ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-rf3w-29h3-r636 | Arbitrary Code Execution in feehi/cms | An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file. | {'CVE-2020-21322'} | 2021-09-29T18:02:51Z | 2021-09-20T20:45:35Z | HIGH | 0 | {'CWE-434'} | {'https://github.com/advisories/GHSA-rf3w-29h3-r636', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322', 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9', 'https://github.com/liufee/cms/issues/44'} | null | {'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'} | {'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'} |
GHSA | GHSA-8v5f-hp78-jgxq | Signature Verification Bypass in jwt-simple | Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm).
## Recommendation
Upgrade to version 0.5.3 or later. | null | 2021-08-04T20:57:39Z | 2019-06-06T15:30:33Z | HIGH | 0 | {'CWE-347'} | {'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106', 'https://www.npmjs.com/advisories/831', 'https://github.com/advisories/GHSA-8v5f-hp78-jgxq'} | null | {'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'} | {'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'} |
GHSA | GHSA-hhx9-p69v-cx2j | Authentication bypass in Apache Airflow | "The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default" | {'CVE-2020-13927'} | 2021-06-03T15:21:59Z | 2021-04-30T17:34:13Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://github.com/advisories/GHSA-hhx9-p69v-cx2j', 'https://airflow.apache.org/docs/apache-airflow/1.10.11/security.html#api-authentication', 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html', 'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13927', 'https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E', 'https://github.com/apache/airflow/releases/tag/1.10.11'} | null | {'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e'} | {'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e'} |
GHSA | GHSA-58v3-j75h-xr49 | Improper Input Validation in libseccomp-golang | libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. | {'CVE-2017-18367'} | 2021-05-18T15:44:30Z | 2021-05-18T15:44:30Z | HIGH | 4.8 | {'CWE-284'} | {'https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html', 'http://www.openwall.com/lists/oss-security/2019/04/25/6', 'https://access.redhat.com/errata/RHSA-2019:4090', 'https://usn.ubuntu.com/4574-1/', 'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e', 'https://github.com/seccomp/libseccomp-golang/issues/22', 'https://github.com/advisories/GHSA-58v3-j75h-xr49', 'https://access.redhat.com/errata/RHSA-2019:4087', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18367'} | null | {'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'} | {'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'} |
GHSA | GHSA-w6cx-qg2q-rvq8 | Path Traversal in @finastra/ssr-pages | A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/1
- https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
| {'CVE-2022-24718'} | 2022-04-19T19:03:25Z | 2022-03-01T22:09:18Z | HIGH | 7.6 | {'CWE-22'} | {'https://github.com/Finastra/ssr-pages/pull/1', 'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780', 'https://github.com/advisories/GHSA-w6cx-qg2q-rvq8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718', 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-qg2q-rvq8'} | null | {'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780'} | {'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780'} |
GHSA | GHSA-5r2v-6gm6-vpvh | Insecure Permissions in Gogs | routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks. | {'CVE-2019-14544'} | 2021-05-18T17:33:58Z | 2021-05-18T17:33:58Z | CRITICAL | 9.8 | {'CWE-200'} | {'https://github.com/advisories/GHSA-5r2v-6gm6-vpvh', 'https://github.com/gogs/gogs/issues/5764', 'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14544'} | null | {'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945'} | {'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945'} |
GHSA | GHSA-mg98-x2cm-4cpf | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107. | {'CVE-2019-1106'} | 2021-03-29T20:59:15Z | 2021-03-29T20:59:15Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/advisories/GHSA-mg98-x2cm-4cpf', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'} | {'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} |
GHSA | GHSA-pccm-j6vj-jwwf | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload. | {'CVE-2022-0962'} | 2022-03-29T21:17:44Z | 2022-03-15T00:00:54Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0962', 'https://github.com/advisories/GHSA-pccm-j6vj-jwwf', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | null | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} |
GHSA | GHSA-pq2f-3fg3-rw99 | SQL Injection in WordPress Zero Spam WordPress plugin | The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection | {'CVE-2022-0254'} | 2022-03-29T21:17:17Z | 2022-03-15T00:00:57Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0254', 'https://plugins.trac.wordpress.org/changeset/2680906', 'https://plugins.trac.wordpress.org/changeset/2660225', 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3', 'https://github.com/advisories/GHSA-pq2f-3fg3-rw99', 'https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997'} | null | {'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'} | {'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'} |
GHSA | GHSA-4p4p-www8-8fv9 | Reference binding to null in `ParameterizedTruncatedNormal` | ### Impact
An attacker can trigger undefined behavior by binding to null pointer in `tf.raw_ops.ParameterizedTruncatedNormal`:
```python
import tensorflow as tf
shape = tf.constant([], shape=[0], dtype=tf.int32)
means = tf.constant((1), dtype=tf.float32)
stdevs = tf.constant((1), dtype=tf.float32)
minvals = tf.constant((1), dtype=tf.float32)
maxvals = tf.constant((1), dtype=tf.float32)
tf.raw_ops.ParameterizedTruncatedNormal(
shape=shape, means=means, stdevs=stdevs, minvals=minvals, maxvals=maxvals)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3f6fe4dfef6f57e768260b48166c27d148f3015f/tensorflow/core/kernels/parameterized_truncated_normal_op.cc#L630) does not validate input arguments before accessing the first element of `shape`:
```cc
int32 num_batches = shape_tensor.flat<int32>()(0);
```
If `shape` argument is empty, then `shape_tensor.flat<T>()` is an empty array.
### Patches
We have patched the issue in GitHub commit [5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8](https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29568'} | 2021-05-21T14:25:19Z | 2021-05-21T14:25:19Z | LOW | 2.5 | {'CWE-824'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29568', 'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4p4p-www8-8fv9', 'https://github.com/advisories/GHSA-4p4p-www8-8fv9'} | null | {'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8'} | {'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8'} |
GHSA | GHSA-86mr-6m89-vgj3 | Buffer Overflow in node-weakauras-parser | Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems.
## Recommendation
Upgrade to versions 1.0.5, 2.0.2, 3.0.1 or later. | null | 2021-10-04T21:10:10Z | 2020-09-03T15:51:38Z | MODERATE | 0 | {'CWE-120'} | {'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43', 'https://www.npmjs.com/advisories/1504', 'https://github.com/advisories/GHSA-86mr-6m89-vgj3'} | null | {'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43'} | {'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43'} |
GHSA | GHSA-v4cr-m5f8-gxw8 | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF) | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4092'} | 2021-12-16T14:14:56Z | 2021-12-16T14:14:56Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-v4cr-m5f8-gxw8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23', 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'} |
GHSA | GHSA-2jhm-qp48-hv5j | Missing authorization in xwiki-platform | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString:
```
$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")
```
### Patches
It has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1.
### Workarounds
The only workaround is to give SCRIPT right only to trusted users.
### References
https://jira.xwiki.org/browse/XWIKI-18870
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org) | {'CVE-2022-23621'} | 2022-02-11T15:00:23Z | 2022-02-09T21:56:05Z | MODERATE | 5.5 | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23621', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j', 'https://jira.xwiki.org/browse/XWIKI-18870', 'https://github.com/advisories/GHSA-2jhm-qp48-hv5j', 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'} | null | {'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'} | {'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'} |
GHSA | GHSA-2ww3-fxvq-293j | Inefficient Regular Expression in nltk | nltk is contains an Inefficient Regular Expression and is vulnerable to regular expression denial of service attacks. | {'CVE-2021-3828'} | 2022-04-26T18:03:42Z | 2021-09-29T17:14:53Z | HIGH | 7.5 | {'CWE-697', 'CWE-1333'} | {'https://github.com/nltk/nltk/pull/2816', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3828', 'https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32', 'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6', 'https://github.com/advisories/GHSA-2ww3-fxvq-293j'} | null | {'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6'} | {'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6'} |
GHSA | GHSA-m8rp-q82r-c5mf | Cross-site Scripting in microweber | Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0278'} | 2022-01-27T18:31:49Z | 2022-01-21T18:06:49Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-m8rp-q82r-c5mf', 'https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030', 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0278'} | null | {'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'} | {'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'} |
GHSA | GHSA-282f-qqgm-c34q | Prototype Pollution in node-jsonpointer | This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. | {'CVE-2021-23807'} | 2021-11-08T17:44:45Z | 2021-11-08T17:44:45Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://github.com/advisories/GHSA-282f-qqgm-c34q', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288', 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23807', 'https://github.com/janl/node-jsonpointer/pull/51'} | null | {'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4'} | {'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4'} |
GHSA | GHSA-m34j-p8rj-wjxq | Division by 0 in `QuantizedBiasAdd` | ### Impact
An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8)
bias = tf.constant([], shape=[0], dtype=tf.quint8)
min_input = tf.constant(-10.0, dtype=tf.float32)
max_input = tf.constant(-10.0, dtype=tf.float32)
min_bias = tf.constant(-10.0, dtype=tf.float32)
max_bias = tf.constant(-10.0, dtype=tf.float32)
tf.raw_ops.QuantizedBiasAdd(input=input_tensor, bias=bias, min_input=min_input,
max_input=max_input, min_bias=min_bias,
max_bias=max_bias, out_type=tf.qint32)
```
This is because the [implementation of the Eigen kernel](https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/tensorflow/core/kernels/quantization_utils.h#L812-L849) does a division by the number of elements of the smaller input (based on shape) without checking that this is not zero:
```cc
template <typename T1, typename T2, typename T3>
void QuantizedAddUsingEigen(const Eigen::ThreadPoolDevice& device,
const Tensor& input, float input_min,
float input_max, const Tensor& smaller_input,
float smaller_input_min, float smaller_input_max,
Tensor* output, float* output_min,
float* output_max) {
...
const int64 input_element_count = input.NumElements();
const int64 smaller_input_element_count = smaller_input.NumElements();
...
bcast[0] = input_element_count / smaller_input_element_count;
...
