ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Packagist
GHSA-6m93-343m-3jrc
Cross-site Scripting in HTML2PDF
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
{'CVE-2021-45394'}
2022-01-25T20:48:30Z
2022-01-21T23:29:48Z
HIGH
null
{'CWE-918', 'CWE-79'}
{'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md', 'https://github.com/spipu/html2pdf/releases/tag/v5.2.4', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394', 'https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf'}
null
{'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585'}
{'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f'}
Packagist
GHSA-fw5q-j9p4-3vxg
Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Components are: Blog comment posting Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by yama
{'CVE-2020-15276'}
2021-01-07T22:49:33Z
2020-10-30T19:10:20Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15276', 'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54', 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg'}
null
{'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'}
{'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'}
Packagist
GHSA-c7fm-jx59-wjf6
Authorization Bypass Through User-Controlled Key in LiveHelperChat
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
{'CVE-2022-0266'}
2022-01-20T16:14:41Z
2022-01-21T18:50:58Z
MODERATE
null
{'CWE-639'}
{'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/1ac267be-3af8-4774-89f2-77234d144d6b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266', 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}
{'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}
Packagist
GHSA-r7cj-8hjg-x622
DBAL 3 SQL Injection Security Vulnerability
We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction. We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately. The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`. As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs. This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608).
{'CVE-2021-43608'}
2021-12-16T14:11:44Z
2021-11-16T17:25:57Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/doctrine/dbal/releases', 'https://github.com/doctrine/dbal/', 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43608', 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622', 'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html'}
null
{'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'}
{'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'}
Packagist
GHSA-3p85-p4qg-hcrp
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4081'}
2021-12-14T15:06:00Z
2021-12-16T14:27:58Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a', 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081'}
null
{'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'}
{'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'}
Packagist
GHSA-754h-5r27-7x3r
RCE in Symfony
Description ----------- The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by `CachingHttpClient` and if an attacker can control the response for a request being made by the `CachingHttpClient`, remote code execution is possible. Resolution ---------- HTTP headers designed for internal use in `HttpCache` are now stripped from remote responses before being passed to `HttpCache`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78) for the 4.4 branch. Credits ------- I would like to thank Matthias Pigulla (webfactory GmbH) for reporting and fixing the issue.
{'CVE-2020-15094'}
2022-03-18T18:31:48Z
2020-09-02T17:29:56Z
HIGH
null
{'CWE-212'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15094', 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r', 'https://github.com/symfony/symfony', 'https://packagist.org/packages/symfony/http-kernel', 'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78', 'https://packagist.org/packages/symfony/symfony', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/'}
null
{'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'}
{'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'}
Packagist
GHSA-x7j7-qp7j-hw3q
Cross-site scripting (XSS) from writer field content in the site frontend
### Impact Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content. ### Patches We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. ### Credits Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.
{'CVE-2021-41252'}
2021-11-16T15:46:57Z
2021-11-16T17:04:19Z
MODERATE
null
{'CWE-79'}
{'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252', 'https://github.com/getkirby/kirby/releases/tag/3.5.8', 'https://github.com/getkirby/kirby'}
null
{'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'}
{'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'}
Packagist
GHSA-h3gg-7wx2-cq3h
XSS in Flarum Sticky extension
### Impact A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit. Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed. Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned. On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited. Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted. ### Patches The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension. ### Workarounds Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled. ### References - [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151) - [Pull Request](https://github.com/flarum/sticky/pull/24) ### For more information If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support). If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
{'CVE-2021-21283'}
2021-01-26T20:41:58Z
2021-01-29T18:13:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/flarum/sticky/pull/24', 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283', 'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h', 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)'}
null
{'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'}
{'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'}
Packagist
GHSA-5r9v-8w62-r26j
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0253'}
2022-01-25T19:13:21Z
2022-01-21T23:48:25Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0253', 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
{'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
Packagist
GHSA-4qwp-7c67-jmcc
Unauthenticated remote code execution in Ignition
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
{'CVE-2021-3129'}
2021-03-23T00:13:45Z
2021-03-29T20:23:46Z
CRITICAL
null
{'CWE-94'}
{'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html', 'https://github.com/facade/ignition/pull/334', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3129', 'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b', 'http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html', 'https://www.ambionics.io/blog/laravel-debug-rce'}
null
{'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'}
{'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'}
Packagist
GHSA-4gwh-2pqx-f5cc
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
{'CVE-2021-44277'}
2021-12-03T15:17:38Z
2021-12-03T20:48:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/librenms/librenms/pull/13554', 'https://github.com/librenms/librenms/', 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277'}
null
{'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}
{'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}
Packagist
GHSA-39wj-j3jc-858m
XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic
### Impact This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic. This vulnerability was reported by Naveen Sunkavally at Horizon3.ai. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
{'CVE-2020-35124'}
