easybuilders/easybuild-framework/pull/3249', 'https://github.com/easybuilders/easybuild-framework/pull/3248', 'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9', 'https://github.com/advisories/GHSA-2wx6-wc87-rmjm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5262'} | null | {'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9'} | {'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9'} |
GHSA | GHSA-cxjc-r2fp-7mq6 | XSS in dijit editor's LinkDialog plugin | ### Impact
XSS possible for users of the Dijit Editor's LinkDialog plugin
### Patches
Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3
### Workarounds
Users may apply the patch made in these releases.
### For more information
If you have any questions or comments about this advisory, open an issue in [dojo/dijit](https://github.com/dojo/dijit/) | {'CVE-2020-4051'} | 2022-04-19T19:02:29Z | 2020-06-15T21:53:12Z | LOW | 3.7 | {'CWE-79'} | {'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301', 'https://security.netapp.com/advisory/ntap-20201023-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051', 'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6', 'https://github.com/advisories/GHSA-cxjc-r2fp-7mq6'} | null | {'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301'} | {'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301'} |
GHSA | GHSA-2wwc-w2gw-4329 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335. | {'CVE-2019-1366'} | 2021-03-29T20:55:36Z | 2021-03-29T20:55:36Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/advisories/GHSA-2wwc-w2gw-4329', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf'} | {'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
GHSA | GHSA-rqrc-8q8f-cp9c | Infinite loop in .Net Bond | A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads. | {'CVE-2020-1469'} | 2022-04-08T22:43:53Z | 2022-04-08T18:11:51Z | HIGH | 7.5 | {'CWE-835', 'CWE-434'} | {'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469', 'https://github.com/advisories/GHSA-rqrc-8q8f-cp9c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469'} | null | {'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'} | {'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'} |
GHSA | GHSA-7375-vjr2-3g7w | Cross-Site Scripting in glance | Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package. | {'CVE-2018-3748'} | 2021-09-02T19:13:46Z | 2018-09-27T11:37:19Z | MODERATE | 6.1 | {'CWE-79'} | {'https://hackerone.com/reports/310133', 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533', 'https://www.npmjs.com/advisories/610', 'https://github.com/advisories/GHSA-7375-vjr2-3g7w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3748'} | null | {'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'} | {'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'} |
GHSA | GHSA-7378-6268-4278 | High severity vulnerability that affects DotNetZip | DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | {'CVE-2018-1002205'} | 2021-01-08T19:18:21Z | 2018-10-16T17:16:40Z | HIGH | 0 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/pull/121'} | null | {'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'} | {'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'} |
GHSA | GHSA-q9mp-79cp-9g8j | Improper Authentication | Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred. | {'CVE-2019-20894'} | 2021-09-02T22:00:09Z | 2021-09-02T22:00:09Z | HIGH | 7.5 | {'CWE-287', 'CWE-295'} | {'https://github.com/containous/traefik/issues/5312', 'https://github.com/containous/traefik/pull/7008', 'https://github.com/advisories/GHSA-q9mp-79cp-9g8j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20894', 'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'} | null | {'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'} | {'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'} |
GHSA | GHSA-xw93-v57j-fcgh | Division by 0 in `SparseMatMul` | ### Impact
An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`:
```python
import tensorflow as tf
a = tf.constant([100.0, 100.0, 100.0, 100.0], shape=[2, 2], dtype=tf.float32)
b = tf.constant([], shape=[0, 2], dtype=tf.float32)
tf.raw_ops.SparseMatMul(
a=a, b=b, transpose_a=True, transpose_b=True,
a_is_sparse=True, b_is_sparse=True)
```
The division by 0 occurs deep in Eigen code because the `b` tensor is empty.
### Patches
We have patched the issue in GitHub commit [7f283ff806b2031f407db64c4d3edcda8fb9f9f5](https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29557'} | 2021-05-21T14:24:48Z | 2021-05-21T14:24:48Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29557', 'https://github.com/advisories/GHSA-xw93-v57j-fcgh', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh'} | null | {'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5'} | {'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5'} |
GHSA | GHSA-8wrg-m8vm-5fvj | Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server | ### Impact
Authentication Bypass by Primary Weakness (CWE-305)
Commit:
https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1
ALL Users is impacted.