}
```
This integral division by 0 is undefined behavior.
### Patches
We have patched the issue in GitHub commit [67784700869470d65d5f2ef20aeb5e97c31673cb](https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29546'} | 2021-05-21T14:23:28Z | 2021-05-21T14:23:28Z | LOW | 2.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29546', 'https://github.com/advisories/GHSA-m34j-p8rj-wjxq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq', 'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'} | null | {'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'} | {'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'} |
GHSA | GHSA-x3g3-jh26-76cf | Cross-site Scripting in livehelperchat | LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration. | {'CVE-2022-0375'} | 2022-02-02T16:05:34Z | 2022-01-28T23:06:00Z | MODERATE | 6.5 | {'CWE-79'} | {'https://github.com/advisories/GHSA-x3g3-jh26-76cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0375', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://huntr.dev/bounties/28e1c356-6eaa-4d93-af56-938e3b4d40a7'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} |
GHSA | GHSA-p3rp-vmj9-gv6v | Incorrect sanitisation function leads to `XSS` in mermaid | ### Impact
Malicious diagrams can contain javascript code that can be run at diagram readers machines.
### Patches
The users should upgrade to version 8.13.8
### Workarounds
You need to upgrade in order to avoid this issue.
| {'CVE-2021-43861'} | 2022-01-06T19:45:59Z | 2022-01-06T19:45:59Z | HIGH | 7.2 | {'CWE-20', 'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43861', 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v', 'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83', 'https://github.com/advisories/GHSA-p3rp-vmj9-gv6v', 'https://github.com/mermaid-js/mermaid/releases/tag/8.13.8'} | null | {'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83'} | {'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83'} |
GHSA | GHSA-2j9c-9vmv-7m39 | Missing anchor in Rack-Cors allows malicious third party site to perform CORS request | Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed. | {'CVE-2017-11173'} | 2022-04-26T18:19:30Z | 2018-07-31T18:18:39Z | HIGH | 8.8 | null | {'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6', 'https://github.com/advisories/GHSA-2j9c-9vmv-7m39', 'http://seclists.org/fulldisclosure/2017/Jul/22', 'http://www.debian.org/security/2017/dsa-3931', 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11173'} | null | {'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'} | {'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'} |
GHSA | GHSA-fh37-cx83-q542 | Improper Authentication in Apache Airflow | The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue only affects Apache Airflow 2.0.0. | {'CVE-2021-26697'} | 2021-06-18T18:30:11Z | 2021-06-18T18:30:11Z | MODERATE | 5.3 | {'CWE-287', 'CWE-269'} | {'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/02/17/2', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26697', 'https://github.com/advisories/GHSA-fh37-cx83-q542', 'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E'} | null | {'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'} | {'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'} |
GHSA | GHSA-m5pj-vjjf-4m3h | Arbitrary Code Execution in grunt | The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML. | {'CVE-2020-7729'} | 2021-05-06T18:27:18Z | 2021-05-06T18:27:18Z | HIGH | 7.1 | {'CWE-1188'} | {'https://snyk.io/vuln/SNYK-JS-GRUNT-597546', 'https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922', 'https://github.com/advisories/GHSA-m5pj-vjjf-4m3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7729', 'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7', 'https://usn.ubuntu.com/4595-1/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html'} | null | {'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7'} | {'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7'} |
GHSA | GHSA-686f-ch3r-xwmh | Data races in unicycle | Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab<T>` & `Unordered<T, S>`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads.
This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab<T>` or `Unordered<T, S>` and accessed concurrently from multiple threads.
The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab<T>` & `Unordered<T, S>` and adding `T: Sync` to `Sync` impls for `PinSlab<T>` & `Unordered<T, S>`. | {'CVE-2020-36436'} | 2021-08-25T20:58:17Z | 2021-08-25T20:58:17Z | HIGH | 8.1 | {'CWE-119', 'CWE-362'} | {'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5', 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html', 'https://github.com/udoprog/unicycle/issues/8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36436', 'https://github.com/advisories/GHSA-686f-ch3r-xwmh'} | null | {'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'} | {'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'} |
GHSA | GHSA-x64g-4xx9-fh6x | Denial of Service in Cryptacular | CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data. | {'CVE-2020-7226'} | 2022-04-22T18:19:17Z | 2020-06-10T20:02:58Z | HIGH | 7.5 | {'CWE-770'} | {'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547@%3Ccommits.ws.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/issues/52', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-x64g-4xx9-fh6x', 'https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6@%3Ccommits.tomee.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://github.com/vt-middleware/cryptacular/commit/ec2fb65f2455c479376695e3d75d30c7f6884b3f', 'https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945@%3Cdev.ws.apache.org%3E', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44@%3Cdev.ws.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7226', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a@%3Cdev.ws.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/pull/56', 'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://github.com/apereo/cas/pull/4685'} | null | {'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/commit/ec2fb65f2455c479376695e3d75d30c7f6884b3f'} | {'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://github.com/vt-middleware/cryptacular/commit/ec2fb65f2455c479376695e3d75d30c7f6884b3f'} |
GHSA | GHSA-xqfj-35wv-m3cr | Null pointer dereference in `StringNGrams` | ### Impact
An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`:
```python
import tensorflow as tf
data=tf.constant([''] * 11, shape=[11], dtype=tf.string)
splits = [0]*115
splits.append(3)
data_splits=tf.constant(splits, shape=[116], dtype=tf.int64)
tf.raw_ops.StringNGrams(data=data, data_splits=data_splits, separator=b'Ss',
ngram_widths=[7,6,11],
left_pad='ABCDE', right_pad=b'ZYXWVU',
pad_width=50, preserve_short_sequences=True)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L67-L74) does not fully validate the `data_splits` argument. This would result in [`ngrams_data`](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L106-L110) to be a null pointer when the output would be computed to have 0 or negative size.
Later writes to the output tensor would then cause a null pointer dereference.
### Patches
We have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29541'} | 2021-05-21T17:07:00Z | 2021-05-21T14:23:12Z | LOW | 2.5 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/advisories/GHSA-xqfj-35wv-m3cr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29541'} | null | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} |
GHSA | GHSA-6vx5-cg2p-7g5v | Unrestricted Upload of File with Dangerous Type in microweber | Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12. | {'CVE-2022-0912'} | 2022-03-22T21:37:49Z | 2022-03-12T00:00:35Z | MODERATE | 4.8 | {'CWE-434'} | {'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789', 'https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54', 'https://github.com/advisories/GHSA-6vx5-cg2p-7g5v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912'} | null | {'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'} | {'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'} |
GHSA | GHSA-fjqr-fx3f-g4rv | Electron protocol handler browser vulnerable to Command Injection | Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it. | {'CVE-2018-1000118'} | 2022-04-26T14:35:23Z | 2018-03-26T16:41:20Z | HIGH | 8.8 | {'CWE-78'} | {'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7', 'https://electronjs.org/releases#1.8.2-beta.5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118', 'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv'} | null | {'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7'} | {'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7'} |
GHSA | GHSA-rg32-m3hf-772v | Deserialization of Untrusted Data in Slanger | Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3. | {'CVE-2019-1010306'} | 2021-05-11T15:51:16Z | 2019-07-16T00:41:40Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306', 'https://github.com/advisories/GHSA-rg32-m3hf-772v'} | null | {'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'} | {'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'} |
GHSA | GHSA-fr6q-jv7j-35g3 | Path Traversal in w-zip | Path Traversal in NPM w-zip prior to 1.0.12. | {'CVE-2022-0401'} | 2022-02-10T23:41:29Z | 2022-02-02T00:01:46Z | CRITICAL | 9.8 | {'CWE-22'} | {'https://github.com/advisories/GHSA-fr6q-jv7j-35g3', 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0401', 'https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d'} | null | {'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'} | {'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'} |
GHSA | GHSA-374m-jm66-3vj8 | Heap OOB in `SparseBinCount` | ### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/bincount_op.cc#L353-L417) of `SparseBinCount` is vulnerable to a heap OOB:
```python
import tensorflow as tf
tf.raw_ops.SparseBincount(
indices=[[0],[1],[2]]
values=[0,-10000000]
dense_shape=[1,1]
size=[1]
weights=[3,2,1]
binary_output=False)
```
This is because of missing validation between the elements of the `values` argument and the shape of the sparse output:
```cc
for (int64_t i = 0; i < indices_mat.dimension(0); ++i) {
const int64_t batch = indices_mat(i, 0);
const Tidx bin = values(i);
...
out(batch, bin) = ...;
}
```
### Patches
We have patched the issue in GitHub commit [f410212e373eb2aec4c9e60bf3702eba99a38aba](https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41226'} | 2021-11-10T18:41:47Z | 2021-11-10T18:41:47Z | HIGH | 7.1 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41226', 'https://github.com/advisories/GHSA-374m-jm66-3vj8', 'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'} | null | {'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'} | {'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'} |
GHSA | GHSA-gfp2-w5jm-955q | OMERO.web exposes some unnecessary session information in the page | ### Background
OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. Some additional information being loaded is not used by the webclient and is being removed in this release.