2021-01-19T20:43:12Z
2021-01-19T20:43:56Z
CRITICAL
null
{'CWE-79'}
{'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4', 'https://forum.mautic.org/c/announcements/16', 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35124', 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce', 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m', 'https://packagist.org/packages/mautic/core'}
null
{'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'}
{'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'}
Packagist
GHSA-cqcc-mm6x-vmvw
Persistent Cross-site Scripting vulnerability in PrivateBin
In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present since attachments with image preview got introduced in v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a specifically crafted SVG attachment, and interacts with the preview image and the instance isn't protected by an appropriate content security policy. As a consequence, we have mitigated the vulnerability in the preview and urge server administrators to either **upgrade** to a version with the fix or to ensure the content security policy of their instance is set correctly, ideally both. Additionally, we expanded our [directory listing tool with a checking mechanism](https://privatebin.info/directory/check) and **highly suggest server administrators to check their instance there** and, should there be a warning regarding the content security policy **adjust the CSP to our suggested one**, as it is shown in the configuration preset. ## Proof of concept The vulnerability can be triggered as following: 1. Create the following SVG as a file: ```svg <?xml version="1.0" standalone="no"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"> <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/> <script type="text/javascript"> alert(document.domain); </script> </svg> ``` 2. Upload it as an attachment to a PrivateBin instance that has attachments enabled and hasn't set the recommended content security policy (in particular, one that has either no content security policy set or that allows `*` or `blob:` as a `script-src`). 3. Open the paste. (In a real attack scenario this would be done by the victim.) 4. The SVG is rendered safely as a preview, and script isn't yet executed. 5. Now (depending on your device) right-click or long tap on the image and open it in a new tab. 6. Now a `blob:` URI opens in a new tab with the image and the modal is shown, therefore the script got executed. ## Impact We tried to reproduce the vulnerability and in our assessment, we found out the following: 1. Any users who use our recommended _Content Security Policy_ (CSP), even older, less strict ones, are **not affected** by this vulnerability, if a [CSP compatible browser](https://caniuse.com/contentsecuritypolicy) is used. All the browsers we tested with did pass on the CSP to the new tab that is opened when viewing the SVG by itself. As PrivateBin ships with a [built-in CSP](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader), we consider this a strong defence in depth against these and related issues. That said, we think the CSP should only be the last layer of defence and as such, we decided to still apply further mitigations for this security issue. 2. Instances that do not have attachments enabled, are not affected. Even when attachments are uploaded using a third-party client, they can't be rendered when the administrator disables them (the HTML element that they would render in isn't present and before 1.4 this caused an error, we now catch the error and only display the paste text) and thus potential exploits in the attachment file do not apply. 3. The inline preview (step 4 above) does _not_ execute the script, because [browsers explicitly restrict SVGs if the they are is embedded in an `img` tag](https://developer.mozilla.org/en-US/docs/Web/SVG/SVG_as_an_Image#restrictions) to prevent such security issues in images. Thus, [SVGs in `img` tags itself can be considered safe](https://www.w3.org/TR/CSP2/#which-policy-applies). However, when the user opens the SVG in a new tab, this browser security feature is circumvented. That's why the exploit steps above explain to open the SVG in a new tab. That being said, the impact of the vulnerability is reduced by two factors: 1. The attack explicitly requires **user-interaction**, i.e. the user has to be tricked into opening the preview in a new tab for some reason. This could realistically be achieved with some social engineering: The markdown formatted text part of the paste could include such an instruction as a big, bold title, or the SVG could be very large and have very small text, which the user might want to zoom into, in order to read. 2. Potential exploit code can only run in a new tab. It still has the same origin (as can be seen in the PoC above, because the domain/origin the script is running on, is shown). However, though, sensitive information like the paste content, potential comments or encryption key (in the URL) is not accessible to the attacker as the context is now a blob-URL – and would anyway consist mostly of things the attacker initially created itself. That said, [the same origin policy applies](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy) and thus, what an attacker could do is read e.g. cookies and local storage data saved in the same origin. As PrivateBin itself does not use any of that, the impact of this vulnerability is limited. However, as PrivateBin is a software for self-hosting, it cannot be excluded that other services run in the same origin (e.g. on the same domain). That's why server administrators may need to evaluate the impact of running arbitrary JavaScript code on their domain/origin where PrivateBin is hosted by themselves. To summarize, this shows a fairly limited impact, given even if the CSP had not caught the issue, the user still needs to interact with the page and the exploit code cannot access or exfiltrate any data of the PrivateBin instance. **Note:** However, take our assessment only as a basis for your own assessment. As explained, depending on your environment, the actual risk may vary if you are hosting other services on the same domain as PrivateBin. As for the metrics, the impact assessment we have done with [CVSS v3.1](https://nvd.nist.gov/vuln-metrics/cvss) results in this: [AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C/CR:X/IR:X/AR:X/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:X/MI:X/MA:X&version=3.1) ### Real-life impact We found two affected instances in our instance lists (wiki, directory) that did not serve a correct Content Security Policy header, had attachments enabled and thus are vulnerable to this attack. We didn't manage to get into contact with the administrators of these sites, though. In addition to that, we found that multiple instances do seem to either strip our CSP or have it changed to an unsafe setting and have thus expanded our directory service to verify whether our recommend CSP is used or not. (see below) We have no reports that indicate this vulnerability was or is being actively exploited at the time of this report. ## Patches To fix the problem, we took the following measures (in no particular order): * We apply [DOMpurify](https://github.com/cure53/DOMPurify/) (a library we already use to sanitize user-submitted HTML via the Markdown format) to the SVG preview, too. It strips script tags and other uncommon security-relevant and potentially malicious tags/properties from the SVG file. So whether you open the SVG in a new tab or not and whether CSP is present and enabled or not does not matter any more, as the displayed SVG is sanitized. * As