### Patches
Yes, PLEASE UPGRADE TO v1.3.21-beta.d0ffc0a6 | {'CVE-2021-21403'} | 2022-04-19T19:02:51Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-305'} | {'https://github.com/advisories/GHSA-8wrg-m8vm-5fvj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21403', 'https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj', 'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'} | null | {'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'} | {'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'} |
GHSA | GHSA-9qcf-c26r-x5rf | XML external entity injection in Terracotta Quartz Scheduler | initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description. | {'CVE-2019-13990'} | 2021-10-21T21:18:40Z | 2020-07-01T17:55:03Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170', 'https://github.com/quartz-scheduler/quartz/issues/467', 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/quartz-scheduler/quartz/pull/501', 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-9qcf-c26r-x5rf', 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551', 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null | {'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'} | {'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'} |
GHSA | GHSA-x2fc-mxcx-w4mf | Prototype Pollution in mathjs | The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates. | {'CVE-2020-7743'} | 2021-05-10T18:39:04Z | 2021-05-10T18:39:04Z | HIGH | 0 | {'CWE-915'} | {'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751', 'https://github.com/advisories/GHSA-x2fc-mxcx-w4mf', 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e', 'https://www.npmjs.com/package/mathjs', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113', 'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401', 'https://github.com/josdejong/mathjs/blob/develop/src/utils/object.js%23L82', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7743'} | null | {'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'} | {'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'} |
GHSA | GHSA-gcv8-gh4r-25x6 | Authorization Bypass Through User-Controlled Key in urijs | Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647. | {'CVE-2022-0613'} | 2022-04-01T18:06:55Z | 2022-02-17T00:00:35Z | MODERATE | 6.5 | {'CWE-639'} | {'https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083', 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613', 'https://github.com/advisories/GHSA-gcv8-gh4r-25x6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/'} | null | {'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'} | {'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'} |
GHSA | GHSA-m7fq-cf8q-35q7 | High severity vulnerability that affects crack | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | {'CVE-2013-1800'} | 2021-09-15T18:18:56Z | 2017-10-24T18:33:37Z | HIGH | 0 | null | {'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=917236', 'https://bugzilla.novell.com/show_bug.cgi?id=804721', 'https://github.com/advisories/GHSA-m7fq-cf8q-35q7', 'http://secunia.com/advisories/52897'} | null | {'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'} | {'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'} |
GHSA | GHSA-f8q4-jwww-x3wv | Race Condition in Paramiko | In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure. | {'CVE-2022-24302'} | 2022-04-18T22:19:04Z | 2022-03-19T00:01:03Z | MODERATE | 5.9 | {'CWE-362'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI/', 'https://www.paramiko.org/changelog.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24302', 'https://github.com/advisories/GHSA-f8q4-jwww-x3wv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB/', 'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html', 'https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml', 'https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546'} | null | {'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'} | {'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'} |
GHSA | GHSA-2p6g-gjp8-ggg9 | Validation bypass in personnummer | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan) | null | 2020-09-11T16:41:26Z | 2020-09-09T17:29:34Z | LOW | 0 | null | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/advisories/GHSA-2p6g-gjp8-ggg9', 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'} | null | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'} | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'} |
GHSA | GHSA-pw2r-vq6v-hr8c | Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects | Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8. | {'CVE-2022-0536'} | 2022-02-14T22:27:57Z | 2022-02-10T00:00:31Z | MODERATE | 5.9 | {'CWE-200'} | {'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445', 'https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db', 'https://github.com/advisories/GHSA-pw2r-vq6v-hr8c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536'} | null | {'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'} | {'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'} |
GHSA | GHSA-9g9w-hmvj-5h57 | Prototype Pollution in merge-deep | Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 3.0.1 or later. | {'CVE-2018-3722'} | 2021-01-08T19:04:35Z | 2018-07-26T15:17:15Z | LOW | 0 | {'CWE-471'} | {'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3722', 'https://www.npmjs.com/advisories/580', 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57', 'https://hackerone.com/reports/310708'} | null | {'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5'} | {'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5'} |
GHSA | GHSA-mqf3-28j7-3mj6 | Information Exposure in Kubernetes | Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name. | {'CVE-2015-7528'} | 2022-04-12T22:40:23Z | 2022-02-15T01:57:18Z | MODERATE | 5.3 | {'CWE-200'} | {'https://github.com/kubernetes/kubernetes/pull/17886', 'https://github.com/advisories/GHSA-mqf3-28j7-3mj6', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7528', 'https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5', 'http://rhn.redhat.com/errata/RHSA-2015-2615.html', 'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671', 'https://github.com/openshift/origin/pull/6113', 'https://access.redhat.com/errata/RHSA-2015:2544'} | null | {'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671'} | {'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671'} |
GHSA | GHSA-88cc-g835-76rp | Improper Restriction of XML External Entity Reference | PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. | {'CVE-2020-13692'} | 2022-02-10T00:30:23Z | 2022-02-10T00:30:07Z | HIGH | 7.7 | {'CWE-611'} | {'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-88cc-g835-76rp', 'https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E', 'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13', 'https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200619-0005/', 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65', 'https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692'} | null | {'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'} | {'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'} |
GHSA | GHSA-cqxx-66wh-8pjw | Improper Removal of Sensitive Information Before Storage or Transfer in irrd | IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected.