### Impact
OMERO.web before 5.9.0
### Patches
5.9.0
### Workarounds
No workaround
### References
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [omero-web](https://github.com/ome/omero-web)
* Email us at [security](mailto:security@openmicroscopy.org.uk) | {'CVE-2021-21376'} | 2021-03-29T17:30:03Z | 2021-03-23T15:26:34Z | MODERATE | 0 | {'CWE-200'} | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://www.openmicroscopy.org/security/advisories/2021-SV1/', 'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q', 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021', 'https://github.com/advisories/GHSA-gfp2-w5jm-955q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21376'} | null | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'} | {'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'} |
GHSA | GHSA-8h2f-7jc4-7m3m | Open Redirect in urijs | urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613. | {'CVE-2022-0868'} | 2022-03-14T21:10:49Z | 2022-03-07T00:00:40Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/medialize/URI.js/releases/tag/v1.19.10', 'https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02', 'https://github.com/advisories/GHSA-8h2f-7jc4-7m3m', 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868'} | null | {'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509'} | {'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509'} |
GHSA | GHSA-qjhr-c23f-w76q | Inline JS XSS vulnerability in Mautic | ### Impact
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form.
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.12.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | {'CVE-2017-1000488'} | 2022-04-19T19:02:44Z | 2021-01-19T21:16:24Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488'} | null | {'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'} | {'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'} |
GHSA | GHSA-9crf-c6qr-r273 | Integer division by 0 in `tf.raw_ops.AllToAll` | ### Impact
The [shape inference code for `AllToAll`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/tpu_cross_replica_ops.cc#L25-L74) can be made to execute a division by 0:
```python
import tensorflow as tf
@tf.function
def func():
return tf.raw_ops.AllToAll(
input=[0.0, 0.1652, 0.6543],
group_assignment=[1, -1],
concat_dimension=0,
split_dimension=0,
split_count=0)
func()
```
This occurs whenever the `split_count` argument is 0:
```cc
TF_RETURN_IF_ERROR(c->GetAttr("split_count", &split_count));
...
for (int32_t i = 0; i < rank; ++i) {
...
dims[i] = c->MakeDim(c->Value(dims[i]) / split_count);
...
}
```
### Patches
We have patched the issue in GitHub commit [a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc](https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41218'} | 2021-11-10T18:52:24Z | 2021-11-10T18:52:24Z | MODERATE | 5.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41218', 'https://github.com/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'} | null | {'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'} | {'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'} |
GHSA | GHSA-v542-8q9x-cffc | Exposure of Sensitive Information to an Unauthorized Actor | Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing, responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data. Note that this affects only the legacy Channels provided class, and not Django's similar ASGIHandler, available from Django 3.0. | {'CVE-2020-35681'} | 2021-03-19T21:29:02Z | 2021-03-19T21:29:02Z | HIGH | 7.4 | {'CWE-200'} | {'https://github.com/django/channels/releases', 'https://channels.readthedocs.io/en/stable/releases/index.html', 'https://github.com/advisories/GHSA-v542-8q9x-cffc', 'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35681', 'https://channels.readthedocs.io/en/stable/releases/3.0.3.html'} | null | {'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022'} | {'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022'} |
GHSA | GHSA-pf8f-w267-mq2h | The rack-cors rubygem may allow directory traveral | An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. | {'CVE-2019-18978'} | 2021-08-18T22:30:22Z | 2019-11-15T20:26:59Z | MODERATE | 5.3 | {'CWE-22'} | {'https://github.com/advisories/GHSA-pf8f-w267-mq2h', 'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d', 'https://www.debian.org/security/2021/dsa-4918', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00000.html', 'https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4', 'https://usn.ubuntu.com/4571-1/'} | null | {'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'} | {'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'} |
GHSA | GHSA-9px9-73fg-3fqp | Null pointer dereference in Grappler's `IsConstant` | ### Impact
Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place):
First, during [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497), the `GraphDef` might not have the required nodes for the binary operation:
```cc
NodeDef* mul_left_child = node_map_->GetNode(node->input(0));
NodeDef* mul_right_child = node_map_->GetNode(node->input(1));
// One child must be constant, and the second must be Conv op.
const bool left_child_is_constant = IsReallyConstant(*mul_left_child);
const bool right_child_is_constant = IsReallyConstant(*mul_right_child);
```
If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect.
We have a similar issue during [`IsIdentityConsumingSwitch`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74):
```cc
NodeDef* input_node = graph.GetNode(tensor_id.node());
return IsSwitch(*input_node);
```
### Patches
We have patched the issue in GitHub commits [0a365c029e437be0349c31f8d4c9926b69fa3fa1](https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1) and [045deec1cbdebb27d817008ad5df94d96a08b1bf](https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23589'} | 2022-02-11T20:00:55Z | 2022-02-09T23:29:14Z | MODERATE | 6.5 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp', 'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23589', 'https://github.com/advisories/GHSA-9px9-73fg-3fqp', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1'} | null | {'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1'} | {'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1'} |
GHSA | GHSA-4p8f-mmfj-r45g | Cross-site scripting in fat_free_crm | Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb. | {'CVE-2018-20975'} | 2021-08-17T21:11:19Z | 2019-08-21T16:15:04Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65', 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1', 'https://github.com/advisories/GHSA-4p8f-mmfj-r45g', 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975'} | null | {'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'} | {'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'} |
GHSA | GHSA-qw5h-7f53-xrp6 | Stack overflow in `ParseAttrValue` with nested tensors | ### Impact
The implementation of [`ParseAttrValue`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/framework/attr_value_util.cc#L397-L453) can be tricked into stack overflow due to recursion by giving in a specially crafted input.
### Patches
We have patched the issue in GitHub commit [e07e1c3d26492c06f078c7e5bf2d138043e199c1](https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2021-29615'} | 2021-05-21T14:28:45Z | 2021-05-21T14:28:45Z | LOW | 2.5 | {'CWE-674'} | {'https://github.com/advisories/GHSA-qw5h-7f53-xrp6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qw5h-7f53-xrp6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29615', 'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'} | null | {'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'} | {'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'} |
GHSA | GHSA-86ch-6w7v-v6xf | Denial of Service in soketi | ### Impact
_What kind of vulnerability is it? Who is impacted?_
There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simply just crash the server for trying to send a response after the request closed.
All users that run the server are affected by it and it's highly recommended to upgrade to the latest patch.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Updating to at least 0.24.1 or the latest version.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
No. Upgrading is the only solution.
### References
_Are there any links users can visit to find out more?_
https://github.com/soketi/soketi/releases/tag/0.24.1
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the issues board](https://github.com/soketi/soketi/issues)
* Email us at [alex@renoki.org](mailto:alex@renoki.org)
| {'CVE-2022-21667'} | 2022-01-18T22:37:18Z | 2022-01-08T00:24:44Z | HIGH | 7.5 | {'CWE-755'} | {'https://github.com/advisories/GHSA-86ch-6w7v-v6xf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667', 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b', 'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/releases/tag/0.24.1'} | null | {'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'} | {'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'} |
GHSA | GHSA-48w2-rm65-62xx | Inconsistent Interpretation of HTTP Requests in puma | ### Impact
Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as "low". Puma is only aware of a single proxy server which has this behavior.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
### Patches
This vulnerability was patched in Puma 5.5.1 and 4.3.9.
### Workarounds
This vulnerability only affects Puma installations without any proxy in front.
Use a proxy which does not forward LF characters as line endings.
Proxies which do not forward LF characters as line endings:
* Nginx
* Apache (>2.4.25)
* Haproxy
* Caddy
* Traefik
### Possible Breakage
If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error.
### References
* [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy)
| {'CVE-2021-41136'} | 2022-04-19T19:03:12Z | 2021-10-12T17:53:00Z | LOW | 3.7 | {'CWE-444'} | {'https://github.com/puma/puma/releases/tag/v5.5.1', 'https://github.com/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/puma/puma/releases/tag/v4.3.9', 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136', 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'} | null | {'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'} | {'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'} |
GHSA | GHSA-8rc5-hx3v-2jg7 | Sanitizer bypass in svg-sanitizer | It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer. | {'CVE-2019-10772'} | 2021-08-19T19:25:07Z | 2020-02-27T20:36:29Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10772', 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969', 'https://github.com/advisories/GHSA-8rc5-hx3v-2jg7', 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'} | null | {'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'} | {'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'} |
GHSA | GHSA-9qrh-qjmc-5w2p | Denial-of-Service when binding invalid parameters in sqlite3 | Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade to v5.0.3 or later. Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters as a workaround.
| {'CVE-2022-21227'} | 2022-05-03T02:24:26Z | 2022-04-28T20:25:23Z | HIGH | 7.5 | {'CWE-248'} | {'https://github.com/TryGhost/node-sqlite3/issues/1440', 'https://github.com/TryGhost/node-sqlite3/issues/1449', 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227', 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p', 'https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645', 'https://github.com/advisories/GHSA-9qrh-qjmc-5w2p', 'https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645'} | null | {'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'} | {'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'} |
GHSA | GHSA-7fm6-gxqg-2pwr | Code Injection in total.js | The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. | {'CVE-2021-23389'} | 2021-12-10T17:26:06Z | 2021-12-10T17:26:06Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607', 'https://github.com/advisories/GHSA-7fm6-gxqg-2pwr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'} | null | {'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'} | {'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'} |
GHSA | GHSA-j7m2-58wv-9v79 | Vulnerability in Torpedo Query | Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java. | {'CVE-2019-11343'} | 2022-02-10T20:47:29Z | 2022-02-10T20:47:29Z | CRITICAL | 9.8 | null | {'https://github.com/xjodoin/torpedoquery/compare/v2.5.2...v2.5.3', 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343', 'https://github.com/advisories/GHSA-j7m2-58wv-9v79'} | null | {'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'} | {'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'} |
GHSA | GHSA-2hxv-mx8x-mcj9 | Spina vulnerable to a cross-site request forgery (CSRF) vulnerability | Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75. | {'CVE-2015-4619'} | 2022-04-26T18:26:09Z | 2018-08-28T22:34:22Z | HIGH | 8.8 | {'CWE-352'} | {'http://www.securityfocus.com/bid/75216', 'https://github.com/advisories/GHSA-2hxv-mx8x-mcj9', 'http://www.openwall.com/lists/oss-security/2015/06/16/20', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619', 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'} | null | {'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'} | {'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'} |
GHSA | GHSA-c3m8-x3cg-qm2c | Configuration Override in helmet-csp | Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting.