a further defence in depth mechanism we now send the CSP both as an HTTP header, as well as a meta tag. This protects instance with mis-configured web servers, CDNs, proxy or similar, from stripping or breaking the CSP headers, as they still get the CSP inside of the HTML content itself. Please note though, that the [meta tag approach is not as strong as the HTTP header approach](https://content-security-policy.com/examples/meta/) and should thus only be considered as a fallback. * The [PrivateBin Directory](https://privatebin.info/) now also scans whether the recommend Content-Security-Policy header is used on a given instance. If you do not want to have your website appear in the list, but check it manually [you can use a separate check page](https://privatebin.info/directory/check) there. The code-changes in PrivateBin can be found in https://github.com/PrivateBin/PrivateBin/pull/906. **Note:** Please note that we explicitly chose to _not_ apply _DOMPurify_ if you download the (SVG) attachment with the download button. Subsequently, if a user would manually opens the downloaded SVG in the browser, it will be opened from the `file://` protocol and thus from a [different origin](https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy), so all reference to the download location is lost and no more security risk is associated with that, than opening any website or local HTML file. Thus, the SVG file with stay intact in it's original form, if you download the attachment. We consider the execution of code from attachments outside of the PrivateBin instance's context to be out of scope to mitigate (i.e. malware in executables, office documents macros, PDF scripts), as all of these require client side mitigations to be applied to all such downloaded file types, independent on where they get downloaded from. ## Workarounds We strongly recommend you to upgrade to our latest release, especially as we also upgraded outdated and potential vulnerable libraries (see below). However, here are two workarounds that may help you to mitigate this vulnerability: * Update the [CSP in your configuration file](https://github.com/PrivateBin/PrivateBin/wiki/Configuration#cspheader) to the latest recommended settings and check that it isn't getting reverted or overwritten by your web server, reverse proxy or CDN, i.e. using [our offered check service](https://privatebin.info/directory/check). * Deploying PrivateBin on a separate domain may limit the scope of the vulnerability to PrivateBin itself and thus, as described in the “Impact” section, effectively prevent any damage by the vulnerability to other resources you are hosting. * As explained in the impact assessment, disabling attachments also prevents this issue. ## References We highly encourage server administrators and others involved with the PrivateBin project to read-up on how Content-Security-Policies work, especially should you consider to manually adjust it: * https://content-security-policy.com/ * https://developer.mozilla.org/docs/Web/HTTP/CSP * https://developers.google.com/web/fundamentals/security/csp/ Also please note that if multiple headers are set (as e.g. done via our now introduced meta tag) [browsers should apply the most restrictive set of the policies](https://stackoverflow.com/a/51153816/5008962), [as per the CSP specification](https://www.w3.org/TR/CSP2/#enforcing-multiple-policies). ## For more information Please notice we also upgraded [jQuery](https://github.com/PrivateBin/PrivateBin/pull/880) that was reported to us as being vulnerable both by [our automated container security scanning](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issue-1006943396) as well as [by users](https://github.com/PrivateBin/PrivateBin/issues/864). By doing so, we also updated all [other dependencies we use](https://github.com/PrivateBin/PrivateBin/pull/888). Our tooling identified the following vulnerabilities in jQuery: * CVE-2020-11023 * CVE-2020-11022 In [a limited assessment about these when we were made aware of them](https://github.com/PrivateBin/docker-nginx-fpm-alpine/issues/69#issuecomment-928261418) we could not find any immediate risk, but nevertheless, we encourage users to upgrade to be on the safe side. Finally, we also [upgraded zlib](https://github.com/PrivateBin/PrivateBin/pull/909) to address CVE-2018-25032. ## Timeline * 2022-02-22 – Initial contact by reporter. * 2022-02-25 – Reporter sends in a detailed report. * 2022-02-26 – Report gets reviewed, initial findings around the content security get shared and reporter withdraws report. * 2022-04-09 – Vulnerability details published. ## Credits This vulnerability was reported by Ian Budd, [Nethemba s.r.o](https://www.nethemba.com/), which we'd like to thank for that. In general, we'd like to thank everyone reporting issues and potential vulnerabilities to us. If you think you have found a vulnerability or potential security risk, [we'd kindly ask you to follow our security policy](https://github.com/PrivateBin/PrivateBin/blob/master/SECURITY.md) and report it to us. We then assess the report and will take the actions we deem necessary to address it.
{'CVE-2022-24833'}
2022-04-20T16:29:00Z
2022-04-12T20:45:22Z
HIGH
null
{'CWE-79'}
{'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw', 'https://github.com/PrivateBin/PrivateBin', 'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24833'}
null
{'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab'}
{'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab'}
Packagist
GHSA-hf4q-52x6-4p57
Unrestricted file upload leads to stored cross-site scripting in Microweber
Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting.
{'CVE-2022-0906'}
2022-03-28T22:23:29Z
2022-03-11T00:02:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0906', 'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68', 'https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8'}
null
{'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'}
{'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'}
Packagist
GHSA-v567-q267-phpg
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0257'}
2022-01-25T20:49:25Z
2022-01-21T23:50:11Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0257'}
null
{'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d'}
{'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d'}
Packagist
GHSA-3j78-7m59-r7gv
Private data exposure via REST API in BuddyPress
In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed. This has been patched in version 5.1.2.
{'CVE-2020-5244'}
2021-01-08T20:29:11Z
2020-02-24T17:18:26Z
HIGH
null
{'CWE-284'}
{'https://buddypress.org/2020/01/buddypress-5-1-2/', 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244', 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'}
null
{'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'}
{'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'}
Packagist
GHSA-q73m-3q7r-fpf7
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0957'}
2022-03-29T15:46:18Z
2022-03-16T00:00:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/star7th/showdoc/pull/1632', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0957', 'https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21'}
null
{'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb'}
{'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb'}
Packagist
GHSA-hrf4-hcpc-3345
Denial of service in microweber
Microweber is drag and drop website builder and CMS with E-commerce. The microweber prior 1.2.12 application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The post title input can be limited to 500 characters or max 1000 characters as a workaround.