The issue occurred:
* For `mntner` objects where all password hash names (`MD5-PW` and `CRYPT-PW`) were in lower or mixed case in the `auth` attribute. For these objects, hashes remained in the output of all queries of any method and all database exports made with the `export_destination` setting. Fortunately, objects in the common public IRR database virtually all use uppercase hash names which means very few of those objects were affected.
* For any GraphQL queries that queried the `auth` field on `mntner` objects.
* For any GraphQL queries that queried the `objectText` field on the `journal` field on `mntner` objects, if the `nrtm_access_list` setting permitted journal access.
The two GraphQL cases are visible in logs, allowing users to determine whether any existing objects had their hashes exposed.
This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. All users running a more recent version from the main branch should update to the latest version. Alternatively, but not recommended, apply the patch manually [for 4.2.x] | {'CVE-2022-24798'} | 2022-04-13T01:15:56Z | 2022-04-01T13:59:17Z | HIGH | 7.5 | {'CWE-212'} | {'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24798', 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw', 'https://github.com/advisories/GHSA-cqxx-66wh-8pjw', 'https://irrd.readthedocs.io/en/stable/releases/4.2.3/', 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'} | null | {'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70', 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'} | {'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6', 'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70'} |
GHSA | GHSA-3j95-fjv2-3m4p | CSS Injection in Chartkick gem | The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute). | {'CVE-2020-16254'} | 2021-09-23T18:53:25Z | 2020-08-12T14:29:15Z | MODERATE | 6.1 | {'CWE-74'} | {'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml', 'https://github.com/ankane/chartkick/issues/546', 'https://github.com/ankane/chartkick', 'https://github.com/advisories/GHSA-3j95-fjv2-3m4p', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16254', 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'} | null | {'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'} | {'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'} |
GHSA | GHSA-vrgp-3ph6-2wwq | SQL Injection in Dolibarr | An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement. | {'CVE-2021-36625'} | 2022-04-15T23:31:18Z | 2022-04-01T00:00:41Z | HIGH | 8.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22', 'https://github.com/advisories/GHSA-vrgp-3ph6-2wwq'} | null | {'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} | {'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} |
GHSA | GHSA-3q32-j57w-q4w7 | Path Traversal in total.js | Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths.
The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `xml`, `woff`, `woff2`, `otf`, `ttf`, `eot`, `svg`, `zip`, `rar`, `pdf`, `docx`, `xlsx`, `doc`, `xls`, `html`, `htm`, `appcache`, `manifest`, `map`, `ogv`, `ogg`, `mp4`, `mp3`, `webp`, `webm`, `swf`, `package`, `json`, `md`, `m4v`, `jsx`, `heif`, `heic`.
## Recommendation
- If you are using version 2.1.x, upgrade to 2.1.1 or later.
- If you are using version 2.2.x, upgrade to 2.2.1 or later.
- If you are using version 2.3.x, upgrade to 2.3.1 or later.
- If you are using version 2.4.x, upgrade to 2.4.1 or later.
- If you are using version 2.5.x, upgrade to 2.5.1 or later.
- If you are using version 2.6.x, upgrade to 2.6.3 or later.
- If you are using version 2.7.x, upgrade to 2.7.1 or later.
- If you are using version 2.8.x, upgrade to 2.8.1 or later.
- If you are using version 2.9.x, upgrade to 2.9.5 or later.
- If you are using version 3.0.x, upgrade to 3.0.1 or later.
- If you are using version 3.1.x, upgrade to 3.1.1 or later.