## Recommendation
Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue. | null | 2021-09-29T18:45:07Z | 2020-09-03T20:39:53Z | MODERATE | 6.5 | null | {'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436', 'https://github.com/advisories/GHSA-c3m8-x3cg-qm2c', 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a', 'https://www.npmjs.com/advisories/1176'} | null | {'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a'} | {'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a'} |
GHSA | GHSA-m94c-37g6-cjhc | Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML. | ### Affected packages
The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected:
* [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects)
* [Link](https://ckeditor.com/cke4/addon/link)
* [Flash](https://ckeditor.com/cke4/addon/flash)
* [Iframe](https://ckeditor.com/cke4/addon/iframe)
* [Forms](https://ckeditor.com/cke4/addon/forms)
* [Page Break](https://ckeditor.com/cke4/addon/pagebreak)
### Impact
A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.16.2.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Mika Kulmala ([kulmik](https://github.com/kulmik)) for recognizing and reporting this vulnerability.
| {'CVE-2021-37695'} | 2022-02-08T21:01:40Z | 2021-08-23T19:42:15Z | HIGH | 7.3 | {'CWE-79'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc', 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://github.com/advisories/GHSA-m94c-37g6-cjhc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37695', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'} | null | {'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58'} | {'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58'} |
GHSA | GHSA-7q8g-gpfp-v8gx | Insertion of Sensitive Information into Log File in Apache NiFi | In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially containing sensitive values in plaintext. | {'CVE-2020-1942'} | 2022-01-06T20:40:58Z | 2022-01-06T20:40:58Z | HIGH | 7.5 | {'CWE-200', 'CWE-532'} | {'https://github.com/advisories/GHSA-7q8g-gpfp-v8gx', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942', 'https://nifi.apache.org/security.html#CVE-2020-1942', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97'} | null | {'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b'} | {'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97'} |
GHSA | GHSA-46j2-xjgp-jrfm | Information disclosure issue in Active Resource | There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information. | {'CVE-2020-8151'} | 2021-10-08T19:59:27Z | 2020-05-21T21:09:38Z | HIGH | 7.5 | {'CWE-200', 'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8151', 'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7B7A4H22DZ522HLDS3JX3NX2CXIOZSR/', 'https://github.com/advisories/GHSA-46j2-xjgp-jrfm'} | null | {'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e'} | {'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e'} |
GHSA | GHSA-7f63-h6g3-7cwm | Cross Site Scripting (XSS) in @finastra/ssr-pages | A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/2
- https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5
- https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073
| {'CVE-2022-24717'} | 2022-04-19T19:03:25Z | 2022-03-01T22:09:25Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/pull/2', 'https://github.com/advisories/GHSA-7f63-h6g3-7cwm', 'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5'} | null | {'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5'} | {'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073'} |
GHSA | GHSA-gf2j-f278-xh4v | Division by zero in TFLite | ### Impact
An attacker can craft a TFLite model that would trigger a division by zero in [`BiasAndClamp` implementation](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75):
```cc
inline void BiasAndClamp(float clamp_min, float clamp_max, int bias_size,
const float* bias_data, int array_size,
float* array_data) {
// ...
TFLITE_DCHECK_EQ((array_size % bias_size), 0);
// ...
}
```
There is no check that the `bias_size` is non zero.
### Patches
We have patched the issue in GitHub commit [8c6f391a2282684a25cbfec7687bd5d35261a209](https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team. | {'CVE-2022-23557'} | 2022-02-11T16:11:40Z | 2022-02-09T23:47:57Z | MODERATE | 6.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23557', 'https://github.com/advisories/GHSA-gf2j-f278-xh4v', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v'} | null | {'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209'} | {'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209'} |
GHSA | GHSA-m4fw-77v7-924m | Moderate severity vulnerability that affects qutebrowser | qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted <title> attribute, and then open the qute://history site via the :history command. This vulnerability appears to have been fixed in fixed in v1.3.3 (4c9360237f186681b1e3f2a0f30c45161cf405c7, to be released today) and v1.4.0 (5a7869f2feaa346853d2a85413d6527c87ef0d9f, released later this week). | {'CVE-2018-1000559'} | 2021-09-14T22:12:29Z | 2018-09-13T15:47:57Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-m4fw-77v7-924m', 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f', 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000559', 'https://github.com/qutebrowser/qutebrowser/issues/4011'} | null | {'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7', 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f'} | {'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f', 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7'} |
GHSA | GHSA-w8rc-pgxq-x2cj | Negative charge in shopping cart in Shopizer | ### Impact
Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total.
### Patches
Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0
### Workarounds
Without uprading, it's possible to just apply the fixes in the same files it's done for the patch. Or you use javax constraint validation on the quantity parameter.
### References
[Input Validation](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)
[Using bean validation constraint](https://javaee.github.io/tutorial/bean-validation002.html)
[Commits with fixes](https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a)
CVE Details below :
[Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11007)
[NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-11007)
### Credits
Found and solved by Yannick Gosset from Aix-Marseille University cybersecurity
master program supervised by Yassine Ilmi | {'CVE-2020-11007'} | 2022-04-19T19:02:25Z | 2020-04-22T20:59:26Z | CRITICAL | 6.5 | {'CWE-20'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a', 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj', 'https://github.com/advisories/GHSA-w8rc-pgxq-x2cj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007'} | null | {'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'} |
GHSA | GHSA-f256-j965-7f32 | Possible request smuggling in HTTP/2 due missing validation of content-length | ### Impact
The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1
This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case.
### Patches
This was fixed as part of 4.1.61.Final
### Workarounds
Validation can be done by the user before proxy the request by validating the header. | {'CVE-2021-21409'} | 2022-04-22T15:50:24Z | 2021-03-30T15:10:38Z | MODERATE | 5.9 | {'CWE-444'} | {'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r101f82d8f3b5af0bf79aecbd5b2dd3b404f6bb51d1a54c2c3d29bed9@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re4b0141939370304d676fe23774d0c6fbc584b648919825402d0cb39@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-f256-j965-7f32', 'https://lists.apache.org/thread.html/r2732aa3884cacfecac4c54cfaa77c279ba815cad44b464a567216f83@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5f2f120b2b8d099226473db1832ffb4d7c1d6dc2d228a164bf293a8e@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5715f3ee5e3216d5e0083a07994f67da6dbb9731ce9e7a6389b18e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b3cb056364794f919aaf26ceaf7423de64e7fdd05a914066e7d5219@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf38e4dcdefc7c59f7ba0799a399d6d6e37b555d406a1dfc2fcbf0b35@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rcae42fba06979934208bbd515584b241d3ad01d1bb8b063512644362@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9ec78dc409f3f1edff88f21cab53737f36aad46f582a9825389092e0@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r7879ddcb990c835c6b246654770d836f9d031dee982be836744e50ed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r0ca82fec33334e571fe5b388272260778883e307e15415d7b1443de2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5cbea8614812289a9b98d0cfc54b47f54cef424ac98d5e315b791795@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/re9e6ed60941da831675de2f8f733c026757fb4fa28a7b6c9f3dfb575@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re1911e05c08f3ec2bab85744d788773519a0afb27272a31ac2a0b4e8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/re39391adcb863f0e9f3f15e7986255948f263f02e4700b82453e7102@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6dac9bd799ceac499c7a7e152a9b0dc7f2fe7f89ec5605d129bb047b@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21409', 'https://lists.apache.org/thread.html/r823d4b27fcba8dad5fe945bdefce3ca5a0031187966eb6ef3cc22ba9@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rafc77f9f03031297394f3d372ccea751b23576f8a2ae9b6b053894c5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r4b8be87acf5b9c098a2ee350b5ca5716fe7afeaf0a21a4ee45a90687@%3Cissues.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r70c3a7bfa904f06a1902f4df20ee26e4f09a46b8fd3eb304dc57a2de@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf148b2bf6c2754153a8629bc7495e216bd0bd4c915695486542a10b4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r31044fb995e894749cb821c6fe56f487c16a97028e6e360e59f09d58@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rba2a9ef1d0af882ab58fadb336a58818495245dda43d32a7d7837187@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf521ff2be2e2dd38984174d3451e6ee935c845948845c8fccd86371d@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32', 'https://lists.apache.org/thread.html/r4a98827bb4a7edbd69ef862f2351391845697c40711820d10df52ca5@%3Ccommits.zookeeper.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r61564d86a75403b854cdafee67fc69c8b88c5f6802c2c838f4282cc8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r967002f0939e69bdec58f070735a19dd57c1f2b8f817949ca17cddae@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra66e93703e3f4bd31bdfd0b6fb0c32ae96b528259bb1aa2b6d38e401@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7b54563abebe3dbbe421e1ba075c2030d8d460372f8c79b7789684b6@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0003/', 'https://lists.apache.org/thread.html/rac8cf45a1bab9ead5c9a860cbadd6faaeb7792203617b6ec3874736d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9fe840c36b74f92b8d4a089ada1f9fd1d6293742efa18b10e06b66d2@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/raa413040db6d2197593cc03edecfd168732e697119e6447b0a25d525@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rdd206d9dd7eb894cc089b37fe6edde2932de88d63a6d8368b44f5101@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432', 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null | {'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'} | {'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'} |