{'CVE-2022-0961'}
2022-03-25T17:09:24Z
2022-03-16T00:00:48Z
HIGH
null
{'CWE-190'}
{'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0961', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436'}
null
{'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc'}
{'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc'}
Packagist
GHSA-84px-q68r-2fc9
Privilege escalation in the Sulu Admin panel
### Impact Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction. ### Patches The versions have been patched in 2.2.18, 2.3.8 and 2.4.0. ### Workarounds Patching the ProfileController of affected sulu versions yourself by overwriting it. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues) * Email us at [security@sulu.io](mailto:security@sulu.io)
{'CVE-2021-43835'}
2021-12-15T22:27:38Z
2021-12-15T22:55:16Z
HIGH
null
{'CWE-269'}
{'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9', 'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835', 'https://github.com/sulu/sulu'}
null
{'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'}
{'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'}
Packagist
GHSA-75c5-f4gw-38r9
Multiple vulnerabilities through filename manipulation in Archive_Tar
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
{'CVE-2020-28949'}
2021-09-20T20:26:56Z
2021-04-22T16:20:59Z
HIGH
null
{'CWE-74'}
{'http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28949', 'https://github.com/pear/Archive_Tar', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar/issues/33', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://www.drupal.org/sa-core-2020-013', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-28949.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://www.debian.org/security/2020/dsa-4817', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://security.gentoo.org/glsa/202101-23'}
null
{'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}
{'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}
Packagist
GHSA-vcgf-vmpc-ph79
Improper Access Control in microweber
Improper Access Control in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0277'}
2022-01-27T18:30:40Z
2022-01-21T18:06:16Z
MODERATE
null
{'CWE-284', 'CWE-269'}
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0277', 'https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316'}
null
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}
Packagist
GHSA-2cjf-w7c4-fhf6
Cross-site Scripting in Beanstalk console
Beanstalk console (ptrofimov/beanstalk_console) prior to 1.7.14 is vulnerable to cross-site scripting.
{'CVE-2022-0539'}
2022-02-11T15:04:27Z
2022-02-10T00:00:30Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694', 'https://github.com/ptrofimov/beanstalk_console', 'https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0539'}
null
{'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694'}
{'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694'}
Packagist
GHSA-f768-8pvq-mm6r
Business Logic Errors in dolibarr/dolibarr
Dolibarr 14.0.5 and prior versions are vulnerable to Business Logic Errors.
{'CVE-2022-0414'}
2022-02-07T21:10:24Z
2022-02-01T22:01:47Z
MODERATE
null
null
{'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684', 'https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0414'}
null
{'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684'}
{'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684'}
Packagist
GHSA-hgjr-632x-qpp3
Cross-site scripting vulnerability in file upload
There is a cross-site scripting vulnerability in file upload on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. ### Target baserCMS 4.5.1 and earlier versions ### Vulnerability Execution of malicious JavaScript code may alter the display of the page or leak cookie information. ### Countermeasures Update to the latest version of baserCMS Please refer to the next page for details. https://basercms.net/security/JVN_14134801
{'CVE-2021-39136'}
2021-08-26T15:08:57Z
2021-08-30T16:18:59Z
HIGH
null
{'CWE-79'}
{'http://jvn.jp/en/jp/JVN14134801/index.html', 'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc', 'https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3', 'https://github.com/baserproject/basercms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39136', 'https://basercms.net/security/JVN_14134801'}
null
{'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc'}
{'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc'}
Packagist
GHSA-9cq5-xgg4-x477
SQL Injection in showdoc
Showdoc verions 2.10.2 and prior is vulnerable to SQL injection. A patch is available in the `master` branch of the repository.
{'CVE-2022-0362'}
2022-02-03T21:37:09Z
2022-01-27T00:01:15Z
MODERATE
null
{'CWE-89'}
{'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb', 'https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0362'}
null
{'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb'}
{'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb'}
Packagist
GHSA-g585-j55v-38h7
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0966'}
2022-03-29T18:40:41Z
2022-03-16T00:00:45Z
MODERATE
null
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0966'}
null
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
Packagist
GHSA-38m9-3vg4-rwvp
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
{'CVE-2022-0678'}
2022-02-23T19:43:59Z
2022-02-20T00:00:32Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0678', 'https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'}
{'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'}
Packagist
GHSA-fx3v-553x-3c4q
Stored XSS by authenticated backend user with access to upload files
### Impact Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /storage/app/media/evil.svg), but they would have to convince their target to visit that location directly in the target's browser as the backend does not display SVGs inline anywhere, SVGs are only displayed as image resources in the backend and are thus unable to be executed. ### Patches Issue has been patched in Build 469 (v1.0.469) & v1.1.0. ### Workarounds Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469 or v1.1.0. ### References Reported by [Hoan Hoang](https://github.com/hoanhp) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1107" alt="Screen Shot 2020-10-10 at 1 47 49 PM" src="https://user-images.githubusercontent.com/7253840/95663787-378f2b80-0aff-11eb-8dfc-b97d162939da.png">
{'CVE-2020-15249'}
2021-03-04T18:24:54Z
2020-11-23T19:47:59Z
LOW
null
{'CWE-79'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15249', 'https://github.com/octobercms/october/security/advisories/GHSA-fx3v-553x-3c4q'}
null
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
Packagist
GHSA-c442-3278-rhrg
Unrestricted File Upload in ShowDoc v2.9.5
Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'.
{'CVE-2021-36440'}
2021-09-16T19:26:04Z
2021-09-09T17:08:46Z
CRITICAL
null
{'CWE-434'}
{'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36440', 'https://github.com/star7th/showdoc/issues/1406', 'https://github.com/star7th/showdoc'}
null
{'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf'}
{'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf'}
Packagist
GHSA-w6rp-4vj7-v2m8
Missing Authorization in DayByDay CRM
In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.