- If you are using version 3.2.x, upgrade to 3.2.4 or later. | {'CVE-2019-8903'} | 2021-08-31T21:22:07Z | 2019-02-20T15:40:13Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-8903', 'https://github.com/advisories/GHSA-3q32-j57w-q4w7', 'https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903', 'https://www.npmjs.com/advisories/1026', 'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'} | null | {'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'} | {'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'} |
GHSA | GHSA-mq35-wqvf-r23c | Sinatra has XSS via 400 Bad Request page via params parser exception | Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception. | {'CVE-2018-11627'} | 2022-04-26T18:04:34Z | 2018-06-05T21:32:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/sinatra/sinatra/issues/1428', 'https://access.redhat.com/errata/RHSA-2019:0315', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627', 'https://access.redhat.com/errata/RHSA-2019:0212', 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a', 'https://github.com/advisories/GHSA-mq35-wqvf-r23c'} | null | {'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'} | {'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'} |
GHSA | GHSA-3j9m-hcv9-rpj8 | XSS vulnerability allowing arbitrary JavaScript execution | Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
## CVE-2021-41174 XSS vulnerability on unauthenticated pages
### Summary
CVSS Score: 6.9 Medium
CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L)
We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability.
It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability.
### Impact
If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser.
The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar.
There are two ways an unauthenticated user can open a page in Grafana that contains the login button:
- Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack.
- The link is to an unauthenticated page. The following pages are vulnerable:
- `/dashboard-solo/snapshot/*`
- `/dashboard/snapshot/*`
- `/invite/:code`
The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }}
An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this:
https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1
When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL.
### Attack audit
We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment.
#### Through reverse proxy/load balancer logs
To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks.
#### Through the Grafana Enterprise audit feature
If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code.
### Patched versions
Release 8.2.3:
- [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3)
- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/)
### Solutions and mitigations
Download and install the appropriate patch for your version of Grafana.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
### Workaround
If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path.
Example of an Nginx rule to block the literal string `{{`:
```
location ~ \{\{ {
deny all;
}
```
### Timeline and postmortem
Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC.
* 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability.
* 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2.
* 2021-10-22 02:02 MEDIUM severity declared.
* 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ .
* 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure.
* 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests.
* 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud.
* 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected.
* 2021-10-22 14:05 Grafana Cloud instances updated with a fix.
* 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified.
* 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation.
* 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo.
* 2021-11-03 12:00: Public release.
## Reporting security issues
If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of
Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index).
## Security announcements
There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml). | {'CVE-2021-41174'} | 2021-11-29T15:05:32Z | 2021-11-08T18:13:19Z | MODERATE | 6.9 | {'CWE-79'} | {'https://security.netapp.com/advisory/ntap-20211125-0003/', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41174', 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8', 'https://github.com/advisories/GHSA-3j9m-hcv9-rpj8'} | null | {'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82'} | {'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88'} |
GHSA | GHSA-m87f-9fvv-2mgg | Deserialization of Untrusted Data in parlai | ### Impact
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks.
### Patches
The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls.
### References
- https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725
- https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879
- https://anon-artist.github.io/blogs/blog3.html | {'CVE-2021-39207'} | 2022-04-19T19:03:08Z | 2021-09-13T20:05:39Z | HIGH | 8.4 | {'CWE-502'} | {'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/advisories/GHSA-m87f-9fvv-2mgg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39207', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879', 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg'} | null | {'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'} | {'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'} |
GHSA | GHSA-pf59-j7c2-rh6x | Exposure of Sensitive Information to an Unauthorized Actor and Insertion of Sensitive Information Into Sent Data in Calico | Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod. | {'CVE-2020-13597'} | 2022-04-12T22:53:10Z | 2022-02-15T01:57:18Z | LOW | 6 | {'CWE-200', 'CWE-201'} | {'https://github.com/kubernetes/kubernetes/issues/91507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13597', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8', 'https://github.com/advisories/GHSA-pf59-j7c2-rh6x', 'https://github.com/containernetworking/plugins/pull/484/', 'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965', 'https://www.projectcalico.org/security-bulletins/'} | null | {'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965'} | {'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965'} |
GHSA | GHSA-389p-fchr-q2mg | Path Traversal in ImpressCMS | ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress. | {'CVE-2022-24977'} | 2022-02-26T00:34:46Z | 2022-02-15T00:02:47Z | CRITICAL | 9.8 | {'CWE-22'} | {'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://github.com/advisories/GHSA-389p-fchr-q2mg', 'https://r0.haxors.org/posts?id=8'} | null | {'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'} | {'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'} |
GHSA | GHSA-mw36-7c6c-q4q2 | XStream can be used for Remote Code Execution | ### Impact
The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.
### Workarounds
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use.