GHSA | GHSA-w4fj-ccr6-7pcp | Insertion of Sensitive Information into Log File in Apache NiFi | An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present. | {'CVE-2020-1928'} | 2022-01-06T20:40:56Z | 2022-01-06T20:40:56Z | MODERATE | 5.3 | {'CWE-200', 'CWE-532'} | {'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928', 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567', 'https://nifi.apache.org/security.html#CVE-2020-1928', 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-w4fj-ccr6-7pcp'} | null | {'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'} | {'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'} |
GHSA | GHSA-wjx2-7hqq-8h7m | rails_admin ruby gem XSS vulnerability | RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms. | {'CVE-2020-36190'} | 2021-01-19T18:16:40Z | 2021-01-14T19:17:16Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190', 'https://github.com/sferik/rails_admin/blob/master/README.md', 'https://github.com/advisories/GHSA-wjx2-7hqq-8h7m', 'https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3'} | null | {'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'} | {'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'} |
GHSA | GHSA-44r7-7p62-q3fr | Insecure generation of random numbers | The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. | {'CVE-2019-19794'} | 2021-05-18T21:09:13Z | 2021-05-18T21:09:13Z | MODERATE | 5.9 | {'CWE-338', 'CWE-330'} | {'https://github.com/miekg/dns/compare/v1.1.24...v1.1.25', 'https://github.com/advisories/GHSA-44r7-7p62-q3fr', 'https://github.com/miekg/dns/issues/1043', 'https://github.com/miekg/dns/pull/1044', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19794', 'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33', 'https://github.com/coredns/coredns/issues/3547', 'https://github.com/coredns/coredns/issues/3519'} | null | {'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'} | {'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'} |
GHSA | GHSA-57j2-w4cx-62h2 | Deeply nested json in jackson-databind | jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects. | {'CVE-2020-36518'} | 2022-03-28T19:57:53Z | 2022-03-12T00:00:36Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518', 'https://github.com/advisories/GHSA-57j2-w4cx-62h2', 'https://github.com/FasterXML/jackson-databind/issues/2816', 'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'} | null | {'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'} | {'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'} |
GHSA | GHSA-jc8m-cxhj-668x | Improper Restriction of Excessive Authentication Attempts in Sorcery | ### Impact
Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout.
### Patches
Patched as of version `0.15.0`.
### Workarounds
Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`. | {'CVE-2020-11052'} | 2022-04-19T19:02:25Z | 2020-05-07T21:16:46Z | HIGH | 8.3 | {'CWE-307'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11052', 'https://github.com/Sorcery/sorcery/issues/231', 'https://github.com/Sorcery/sorcery/pull/235', 'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7', 'https://github.com/advisories/GHSA-jc8m-cxhj-668x', 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x'} | null | {'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7'} | {'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7'} |
GHSA | GHSA-m648-33qf-v3gp | CHECK-fail in LSTM with zero-length input in TensorFlow | ### Impact
Running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a `CHECK` failure when using the CUDA backend.
This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer.
### Patches
We have patched the issue in GitHub commit [14755416e364f17fb1870882fa778c7fec7f16e3](https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2020-26270'} | 2021-01-07T22:35:25Z | 2020-12-10T19:07:31Z | LOW | 4.4 | {'CWE-20'} | {'https://github.com/advisories/GHSA-m648-33qf-v3gp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26270', 'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3'} | null | {'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3'} | {'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3'} |
GHSA | GHSA-gh6x-4whr-2qv4 | Null pointer dereference and heap OOB read in operations restoring tensors | ### Impact
When restoring tensors via raw APIs, if the tensor name is not provided, TensorFlow can be tricked into dereferencing a null pointer:
```python
import tensorflow as tf
tf.raw_ops.Restore(
file_pattern=['/tmp'],
tensor_name=[],
default_value=21,
dt=tf.int,
preferred_shard=1)
```
The same undefined behavior can be triggered by `tf.raw_ops.RestoreSlice`:
```python
import tensorflow as tf
tf.raw_ops.RestoreSlice(
file_pattern=['/tmp'],
tensor_name=[],
shape_and_slice='2',
dt=inp.array([tf.int]),
preferred_shard=1)
```
Alternatively, attackers can read memory outside the bounds of heap allocated data by providing some tensor names but not enough for a successful restoration:
```python
import tensorflow as tf
tf.raw_ops.Restore(
file_pattern=['/tmp'],
tensor_name=['x'],
default_value=21,
dt=tf.int,
preferred_shard=42)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/save_restore_tensor.cc#L158-L159) retrieves the tensor list corresponding to the `tensor_name` user controlled input and immediately retrieves the tensor at the restoration index (controlled via `preferred_shard` argument). This occurs without validating that the provided list has enough values.
If the list is empty this results in dereferencing a null pointer (undefined behavior). If, however, the list has some elements, if the restoration index is outside the bounds this results in heap OOB read.
### Patches
We have patched the issue in GitHub commit [9e82dce6e6bd1f36a57e08fa85af213e2b2f2622](https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37639'} | 2022-04-26T18:06:27Z | 2021-08-25T14:44:05Z | HIGH | 8.4 | {'CWE-476', 'CWE-125'} | {'https://github.com/advisories/GHSA-gh6x-4whr-2qv4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37639', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4', 'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622'} | null | {'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622'} | {'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622'} |
GHSA | GHSA-vhfp-9wvj-gwvg | XML External Entity vulnerability in MODX CMS | A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS). | {'CVE-2020-25911'} | 2021-11-03T14:52:00Z | 2021-11-01T19:19:43Z | CRITICAL | 9.1 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25911', 'https://github.com/advisories/GHSA-vhfp-9wvj-gwvg', 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md', 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a', 'https://github.com/modxcms/revolution/issues/15237', 'https://github.com/modxcms/revolution/pull/15238'} | null | {'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'} | {'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'} |
GHSA | GHSA-r2j6-p67h-q639 | Secret disclosure when containing characters that become URI encoded | ### Impact
Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL.
### Patches
Fixed in v17.2.3
### Workarounds
Secrets that do not contain characters that become encoded when included in a URL are already masked properly. | {'CVE-2020-26226'} | 2022-04-19T19:02:39Z | 2020-11-18T21:19:14Z | HIGH | 8.1 | {'CWE-116'} | {'https://github.com/advisories/GHSA-r2j6-p67h-q639', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226', 'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a', 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639'} | null | {'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a'} | {'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a'} |
GHSA | GHSA-4vf2-4xcg-65cx | Division by 0 in `Conv2D` | ### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.Conv2D`:
```python
import tensorflow as tf
input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
strides = [1, 1, 1, 1]
padding = "SAME"
tf.raw_ops.Conv2D(input=input, filter=filter, strides=strides, padding=padding)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/988087bd83f144af14087fe4fecee2d250d93737/tensorflow/core/kernels/conv_ops.cc#L261-L263) does a division by a quantity that is controlled by the caller:
```cc
const int64 patch_depth = filter.dim_size(2);
if (in_depth % patch_depth != 0) { ... }
```
### Patches
We have patched the issue in GitHub commit [b12aa1d44352de21d1a6faaf04172d8c2508b42b](https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29526'} | 2021-05-21T14:21:55Z | 2021-05-21T14:21:55Z | LOW | 2.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29526', 'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vf2-4xcg-65cx', 'https://github.com/advisories/GHSA-4vf2-4xcg-65cx'} | null | {'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b'} | {'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b'} |
GHSA | GHSA-cxg7-84wp-8pcq | yetiforcecrm is vulnerable to Business Logic Errors | yetiforcecrm is vulnerable to Business Logic Errors. | {'CVE-2021-4117'} | 2022-01-03T15:47:43Z | 2021-12-16T21:01:07Z | HIGH | 7.7 | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239', 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117', 'https://github.com/advisories/GHSA-cxg7-84wp-8pcq'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'} |
GHSA | GHSA-5rg2-6qr5-2xp8 | Cross-site Scripting in snipe-it | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3863'} | 2021-10-25T20:08:18Z | 2021-10-21T17:49:18Z | MODERATE | 5.5 | {'CWE-79'} | {'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863', 'https://github.com/advisories/GHSA-5rg2-6qr5-2xp8', 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'} | null | {'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'} | {'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'} |
GHSA | GHSA-8jpx-m2wh-2v34 | Remote Code Execution (RCE) vulnerability in dropwizard-validation | ### Summary
A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.
If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended.
The changes introduced in Dropwizard 1.3.19 and 2.0.2 (see [GHSA-3mcp-9wr4-cjqf](https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf)/[CVE-2020-5245](https://github.com/advisories/GHSA-3mcp-9wr4-cjqf)) unfortunately didn't fix the underlying issue completely.