{'CVE-2022-22111'}
2022-01-10T21:46:05Z
2022-01-08T00:31:49Z
HIGH
null
{'CWE-862'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://github.com/Bottelet/DaybydayCRM', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22111'}
null
{'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}
{'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}
Packagist
GHSA-w6jr-wj64-mc9x
Deserialization of Untrusted Data in Codeigniter4
### Impact Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. ### Patches Upgrade to v4.1.6 or later. ### Workarounds Do not use: - `old()` and form_helper - `RedirectResponse::withInput()` and `redirect()->withInput()` ### References - [PHP Object Injection | OWASP](https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection) ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
{'CVE-2022-21647'}
2022-01-06T19:32:43Z
2022-01-06T22:52:41Z
HIGH
null
{'CWE-502'}
{'https://github.com/codeigniter4/CodeIgniter4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21647', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-w6jr-wj64-mc9x', 'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'}
null
{'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'}
{'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'}
Packagist
GHSA-25fx-mxc2-76g7
Unauthorized access to Credit card form exposing payer name and not requiring 3DS
### Impact URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last name. Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication. ### Patches The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1** ### Workarounds One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback. ### For more information If you have any questions or comments about this advisory: - Open an issue in Sylius/PayPalPlugin issues - Email us at security at sylius dot com
{'CVE-2021-41120'}
2021-10-05T21:12:27Z
2021-10-06T17:49:11Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41120', 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff', 'https://github.com/Sylius/PayPalPlugin', 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7', 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7'}
null
{'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff', 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7'}
{'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7', 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff'}
Packagist
GHSA-5v44-7647-xfw9
Blind SQL injection in PrestaShop productcomments module
### Impact An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. ### Patches The problem is fixed in 4.2.1
{'CVE-2020-26248'}
2022-01-07T16:07:46Z
2021-01-20T21:33:53Z
LOW
null
{'CWE-89'}
{'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa', 'https://github.com/PrestaShop/productcomments', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26248', 'https://packagist.org/packages/prestashop/productcomments', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-5v44-7647-xfw9', 'http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html', 'https://github.com/PrestaShop/productcomments/releases/tag/v4.2.1'}
null
{'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa'}
{'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa'}
Packagist
GHSA-73q9-7pwj-gm46
icecoder is vulnerable to Cross-site Scripting
icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3862'}
2022-01-19T14:28:08Z
2022-01-21T23:46:12Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3862', 'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763', 'https://github.com/icecoder/icecoder', 'https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601'}
null
{'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763'}
{'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763'}
Packagist
GHSA-p7v4-gm6j-cw9m
XSS in Mautic
### Impact This is a cross-site scripting vulnerability relating to creating/editing a company which requires the user to be logged in as an administrator to be executed. This vulnerability was reported by Dardan Prebreza at Bishop Fox. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### References https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4 ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
{'CVE-2021-3142'}
2021-01-29T20:31:59Z
2021-01-29T20:51:20Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3142', 'https://github.com/mautic/mautic/security/advisories/GHSA-p7v4-gm6j-cw9m', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-3', 'https://github.com/mautic/mautic/releases/tag/3.2.4', 'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'}
null
{'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'}
{'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'}
Packagist
GHSA-ppfm-rj6p-38q6
Improper Authorization in librenms
Improper Authorization in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0587'}
2022-02-24T12:14:14Z
2022-02-16T00:01:53Z
HIGH
null
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0587', 'https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/librenms'}
null
{'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}
{'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}
Packagist
GHSA-h58v-g3q6-q9fx
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu
### Impact _What kind of vulnerability is it? Who is impacted?_ It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form. Only admin users are affected and only admin users can create tags. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem is patched with Version 1.6.42. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Create a custom request listener to avoid that this kind of tags are created. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues) * Email us at [security@sulu.io](mailto:security@sulu.io)
{'CVE-2021-41169'}
2021-10-21T21:33:34Z
2021-10-22T16:20:53Z
MODERATE
null
{'CWE-79'}
{'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169', 'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445', 'https://github.com/sulu/sulu'}
null
{'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'}
{'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'}
Packagist
GHSA-6whf-q6p5-84wg
Improper Access Control in Webauthn Framework
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.
{'CVE-2021-38299'}
2021-10-06T13:23:34Z
2021-09-29T17:16:07Z
CRITICAL
null
{'CWE-863'}
{'https://github.com/web-auth/webauthn-framework', 'https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/', 'https://github.com/web-auth/webauthn-framework/releases', 'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308', 'https://github.com/web-auth/webauthn-framework/releases/tag/v3.3.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38299'}
null
{'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308'}
{'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308'}
Packagist
GHSA-4h44-w6fm-548g
Potential Remote Code Execution in TYPO3 with mediace extension
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1) > * CWE-325, CWE-20, CWE-200, CWE-502 ### Problem It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below. * [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation + the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network) + `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high) * [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution + an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation + `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical) The overall severity of this vulnerability is critical (9.1) based on mentioned attack chains and the fact it does not require any privileges. ### Solution In case the extension is not used and required at all, it is suggested to uninstall and remove it from the system completely. Otherwise, an updated version 7.6.5 is available from the TYPO3 extension manager, Packagist and the TYPO3 extension repository: * https://extensions.typo3.org/extension/download/mediace/7.6.5/zip/ * https://packagist.org/packages/friendsoftypo3/mediace#7.6.5 As a precautionary measure it is advised to change `encryptionKey` and database credentials in `typo3conf/LocalConfiguration.php`. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. ### References * [TYPO3-EXT-SA-2020-014](https://typo3.org/security/advisory/typo3-ext-sa-2020-014)
{'CVE-2020-15086'}
2021-11-19T15:44:20Z
2020-07-29T16:15:12Z
HIGH
null
{'CWE-502', 'CWE-325', 'CWE-20', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15086', 'https://github.com/FriendsOfTYPO3/mediace/pull/31', 'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g', 'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75', 'https://github.com/FriendsOfTYPO3/mediace'}
null
{'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75'}
{'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75'}
Packagist
GHSA-2p89-ppc2-mrq4
Cross site scripting in getgrav/grav
User input is not properly sanitized leading to cross site scrpting (xss) in grav.
{'CVE-2022-0743'}
2022-03-18T20:45:44Z
2022-03-02T00:00:22Z
MODERATE
null
{'CWE-79'}
{'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0743', 'https://github.com/getgrav/grav', 'https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293'}
null
{'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f'}
{'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f'}
Packagist
GHSA-vxhx-gmhm-623c
Improper Access Control in moodle
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25698'}
2021-03-24T23:17:35Z
2021-03-29T20:42:46Z
HIGH
null
{'CWE-284'}
{'https://moodle.org/mod/forum/discuss.php?d=413935', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25698', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895419', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63'}
null
{'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63'}
{'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63'}
Packagist
GHSA-rp34-85x3-3764
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.