Users of XStream 1.4.13 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### Credits
Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2020-26217'} | 2022-04-25T23:05:50Z | 2020-11-16T20:07:59Z | HIGH | 8 | {'CWE-78'} | {'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://x-stream.github.io/CVE-2020-26217.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2020/dsa-4811', 'https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E', 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2', 'https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html', 'https://security.netapp.com/advisory/ntap-20210409-0004/', 'https://github.com/advisories/GHSA-mw36-7c6c-q4q2', 'https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null | {'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'} | {'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'} |
GHSA | GHSA-rjjg-hgv6-h69v | Memory corruption in Tensorflow | ### Impact
The implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/tfe_wrapper.cc#L1361
However, there is nothing stopping users from passing in a Python object instead of a tensor.
```python
In [2]: tf.experimental.dlpack.to_dlpack([2])
==1720623==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x55b0ba5c410a in tensorflow::(anonymous namespace)::GetTensorFromHandle(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:46:7
#1 0x55b0ba5c38f4 in tensorflow::TFE_HandleToDLPack(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:252:26
...
```
The uninitialized memory address is due to a `reinterpret_cast`
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/eager/pywrap_tensor.cc#L848-L850
Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails.
### Patches
We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15193'} | 2021-08-26T15:11:04Z | 2020-09-25T18:28:27Z | HIGH | 7.1 | {'CWE-908'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15193', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-rjjg-hgv6-h69v', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} |
GHSA | GHSA-3crj-w4f5-gwh4 | Processing untrusted theming resources might execute arbitrary code (ACE) | ### Impact
When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process.
While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development.
Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat:
An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files.
This is an example of inline JavaScript in a Less file:
```less
.rule {
@var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`;
color: @var;
}
```
Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3.
Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it:
```less
.rule {
@var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`";
color: @var;
}
```
### Patches
We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork.
This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0)
### Workarounds
Only process trusted theming resources.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/SAP/less-openui5
* Email us at secure@sap.com | {'CVE-2021-21316'} | 2021-02-17T17:18:20Z | 2021-01-29T20:51:37Z | HIGH | 6.3 | {'CWE-74'} | {'https://github.com/SAP/less-openui5/releases/tag/v0.10.0', 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4', 'https://www.npmjs.com/package/less-openui5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316', 'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8', 'https://github.com/advisories/GHSA-3crj-w4f5-gwh4', 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'} | null | {'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'} | {'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'} |
GHSA | GHSA-p6mc-m468-83gw | Prototype Pollution in lodash | Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.
This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances. | {'CVE-2020-8203'} | 2022-04-26T20:58:31Z | 2020-07-15T19:15:48Z | HIGH | 7.4 | {'CWE-770', 'CWE-1321'} | {'https://hackerone.com/reports/712065', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-p6mc-m468-83gw', 'https://github.com/lodash/lodash/issues/4874', 'https://security.netapp.com/advisory/ntap-20200724-0006/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/lodash/lodash/issues/4744', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.npmjs.com/advisories/1523', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null | {'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'} | {'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'} |
GHSA | GHSA-cwx2-736x-mf6w | Prototype pollution in object-path | ### Impact
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable.
### Patches
Upgrade to version >= 0.11.5
### Workarounds
Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
### References
[Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [object-path](https://github.com/mariocasciaro/object-path) | {'CVE-2020-15256'} | 2022-04-19T19:02:39Z | 2020-10-19T20:55:55Z | HIGH | 7.7 | {'CWE-20', 'CWE-471'} | {'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68', 'https://github.com/advisories/GHSA-cwx2-736x-mf6w', 'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256'} | null | {'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'} | {'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'} |
GHSA | GHSA-x949-7cm6-fm6p | Code Injection in md-to-pdf. | The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine. | {'CVE-2021-23639'} | 2021-12-16T14:34:40Z | 2021-12-16T14:34:40Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880', 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a', 'https://github.com/simonhaenisch/md-to-pdf/issues/99', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639', 'https://github.com/advisories/GHSA-x949-7cm6-fm6p'} | null | {'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'} | {'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'} |
GHSA | GHSA-8xjv-v9xq-m5h9 | Moderate severity vulnerability that affects Pillow | Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. | {'CVE-2016-0775'} | 2021-09-07T20:34:14Z | 2018-07-24T20:15:36Z | MODERATE | 6.5 | {'CWE-119'} | {'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://github.com/advisories/GHSA-8xjv-v9xq-m5h9', 'http://www.debian.org/security/2016/dsa-3499', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0775'} | null | {'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b'} | {'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b'} |
GHSA | GHSA-pg36-wpm5-g57p | HTTP Request Smuggling: LF vs CRLF handling in Waitress | ### Impact
Waitress implemented a &quot;MAY&quot; part of the RFC7230 (https://tools.ietf.org/html/rfc7230#section-3.5) which states:
Although the line terminator for the start-line and header fields is
the sequence CRLF, a recipient MAY recognize a single LF as a line
terminator and ignore any preceding CR.
Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message.
Example:
```
Content-Length: 100[CRLF]
X-Header: x[LF]Content-Length: 0[CRLF]
```
Would get treated by Waitress as if it were:
```
Content-Length: 100
X-Header: x
Content-Length: 0
```
This could potentially get used by attackers to split the HTTP request and smuggle a second request in the body of the first.
### Patches
This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies.
Waitress no longer implements the MAY part of the specification and instead requires that all lines are terminated correctly with CRLF. If any lines are found with a bare CR or LF a 400 Bad Request is sent back to the requesting entity.
The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don&#39;t cause any changes in behavior.
### Workarounds
Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn&#39;t use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method)
### Issues/more security issues:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related) | {'CVE-2019-16785'} | 2022-04-25T23:10:29Z | 2019-12-20T23:03:57Z | HIGH | 7.1 | {'CWE-444'} | {'https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p', 'https://github.com/advisories/GHSA-pg36-wpm5-g57p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16785', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'} | null | {'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba'} | {'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba'} |
GHSA | GHSA-pg97-ww7h-5mjr | XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo:
* 1.16.1
* 1.15.2
* 1.14.5
* 1.13.6
* 1.12.7
* 1.11.9
Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dojo/dojox](https://github.com/dojo/dojox/) | {'CVE-2019-10785'} | 2022-04-19T19:02:30Z | 2020-02-13T22:21:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,', 'https://github.com/dojo/dojox/pull/315', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html', 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee', 'https://github.com/advisories/GHSA-pg97-ww7h-5mjr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257', 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr'} | null | {'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'} | {'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'} |
GHSA | GHSA-hp4c-x6r7-6555 | Floating point exception in `SparseDenseCwiseDiv` | ### Impact
The implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseDenseCwiseDiv(
sp_indices=np.array([[4]]),
sp_values=np.array([-400]),
sp_shape=np.array([647.]),
dense=np.array([0]))
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately.
### Patches
We have patched the issue in GitHub commit [d9204be9f49520cdaaeb2541d1dc5187b23f31d9](https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37636'} | 2021-08-25T14:44:14Z | 2021-08-25T14:44:14Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-hp4c-x6r7-6555', 'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37636'} | null | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'} | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'} |
GHSA | GHSA-3949-f494-cm99 | Cross-site Scripting in Prism | ### Impact
Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code.
Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted.
### Patches
This bug has been fixed in v1.27.0.
### Workarounds
Do not use the Command line plugin on untrusted inputs, or sanitized all code blocks (remove all HTML code text) from all code blocks that use the Command line plugin.
### References
- https://github.com/PrismJS/prism/pull/3341 | {'CVE-2022-23647'} | 2022-02-26T01:32:38Z | 2022-02-22T19:32:18Z | HIGH | 7.5 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23647', 'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99', 'https://github.com/advisories/GHSA-3949-f494-cm99', 'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c', 'https://github.com/PrismJS/prism/pull/3341'} | null | {'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c'} | {'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c'} |
GHSA | GHSA-w5cr-frph-hw7f | Use of uninitialized buffer in rkyv | An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct. | {'CVE-2021-31919'} | 2021-08-25T21:01:50Z | 2021-08-25T21:01:50Z | HIGH | 7.5 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-31919', 'https://github.com/advisories/GHSA-w5cr-frph-hw7f', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712', 'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://rustsec.org/advisories/RUSTSEC-2021-0054.html'} | null | {'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712'} | {'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712'} |
GHSA | GHSA-g92x-8m54-p89v | Cross-Site Request Forgery in snipe-it | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3858'} | 2021-10-22T13:56:57Z | 2021-10-21T17:48:55Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://github.com/advisories/GHSA-g92x-8m54-p89v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'} | null | {'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'} | {'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'} |
GHSA | GHSA-jx5q-g37m-h5hj | Client-Side JavaScript Prototype Pollution in oro/platform | ### Summary
By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution.
### Workarounds
Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype` | {'CVE-2021-43852'} | 2022-01-13T18:33:44Z | 2022-01-06T18:29:51Z | MODERATE | 5.3 | {'CWE-74', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43852', 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://github.com/advisories/GHSA-jx5q-g37m-h5hj'} | null | {'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'} | {'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.