### Impact
This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**.
### Patches
The issue has been fixed in **dropwizard-validation** **1.3.21** and **2.0.3** or later. We strongly recommend upgrading to one of these versions.
The evaluation of EL expressions has been disabled by default now.
In order to use some interpolation in the violation messages added to [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html), it has to be explicitly allowed by setting [`SelfValidating#escapeExpressions()`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html#escapeExpressions--) to `false`.
It is also recommended to use the `addViolation` methods supporting message parameters instead of EL expressions introduced in Dropwizard 1.3.21 and 2.0.3:
* [`ViolationCollector#addViolation(String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.util.Map-)
* [`ViolationCollector#addViolation(String, String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.util.Map-)
* [`ViolationCollector#addViolation(String, String, Integer, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.Integer-java.lang.String-java.util.Map-)
* [`ViolationCollector#addViolation(String, String, String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.lang.String-java.util.Map-)
### Workarounds
If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html).
Example:
```java
@SelfValidation
public void validateFullName(ViolationCollector col) {
if (fullName.contains("_")) {
// Sanitize fullName variable by escaping relevant characters such as "$"
col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName));
}
}
```
See also:
https://github.com/dropwizard/dropwizard/blob/v2.0.3/dropwizard-validation/src/main/java/io/dropwizard/validation/InterpolationHelper.java
### References
* https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf
* https://github.com/dropwizard/dropwizard/pull/3208
* https://github.com/dropwizard/dropwizard/pull/3209
* https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new)
* Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev)
### Security contact
If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy):
https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability | {'CVE-2020-11002'} | 2022-04-19T19:02:55Z | 2020-04-10T18:42:20Z | HIGH | 8 | {'CWE-74'} | {'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext', 'https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability', 'https://github.com/dropwizard/dropwizard/pull/3209', 'https://github.com/dropwizard/dropwizard/pull/3208', 'https://github.com/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11002'} | null | {'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'} | {'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'} |
GHSA | GHSA-6973-94v8-5mgw | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0991'} | 2021-03-29T20:57:42Z | 2021-03-29T20:57:42Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991', 'https://github.com/advisories/GHSA-6973-94v8-5mgw', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0991'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'} |
GHSA | GHSA-q7q9-w24q-cpgh | Cross-site Scripting (XSS) in Apache Ambari Views | A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4. | {'CVE-2020-1936'} | 2022-01-06T20:35:22Z | 2022-01-06T20:35:22Z | MODERATE | 6.1 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2021/03/02/1', 'https://github.com/advisories/GHSA-q7q9-w24q-cpgh', 'https://issues.apache.org/jira/browse/AMBARI-25329', 'https://github.com/apache/ambari/pull/3040', 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1936', 'https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E'} | null | {'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'} | {'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'} |
GHSA | GHSA-4rq4-32rv-6wp6 | Improper Privilege Management in shelljs | shelljs is vulnerable to Improper Privilege Management | {'CVE-2022-0144'} | 2022-01-21T23:37:28Z | 2022-01-21T23:37:28Z | HIGH | 7.1 | {'CWE-269'} | {'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c', 'https://github.com/advisories/GHSA-4rq4-32rv-6wp6'} | null | {'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'} | {'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'} |
GHSA | GHSA-wf43-55jj-vwq8 | DNS Rebinding in etcd | DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address). | {'CVE-2018-1099'} | 2022-04-12T22:12:47Z | 2022-02-15T01:57:18Z | MODERATE | 5.5 | {'CWE-350', 'CWE-20'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552717', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1099', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56', 'https://github.com/coreos/etcd/issues/9353', 'https://github.com/advisories/GHSA-wf43-55jj-vwq8'} | null | {'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'} | {'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'} |
GHSA | GHSA-3p3g-vpw6-4w66 | Authentication Bypass in hydra | ### Impact
"When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:"
> A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties
"Hydra does not seem to check the uniqueness of this `jti` value. Here is me sending the same token request twice, hence with the same `jti` assertion, and getting two access tokens:"
```
$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \
--data-urlencode 'scope=application openid' \
--data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \
--data-urlencode 'client_assertion=eyJhb [...] jTw'
{"access_token":"zeG0NoqOtlACl8q5J6A-TIsNegQRRUzqLZaYrQtoBZQ.VR6iUcJQYp3u_j7pwvL7YtPqGhtyQe5OhnBE2KCp5pM","expires_in":3599,"scope":"application openid","token_type":"bearer"}⏎ ~$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \
--data-urlencode 'scope=application openid' \
--data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \
--data-urlencode 'client_assertion=eyJhb [...] jTw'
{"access_token":"wOYtgCLxLXlELORrwZlmeiqqMQ4kRzV-STU2_Sollas.mwlQGCZWXN7G2IoegUe1P0Vw5iGoKrkOzOaplhMSjm4","expires_in":3599,"scope":"application openid","token_type":"bearer"}
```
### Severity
"We rate the severity as medium because the following reasons make it hard to replay tokens without the patch:"
- TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks
- The expiry time of the JWT gives only a short window of opportunity where it could be replayed
### Patches
This will be patched with v1.4.0+oryOS.17
### Workarounds
Two workarounds have been identified:
- Do not allow clients to use `private_key_jwt`
- Use short expiry times for the JWTs
### Upstream
This issue will be resolved in the upstream repository https://github.com/ory/fosite | {'CVE-2020-5300'} | 2021-05-27T18:43:22Z | 2021-05-27T18:43:22Z | MODERATE | 5.8 | {'CWE-294'} | {'https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication', 'https://github.com/ory/hydra/releases/tag/v1.4.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5300', 'https://github.com/advisories/GHSA-3p3g-vpw6-4w66', 'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3', 'https://github.com/ory/hydra/security/advisories/GHSA-3p3g-vpw6-4w66'} | null | {'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'} | {'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'} |
GHSA | GHSA-gcv9-6737-pjqw | SSRF vulnerability in jupyter-server-proxy | ### Impact
**What kind of vulnerability is it?** Server-Side Request Forgery ( SSRF )
**Who is impacted?** Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled.
A lack of input validation allowed authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Upgrade to 3.2.1, or apply the patch https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch
### For more information
If you have any questions or comments about this advisory:
* Open a topic [on our forum](https://discourse.jupyter.org)
* Email the Jupyter security team at [security@ipython.org](mailto:security@ipython.org)
| {'CVE-2022-21697'} | 2022-04-19T19:03:20Z | 2022-01-27T16:24:26Z | MODERATE | 6.3 | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21697', 'https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch', 'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'} | null | {'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'} | {'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'} |
GHSA | GHSA-9vh6-qfv6-vcqp | snipe-IT vulnerable to host header injection | Snipe-IT is a free, open-source IT asset/license management systemIn Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This can lead to account take over. | {'CVE-2022-23064'} | 2022-05-03T06:29:50Z | 2022-05-03T00:00:43Z | HIGH | 8.8 | {'CWE-74'} | {'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc', 'https://github.com/advisories/GHSA-9vh6-qfv6-vcqp', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23064', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064'} | null | {'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'} | {'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'} |
GHSA | GHSA-gh8j-2pgf-x458 | Infinite Loop in rencode | The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory. | {'CVE-2021-40839'} | 2022-02-16T22:03:02Z | 2021-09-13T20:05:51Z | HIGH | 7.5 | {'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-40839', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/', 'https://github.com/advisories/GHSA-gh8j-2pgf-x458', 'https://seclists.org/fulldisclosure/2021/Sep/16', 'https://pypi.org/project/rencode/#history', 'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75', 'https://github.com/aresch/rencode/pull/29', 'https://security.netapp.com/advisory/ntap-20211008-0001/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMVQRPDVSVZNGGX57CFKCYT3DEYO4QB6/'} | null | {'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75'} | {'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75'} |
GHSA | GHSA-c3xm-pvg7-gh7r | mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs | ### Summary
runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby
an attacker can request a seemingly-innocuous container configuration that
actually results in the host filesystem being bind-mounted into the container
(allowing for a container escape). CVE-2021-30465 has been assigned for this
issue.
An attacker must have the ability to start containers using some kind of custom
volume configuration, and while recommended container hardening mechanisms such
as LSMs (AppArmor/SELinux) and user namespaces will restrict the amount of
damage an attacker could do, they do not block this attack outright. We have a
reproducer using Kubernetes (and the below description mentions
Kubernetes-specific paths), but this is not a Kubernetes-specific issue.
The now-released [runc v1.0.0-rc95][release] contains a fix for this issue, we
recommend users update as soon as possible.
[release]: https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95
### Details
In circumstances where a container is being started, and runc is mounting
inside a volume shared with another container (which is conducting a
symlink-exchange attack), runc can be tricked into mounting outside of the
container rootfs by swapping the target of a mount with a symlink due to a
time-of-check-to-time-of-use (TOCTTOU) flaw. This is fairly similar in style to
previous TOCTTOU attacks (and is a problem we are working on solving with
libpathrs).
However, this alone is not useful because this happens inside a mount namespace
with `MS_SLAVE` propagation applied to `/` (meaning that the mount doesn't
appear on the host -- it's only a "host-side mount" inside the container's
namespace). To exploit this, you must have additional mount entries in the
configuration that use some subpath of the mounted-over host path as a source
for a subsequent mount.