{'CVE-2022-0576'}
2022-02-24T13:07:04Z
2022-02-15T00:02:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0576', 'https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177', 'https://github.com/librenms/librenms'}
null
{'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd'}
{'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd'}
Packagist
GHSA-5hfj-r725-wpc4
Arbitrary code execution in october/system
### Impact Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26 to your installation manually if you are unable to upgrade. ### References Credits to: • Sushi Yushi ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-32650'}
2022-01-24T22:06:28Z
2022-01-14T21:08:26Z
HIGH
null
{'CWE-74'}
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32650', 'https://github.com/octobercms/october/security/advisories/GHSA-5hfj-r725-wpc4'}
null
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}
Packagist
GHSA-qpv2-jxc7-3638
Exposure of Sensitive Information in snipe/snipe-it
Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor.
{'CVE-2022-0569'}
2022-02-24T13:13:01Z
2022-02-15T00:02:47Z
MODERATE
null
{'CWE-200'}
{'https://huntr.dev/bounties/b41d5e63-bcd8-4864-8a2e-8ec74eec520b', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0569', 'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'}
null
{'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'}
{'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'}
Packagist
GHSA-r992-xph6-h7x2
Open redirect in microweber
microweber prior to 1.2.11 is vulnerable to open redirect.
{'CVE-2022-0560'}
2022-02-23T21:57:38Z
2022-02-12T00:00:48Z
MODERATE
null
{'CWE-601'}
{'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0560'}
null
{'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63'}
{'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63'}
Packagist
GHSA-v92m-hhhw-vv9v
Code injection in codiad
Codiad Web IDE through 2.8.4 allows PHP Code injection.
{'CVE-2019-19208'}
2021-08-30T21:59:12Z
2021-09-01T18:27:12Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit', 'https://herolab.usd.de/security-advisories/usd-2019-0049/', 'https://www.exploit-db.com/exploits/49902', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19208', 'https://herolab.usd.de/en/security-advisories/', 'https://github.com/Codiad/Codiad', 'https://github.com/Codiad/Codiad/commits/master', 'http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html'}
null
{'https://github.com/Codiad/Codiad/commits/master'}
{'https://github.com/Codiad/Codiad/commits/master'}
Packagist
GHSA-vm37-j55j-8655
OS Command Injection in Microweber
Microweber is a content management system with drag and drop. Prior to version 1.2.11, Microweber is vulnerable to OS Command Injection.
{'CVE-2022-0557'}
2022-03-28T15:23:37Z
2022-02-12T00:00:49Z
HIGH
null
{'CWE-78'}
{'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0557', 'http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html', 'https://github.com/microweber/microweber', 'https://www.exploit-db.com/exploits/50768', 'https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8'}
null
{'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'}
{'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'}
Packagist
GHSA-83vp-6jqg-6cmr
Incorrect Authentication in shopware
### Impact Modify Customers, create Orders without App Permission ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2022-24748'}
2022-03-18T20:15:32Z
2022-03-10T18:02:14Z
MODERATE
null
{'CWE-287'}
{'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.27683580.172848620.1646933022-368790926.1646933022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748', 'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'}
null
{'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'}
{'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'}
Packagist
GHSA-32wr-8wxm-852c
Deserialization of Untrusted Data in NukeViet
includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).
{'CVE-2019-7725'}
2021-04-07T22:08:23Z
2021-06-22T15:24:59Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7725'}
null
{'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'}
{'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'}
Packagist
GHSA-rgp5-m2pq-3fmg
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
{'CVE-2022-0690'}
2022-02-23T19:28:54Z
2022-02-20T00:00:31Z
HIGH
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2', 'https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0690', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'}
{'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'}
Packagist
GHSA-q9p4-qfc8-fvpp
SQL Injection in medoo
columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.
{'CVE-2019-10762'}
2021-10-08T23:09:47Z
2021-10-12T16:32:38Z
CRITICAL
null
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562', 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762', 'https://github.com/catfan/Medoo'}
null
{'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}
{'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}
Packagist
GHSA-vj9x-w7ch-f46p
pimcore is vulnerable to SQL Injection
pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
{'CVE-2022-0258'}
2022-01-19T14:22:43Z
2022-01-21T23:50:08Z
HIGH
null
{'CWE-89'}
{'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0258', 'https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802'}
null
{'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd'}
{'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd'}
Packagist
GHSA-xjp4-6w75-qrj7
Remote CLI Command Execution Vulnerability in CodeIgniter4
### Impact This vulnerability allows attackers to execute CLI routes via HTTP request. ### Patches Upgrade to v4.1.9 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
{'CVE-2022-24711'}
2022-03-01T21:44:13Z
2022-03-01T21:44:13Z
CRITICAL
null
{'CWE-94', 'CWE-20'}
{'https://github.com/codeigniter4/CodeIgniter4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24711', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7', 'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'}
null
{'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'}
{'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'}
Packagist
GHSA-g8rg-7rpr-cwr2
Information Disclosure in TYPO3 extension sf_event_mgt
A missing access check in the backend module allows an authenticated backend user to export participant data for events which the user does not have access to, resulting in Information Disclosure. Another missing access check in the backend module allows an authenticated backend user to send emails to event participants for events which the user does not have access to, resulting in Broken Access Control. External reference: [https://typo3.org/security/advisory/typo3-ext-sa-2020-017](https://typo3.org/security/advisory/typo3-ext-sa-2020-017)
{'CVE-2020-25026'}
2021-08-02T14:33:59Z
2020-09-02T18:03:26Z
MODERATE
null
{'CWE-863'}
{'https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-g8rg-7rpr-cwr2', 'https://packagist.org/packages/derhansen/sf_event_mgt', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25026', 'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-017'}
null
{'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4'}
{'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4'}
Packagist
GHSA-5mj6-3cmq-fh34
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
{'CVE-2022-0079'}
2022-01-06T19:38:50Z
2022-01-06T22:22:46Z
MODERATE
null
{'CWE-209'}
{'https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0079'}
null
{'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db'}
{'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db'}
Packagist
GHSA-g5rr-p69h-7v3g
Insufficient type validation in pocketmine/pocketmine-mp
When an inventory interaction is performed (e.g. moving an item around an inventory), the client sends a serialized version of the itemstack to the server, which the server then deserializes and compares against its own copy. If the copies don't match, the transaction is invalid. This involves deserializing item NBT from the client, which allows for bogus data to be provided. Usually, this is harmless, but in this particular case, it could result in crashes on certain types of bad data (e.g. incorrect ListTag type provided for the `CanDestroy` tag). This is fixed in 4.2.9 by commit 5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2. It's non-trivial to workaround this, but can be done by handling `InventoryTransactionPacket` and `PlayerAuthInputPacket` to scrub inbound transaction data of bogus NBT that would cause these crashes.