However, it turns out with some container orchestrators (such as Kubernetes --
though it is very likely that other downstream users of runc could have similar
behaviour be accessible to untrusted users), the existence of additional volume
management infrastructure allows this attack to be applied to gain access to
the host filesystem without requiring the attacker to have completely arbitrary
control over container configuration.
In the case of Kubernetes, this is exploitable by creating a symlink in a
volume to the top-level (well-known) directory where volumes are sourced from
(for instance,
`/var/lib/kubelet/pods/$MY_POD_UID/volumes/kubernetes.io~empty-dir`), and then
using that symlink as the target of a mount. The source of the mount is an
attacker controlled directory, and thus the source directory from which
subsequent mounts will occur is an attacker-controlled directory. Thus the
attacker can first place a symlink to `/` in their malicious source directory
with the name of a volume, and a subsequent mount in the container will
bind-mount `/` into the container.
Applying this attack requires the attacker to start containers with a slightly
peculiar volume configuration (though not explicitly malicious-looking such as
bind-mounting `/` into the container explicitly), and be able to run malicious
code in a container that shares volumes with said volume configuration. It
helps the attacker if the host paths used for volume management are well known,
though this is not a hard requirement.
### Patches
This has been patched in runc 1.0.0-rc95, and users should upgrade as soon as
possible. The patch itself can be found [here](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f).
### Workarounds
There are no known workarounds for this issue.
However, users who enforce running containers with more confined security
profiles (such as reduced capabilities, not running code as root in the
container, user namespaces, AppArmor/SELinux, and seccomp) will restrict what
an attacker can do in the case of a container breakout -- we recommend users
make use of strict security profiles if possible (most notably user namespaces
-- which can massively restrict the impact a container breakout can have on the
host system).
### References
* [commit](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f)
* [seclists public disclosure](https://www.openwall.com/lists/oss-security/2021/05/19/2)
### Credit
Thanks to Etienne Champetier for discovering and disclosing this vulnerability,
to Noah Meyerhans for writing the first draft of this patch, and to Samuel Karp
for testing it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencontainers/runc/issues).
* Email us at <security@opencontainers.org>. | {'CVE-2021-30465'} | 2022-04-19T19:02:53Z | 2021-05-25T18:44:42Z | HIGH | 7.6 | {'CWE-367', 'CWE-22'} | {'https://github.com/advisories/GHSA-c3xm-pvg7-gh7r', 'https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/', 'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f', 'https://security.netapp.com/advisory/ntap-20210708-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH/', 'https://github.com/opencontainers/runc/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30465', 'https://bugzilla.opensuse.org/show_bug.cgi?id=1185405', 'http://www.openwall.com/lists/oss-security/2021/05/19/2'} | null | {'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f'} | {'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f'} |
GHSA | GHSA-78cj-fxph-m83p | Regular Expression Denial of Service (ReDoS) in ua-parser-js | ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time. | {'CVE-2021-27292'} | 2021-05-06T16:11:13Z | 2021-05-06T16:11:13Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27292', 'https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76', 'https://github.com/advisories/GHSA-78cj-fxph-m83p', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566'} | null | {'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566'} | {'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566', 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14'} |
GHSA | GHSA-hxxp-6546-wv6r | Improper Restriction of XML External Entity Reference | Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | {'CVE-2021-21672'} | 2022-04-19T18:25:32Z | 2021-07-02T18:36:13Z | MODERATE | 4.3 | {'CWE-611'} | {'https://github.com/advisories/GHSA-hxxp-6546-wv6r', 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329', 'http://www.openwall.com/lists/oss-security/2021/06/30/1', 'http://www.openwall.com/lists/oss-security/2022/04/14/2', 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21672'} | null | {'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'} | {'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'} |
GHSA | GHSA-p3w3-4ppm-c3f6 | Cross site scripting in FacturaScripts | FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format. | {'CVE-2022-1514'} | 2022-04-29T21:02:50Z | 2022-04-29T00:00:23Z | CRITICAL | 9 | {'CWE-79'} | {'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e', 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514', 'https://github.com/advisories/GHSA-p3w3-4ppm-c3f6'} | null | {'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'} | {'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'} |
GHSA | GHSA-h56g-v4vp-q9q6 | Cross-site Scripting in calibreweb | calibreweb prior to version 0.6.16 contains a cross-site scripting vulnerability. | {'CVE-2022-0352'} | 2022-02-10T22:40:43Z | 2022-01-29T00:00:41Z | MODERATE | 6.1 | {'CWE-79'} | {'https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0352', 'https://github.com/advisories/GHSA-h56g-v4vp-q9q6', 'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'} | null | {'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'} | {'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'} |
GHSA | GHSA-qrpm-p2h7-hrv2 | Exposure of Sensitive Information to an Unauthorized Actor in nanoid | The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated. | {'CVE-2021-23566'} | 2022-03-18T13:15:56Z | 2022-01-21T23:57:06Z | MODERATE | 5.5 | {'CWE-200'} | {'https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566', 'https://github.com/advisories/GHSA-qrpm-p2h7-hrv2', 'https://github.com/ai/nanoid/pull/328', 'https://snyk.io/vuln/SNYK-JS-NANOID-2332193', 'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'} | null | {'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'} | {'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'} |
GHSA | GHSA-44c6-4v22-4mhx | Regular Expression Denial of Service (ReDOS) | npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3795'} | 2021-09-20T20:42:25Z | 2021-09-20T20:42:25Z | MODERATE | 7.5 | {'CWE-400'} | {'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7', 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28', 'https://github.com/advisories/GHSA-44c6-4v22-4mhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795'} | null | {'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'} | {'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'} |
GHSA | GHSA-2v7p-f4qm-r5pc | SQL Injection found in Pimcore | Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6. | {'CVE-2022-1429'} | 2022-05-03T21:01:42Z | 2022-04-23T00:03:03Z | HIGH | 7.5 | {'CWE-89'} | {'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e', 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429', 'https://github.com/advisories/GHSA-2v7p-f4qm-r5pc'} | null | {'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'} | {'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'} |
GHSA | GHSA-4c7m-vv47-7c69 | Insecure Permissions in Gogs | In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a "not the owner of the email" check. | {'CVE-2020-14958'} | 2021-05-18T20:33:05Z | 2021-05-18T20:33:05Z | MODERATE | 5.3 | {'CWE-281'} | {'https://github.com/advisories/GHSA-4c7m-vv47-7c69', 'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c', 'https://github.com/gogs/gogs/pull/5988', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14958'} | null | {'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c'} | {'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c'} |
GHSA | GHSA-gp4j-w3vj-7299 | Information Exposure in RunC | RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container. | {'CVE-2016-9962'} | 2021-12-20T18:21:43Z | 2021-12-20T18:21:43Z | MODERATE | 6.4 | {'CWE-200'} | {'http://seclists.org/fulldisclosure/2017/Jan/29', 'http://seclists.org/fulldisclosure/2017/Jan/21', 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962', 'https://security.gentoo.org/glsa/201701-34', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR/', 'http://www.securityfocus.com/bid/95361', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP/', 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378', 'http://rhn.redhat.com/errata/RHSA-2017-0127.html', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962', 'https://github.com/docker/docker/releases/tag/v1.12.6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9962', 'http://rhn.redhat.com/errata/RHSA-2017-0116.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK/', 'http://www.securityfocus.com/archive/1/540001/100/0/threaded', 'https://github.com/advisories/GHSA-gp4j-w3vj-7299', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ/', 'https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6', 'http://rhn.redhat.com/errata/RHSA-2017-0123.html'} | null | {'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378'} | {'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5'} |
GHSA | GHSA-jc87-6vpp-7ff3 | Heap buffer overflow in Tensorflow | ### Impact
The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L193-L195
Thus, a shape mismatch can result in accesses outside the bounds of heap allocated buffers.
### Patches
We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
We recommend users to upgrade to TensorFlow 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4) | {'CVE-2020-15198'} | 2021-08-26T15:11:47Z | 2020-09-25T18:28:22Z | MODERATE | 5.4 | {'CWE-119', 'CWE-122'} | {'https://github.com/advisories/GHSA-jc87-6vpp-7ff3', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15198', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
GHSA | GHSA-vjv6-gq77-3mjw | XXE attack in Mapfish Print | ### Impact
A user can do to an XML External Entity (XXE) attack with the provided SDL style.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://cwe.mitre.org/data/definitions/611.html
* https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e
### For more information
If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397 | {'CVE-2020-15232'} | 2021-01-07T23:47:51Z | 2020-07-07T16:32:45Z | LOW | 9.3 | {'CWE-611'} | {'https://github.com/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232', 'https://github.com/mapfish/mapfish-print/pull/1397'} | null | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'} | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'} |
GHSA | GHSA-x2p8-rgfm-qw3v | Access Control vulnerability within CoreNLP | An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159). | {'CVE-2021-44550'} | 2022-03-03T22:07:42Z | 2022-02-25T00:01:07Z | CRITICAL | 9.8 | {'CWE-863'} | {'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87', 'https://github.com/stanfordnlp/CoreNLP/issues/1222', 'https://github.com/advisories/GHSA-x2p8-rgfm-qw3v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550'} | null | {'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'} | {'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'} |
GHSA | GHSA-f3pp-32qc-36w4 | Prototype Pollution in jointjs | This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function. | {'CVE-2021-23444'} | 2021-10-04T14:21:41Z | 2021-09-22T20:36:34Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://github.com/clientIO/joint/pull/1514', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578', 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8', 'https://github.com/advisories/GHSA-f3pp-32qc-36w4', 'https://github.com/clientIO/joint/releases/tag/v3.4.2'} | null | {'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8'} | {'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8'} |
GHSA | GHSA-cq76-mxrc-vchh | Crash in `tf.math.segment_*` operations | ### Impact
The implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large.
```python
import tensorflow as tf
tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_min(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_mean(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_sum(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_prod(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
```
This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the [implementation](https://github.com/tensorflow/tensorflow/blob/dae66e518c88de9c11718cd0f8f40a0b666a90a0/tensorflow/core/kernels/segment_reduction_ops_impl.h) (both on CPU and GPU) computes the output shape using [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408). However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440).
### Patches
We have patched the issue in GitHub commit [e9c81c1e1a9cd8dd31f4e83676cab61b60658429](https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429) (merging [#51733](https://github.com/tensorflow/tensorflow/pull/51733)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46888). | {'CVE-2021-41195'} | 2021-11-10T19:36:50Z | 2021-11-10T19:36:50Z | MODERATE | 5.5 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/issues/46888', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429', 'https://github.com/tensorflow/tensorflow/pull/51733', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41195'} | null | {'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'} | {'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'} |
GHSA | GHSA-j9cf-pr2x-5273 | Prototype Pollution in dot-object | dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | {'CVE-2019-10793'} | 2022-04-19T19:03:24Z | 2022-02-09T22:33:31Z | MODERATE | 6.3 | {'CWE-74'} | {'https://github.com/advisories/GHSA-j9cf-pr2x-5273', 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10793', 'https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905'} | null | {'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'} | {'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'} |
GHSA | GHSA-hf79-8hjp-rrvq | Use After Free in lucet | ### Impact
There is a bug in the main branch of Lucet's `lucet-runtime` that allows a use-after-free in an `Instance` object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the `Instance` objects, it is possible to trigger a use-after-free when the `Instance` is dropped.
### Patches
Users should upgrade to the `main` branch of the Lucet repository. Lucet does not provide versioned releases on crates.io.
### Workarounds
There is no way to remediate this vulnerability without upgrading.
### Description
Lucet uses a "pool" allocator for new WebAssembly instances that are created. This pool allocator manages everything from the linear memory of the wasm instance, the runtime stack for async switching, as well as the memory behind the Instance itself. `Instances` are referred to via an `InstanceHandle` type which will, on drop, release the memory backing the Instance back to the pool.
When an Instance is dropped, the fields of the `Instance` are destructed top-to-bottom, however when the `alloc: Alloc` field is destructed, the memory backing the `Instance` is released back to the pool before the destructors of the remaining fields are run. If another thread allocates the same memory from the pool while these destructors are still running, a race condition occurs that can lead to use-after-free errors.
The bug was corrected by changing how the `InstanceHandle` destructor operates to ensure that the memory backing an Instance is only returned to the pool once the `Instance` has been completely destroyed.
This security advisory has been assigned CVE-2021-43790.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [lucet repository](https://github.com/bytecodealliance/lucet)
* Email [the lucet team](mailto:lucet@fastly.com)
* See the [Bytecode Alliance security policy](https://bytecodealliance.org/security)
| {'CVE-2021-43790'} | 2022-04-19T19:03:16Z | 2021-11-30T22:20:36Z | HIGH | 8.5 | {'CWE-416'} | {'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8', 'https://crates.io/crates/lucet-runtime', 'https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq', 'https://github.com/advisories/GHSA-hf79-8hjp-rrvq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43790'} | null | {'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'} | {'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'} |
GHSA | GHSA-6gm7-j668-w6h9 | SQL Injection in Pimcore | Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality. | {'CVE-2022-1219'} | 2022-04-22T20:42:11Z | 2022-04-09T00:00:30Z | HIGH | 7.5 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1219', 'https://github.com/advisories/GHSA-6gm7-j668-w6h9', 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6', 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'} | null | {'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'} | {'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'} |
GHSA | GHSA-r8hp-5m7c-jhv4 | Cross-site Scripting OrchardCore.Application.Cms.Targets | Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2. | {'CVE-2022-0274'} | 2022-01-21T23:08:50Z | 2022-01-21T23:08:50Z | MODERATE | 6.8 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0274', 'https://github.com/advisories/GHSA-r8hp-5m7c-jhv4', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'} | null | {'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'} | {'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'} |
GHSA | GHSA-v24h-pjjv-mcp6 | Denial of service in Tendermint | ### Description
**Denial of Service 1**
Tendermint 0.33.2 and earlier does not limit the number of P2P connection requests. For each p2p connection, Tendermint allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to duplicate IP or reaching a maximum number of inbound peers), temporary memory spikes can lead to OOM (Out-Of-Memory) exceptions.
Tendermint 0.33.3 (and 0.32.10) limits the total number of P2P incoming connection requests to to `p2p.max_num_inbound_peers + len(p2p.unconditional_peer_ids)`.
Notes:
- Tendermint does not rate limit P2P connection requests per IP (an attacker can saturate all the inbound slots);
- Tendermint does not rate limit HTTP(S) requests. If you expose any RPC endpoints to the public, please make sure to put in place some protection (https://www.nginx.com/blog/rate-limiting-nginx/). We may implement this in the future (https://github.com/tendermint/tendermint/issues/1696).
**Denial of Service 2**
Tendermint 0.33.2 and earlier does not reclaim `activeID` of a peer after it's removed in `Mempool` reactor. This does not happen all the time. It only happens when a connection fails (for any reason) before the `Peer` is created and added to all reactors. `RemovePeer` is therefore called before `AddPeer`, which leads to always growing memory (`activeIDs` map). The `activeIDs` map has a maximum size of 65535 and the node will panic if this map reaches the maximum. An attacker can create a lot of connection attempts (exploiting Denial of Service 1), which ultimately will lead to the node panicking.
Tendermint 0.33.3 (and 0.32.10) claims `activeID` for a peer in `InitPeer`, which is executed before `MConnection` is started.
Notes:
- `InitPeer` function was added to all reactors to combat a similar issue - https://github.com/tendermint/tendermint/issues/3338;
- Denial of Service 2 is independent of Denial of Service 1 and can be executed without it.
### Impact
- All full nodes (except for validators who are behind closed networks)
- Node's memory usage increases, then it panics either in the mempool or due to OOM.
### Patches
- v0.33.3
- v0.32.10
- v0.31.12
### Workarounds
No workarounds.
### References
- https://hackerone.com/reports/820317 (not disclosed yet)
- https://github.com/tendermint/tendermint/issues/3338
- https://github.com/tendermint/tendermint/issues/1696
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)
* Email us at [security@tendermint.com](mailto:security@tendermint.com)
More information can be found [here](https://tendermint.com/security/).
### Credits
- [fudongbai](https://hackerone.com/fudongbai) for discovering and reporting Denial of Service 2
- Ethan Buchman (@ebuchman) for writing a test case for Denial of Service 2 and Tess Rinearson (@tessr) for fixing it
- Anton Kaliaev (@melekes) for fixing Denial of Service 1 | {'CVE-2020-5303'} | 2021-05-27T18:44:09Z | 2021-05-27T18:44:09Z | LOW | 3.1 | {'CWE-789', 'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5303', 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#denial-of-service-1', 'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd', 'https://github.com/advisories/GHSA-v24h-pjjv-mcp6', 'https://github.com/tendermint/tendermint/issues/1696', 'https://hackerone.com/reports/820317', 'https://github.com/tendermint/tendermint/issues/3338', 'https://github.com/tendermint/tendermint/security/advisories/GHSA-v24h-pjjv-mcp6'} | null | {'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd'} | {'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd'} |
GHSA | GHSA-vc6r-4x6g-mmqc | Path Traversal in m-server | Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server.
## Recommendation
Update to version 1.4.2 or later. | null | 2021-08-04T21:07:26Z | 2019-06-11T16:16:23Z | MODERATE | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-vc6r-4x6g-mmqc', 'https://hackerone.com/reports/319795', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json', 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a', 'https://www.npmjs.com/advisories/731'} | null | {'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a'} | {'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a'} |
GHSA | GHSA-m4hj-wg2r-qpcr | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3776'} | 2021-11-17T21:10:57Z | 2021-11-15T23:13:34Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-m4hj-wg2r-qpcr', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776', 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304'} | null | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} |
GHSA | GHSA-vfp9-gwrh-wq9g | Path Traversal in crud-file-server | Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 0.9.0 or later. | {'CVE-2018-3733'} | 2021-01-08T01:57:29Z | 2018-07-18T21:20:19Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/1003', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3733', 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82', 'https://hackerone.com/reports/310690', 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g'} | null | {'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82'} | {'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82'} |
GHSA | GHSA-w4xf-2pqw-5mq7 | Reference binding to nullptr in `RaggedTensorToVariant` | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`:
```python
import tensorflow as tf
tf.raw_ops.RaggedTensorToVariant(
rt_nested_splits=[],
rt_dense_values=[1,2,3],
batched_input=True)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L129) has an incomplete validation of the splits values, missing the case when the argument would be empty.
### Patches
We have patched the issue in GitHub commit [be7a4de6adfbd303ce08be4332554dff70362612](https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37666'} | 2021-08-25T14:42:13Z | 2021-08-25T14:42:13Z | HIGH | 7.8 | {'CWE-824'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37666', 'https://github.com/advisories/GHSA-w4xf-2pqw-5mq7', 'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7'} | null | {'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'} | {'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.