null
2022-04-22T20:57:12Z
2022-04-22T20:57:12Z
HIGH
null
{'CWE-1287', 'CWE-20'}
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-g5rr-p69h-7v3g', 'https://github.com/pmmp/PocketMine-MP/releases/tag/4.2.9', 'https://github.com/pmmp/PocketMine-MP/blob/4.2.9/changelogs/4.2.md#429'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2'}
{'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2'}
Packagist
GHSA-h9q8-5gv2-v6mg
Potential Session Hijacking
### Impact Potential session hijacking of store customers. ### Patches We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
null
2021-03-12T22:10:34Z
2021-03-12T23:09:08Z
LOW
null
{'CWE-613'}
{'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://packagist.org/packages/shopware/platform'}
null
{'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e'}
{'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e'}
Packagist
GHSA-33wf-4crm-2322
Improper Access Control in librenms
Improper Access Control in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0580'}
2022-02-24T12:12:44Z
2022-02-16T00:01:58Z
HIGH
null
{'CWE-284'}
{'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0580', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3'}
null
{'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}
{'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}
Packagist
GHSA-wph3-44rj-92pr
Multiple vulnerabilities leading to RCE
### Impact We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration. ### Patches The issues were addressed in our last release, 2.1.59. ### Workarounds If you can't update to 2.1.59, make sure your connector is not exposed without authentication. ### Reference Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research@sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-32682'}
2021-10-06T20:57:44Z
2021-06-16T17:04:29Z
CRITICAL
null
{'CWE-918', 'CWE-22', 'CWE-78'}
{'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32682', 'http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com/Studio-42/elFinder', 'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17'}
null
{'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17'}
{'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17'}
Packagist
GHSA-636j-7x7r-gvw2
Old sessions not blocked by login enable function in Snipe-IT
Snipe-IT is a FOSS project for asset management in IT Operations. In Snipe-IT versions 5.4.1 and 6.0.0-RC-5 and prior, active sessions are not revoked when a user account is disabled, allowing that user to still access information that they should no longer be able to. Workarounds include using the KillAllSessions console command, clearing the contents of the storage/framework/sessions directory, or changing the cookie name, but all of those options logout ALL users, which could be kind of annoying. This issue is fixed in versions 6.0.0-RC-6 and 5.4.2.
{'CVE-2022-1155'}
2022-04-13T13:28:21Z
2022-03-31T00:00:22Z
HIGH
null
{'CWE-613'}
{'https://github.com/snipe/snipe-it/releases/tag/v5.4.2', 'https://github.com/snipe/snipe-it/pull/10876', 'https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1', 'https://github.com/snipe/snipe-it/releases/tag/v6.0.0-RC-6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1155', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d'}
null
{'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d'}
{'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d'}
Packagist
GHSA-5pv8-ppvj-4h68
Prevent user enumeration using Guard or the new Authenticator-based Security
Description ----------- The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user. Resolution ---------- We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4. Credits ------- I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.
{'CVE-2021-21424'}
2021-05-13T15:25:38Z
2021-05-13T20:23:02Z
MODERATE
null
{'CWE-200'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRUS2H2SSOQWNLBD35SKIWIDQEMV2PD3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KENRNLB3FYXYGDWRBH2PDBOZZKOD7VY4/', 'https://github.com/symfony/symfony/security/advisories/GHSA-5pv8-ppvj-4h68', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21424', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH7TMM5CHQYBFFGXWRPJDPB3SKCZXI2M/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UC7BND775DVZDQT3RMGD2HVB2PKLJDJW/'}
null
{'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
{'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
Packagist
GHSA-pfj7-w373-gqch
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3900'}
2021-10-29T13:49:08Z
2021-10-28T23:14:21Z
MODERATE
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii', 'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900', 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'}
{'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'}
Packagist
GHSA-x92h-wmg2-6hp7
Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.
{'CVE-2019-10913'}
2021-08-19T15:18:27Z
2019-12-02T18:10:24Z
CRITICAL
null
{'CWE-79', 'CWE-89'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml', 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides', 'https://symfony.com/cve-2019-10913', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913', 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}
null
{'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}
{'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}
Packagist
GHSA-65mj-7c86-79jf
Authentication Bypass in ADOdb/ADOdb
### Impact An attacker can inject values into a PostgreSQL connection string by providing a parameter surrounded by single quotes. Depending on how the library is used in the client software, this may allow an attacker to bypass the login process, gain access to the server's IP address, etc. ### Patches The vulnerability is fixed in ADOdb versions 5.20.21 (952de6c4273d9b1e91c2b838044f8c2111150c29) and 5.21.4 or later (b4d5ce70034c5aac3a1d51d317d93c037a0938d2). The simplest patch is to delete line 29 in `drivers/adodb-postgres64.inc.php`: ```php diff --git a/drivers/adodb-postgres64.inc.php b/drivers/adodb-postgres64.inc.php index d04b7f67..729d7141 100644 --- a/drivers/adodb-postgres64.inc.php +++ b/drivers/adodb-postgres64.inc.php @@ -26,7 +26,6 @@ function adodb_addslashes($s) { $len = strlen($s); if ($len == 0) return "''"; - if (strncmp($s,"'",1) === 0 && substr($s,$len-1) == "'") return $s; // already quoted return "'".addslashes($s)."'"; } ``` ### Workarounds Ensure the parameters passed to *ADOConnection::connect()* or related functions (_nConnect()_, _pConnect()_) are not surrounded by single quotes. ### Credits Thanks to **Emmet Leahy** (@meme-lord) of Sorcery Ltd for reporting this vulnerability, and to the [huntr](https://huntr.dev/) team for their support. ### References - Original issue report https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c/ - ADOdb reference issue #793 ### For more information If you have any questions or comments about this advisory: * Add a note in issue #793 * Contact the maintainers on [Gitter](https://gitter.im/adodb/adodb)
{'CVE-2021-3850'}
2022-02-07T22:34:28Z
2022-01-27T15:23:19Z
CRITICAL
null
{'CWE-287', 'CWE-305'}
{'https://github.com/ADOdb/ADOdb/issues/793', 'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://github.com/ADOdb/ADOdb', 'https://github.com/ADOdb/ADOdb/security/advisories/GHSA-65mj-7c86-79jf', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2', 'https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3850', 'https://www.debian.org/security/2022/dsa-5101', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00006.html'}
null
{'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2'}
{'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2'}
Packagist
GHSA-cfcv-q4qq-2ph4
CKEditor 4 vulnerabilities in versions <4.16.1
Details see: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc ( CVE-2021-37695 ) https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c ( CVE-2021-32808 ) https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg ( CVE-2021-32809 ) Patch: https://github.com/pimcore/pimcore/pull/10032
null
2021-10-08T21:19:54Z
2021-08-23T19:42:05Z
MODERATE
null
null
{'https://github.com/pimcore/pimcore/security/advisories/GHSA-cfcv-q4qq-2ph4', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'}
null
{'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'}
{'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'}
Packagist
GHSA-x5jp-9fmm-m9pf
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3683'}
2021-11-17T21:11:15Z
2021-11-15T23:13:52Z
MODERATE
null
{'CWE-352'}
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3683', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134'}
null
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
Packagist
GHSA-52qp-jpq7-6c54
Insecure Deserialization of untrusted data in rmccue/requests
### Impact Unserialization of untrusted data. ### Patches The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0. ### References Publications about the vulnerability: * https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress * https://github.com/ambionics/phpggc/issues/52 * https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/ * https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf * https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf * https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf * https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f Originally fixed in WordPress 5.5.2: * https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3 * https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/ Related Security Advisories: * https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032 * https://nvd.nist.gov/vuln/detail/CVE-2020-28032 Notification to the Requests repo including a fix in: * https://github.com/rmccue/Requests/pull/421 and * https://github.com/rmccue/Requests/pull/422 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Request](https://github.com/WordPress/Requests/)
{'CVE-2021-29476'}
2021-04-27T20:54:56Z
2021-04-29T21:52:30Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3', 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/', 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf', 'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476', 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress', 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f', 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml', 'https://github.com/ambionics/phpggc/issues/52', 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/', 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf', 'https://github.com/rmccue/Requests/pull/421'}
null
{'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'}
{'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'}
Packagist
GHSA-57hg-26h7-9qgv
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0256'}
2022-01-25T20:49:09Z
2022-01-21T23:48:07Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0256', 'https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1', 'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'}
null
{'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'}
{'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'}
Packagist
GHSA-h2rj-8wgg-mm43
Cross-site Scripting in craftcms
Craft CMS before 3.6.13 has an XSS vulnerability.
{'CVE-2021-32470'}
2022-03-18T17:53:37Z
2022-03-18T17:53:37Z
MODERATE
null
{'CWE-79'}
{'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32470', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04'}
null
{'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6'}
{'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6'}
Packagist
GHSA-cg3q-59w7-rvc2
Reliance on Cookies without Validation and Integrity Checking in getgrav/grav
grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability in one application to cause a compromise in another.
{'CVE-2021-3818'}
2021-09-28T20:32:37Z
2021-09-29T17:12:51Z
MODERATE
null
{'CWE-565'}
{'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07', 'https://github.com/getgrav/grav', 'https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea'}
null
{'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07'}
{'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07'}
Packagist
GHSA-427q-jp8v-ww95
Cross-site Scripting in kimai2
CSRF related to duplicate action. (the duplication occurs first before redirecting to edit form). This vulnerability is capable of tricking admin users to duplicate teams.
{'CVE-2021-3976'}
2021-11-22T18:43:54Z
2021-11-23T18:16:50Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3976', 'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'}
null
{'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'}
{'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'}
Packagist
GHSA-j739-gw6q-f4c7
HTML Injection in Froxlor
Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags. Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only provides partial protection for this particular issue.
{'CVE-2020-29653'}
2022-04-22T20:41:49Z
2022-04-14T00:00:19Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Froxlor/Froxlor', 'https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/', 'https://github.com/Froxlor/Froxlor/security/advisories', 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653'}
null
{'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'}
{'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'}
Packagist
GHSA-hjhp-hwfj-hwf3
Cross Site Request Forgery in firefly-iii
firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user.
{'CVE-2021-4005'}
2021-12-06T21:43:09Z
2021-12-10T20:20:08Z
MODERATE
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii', 'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff', 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4005'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053'}
{'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053'}
Packagist
GHSA-hq3v-rg6f-6hx4
Use of Insufficiently Random Values in yiisoft/yii2-dev
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
{'CVE-2021-3689'}
2021-08-30T20:28:40Z
2021-09-01T18:35:34Z
HIGH
null
{'CWE-330'}
{'https://github.com/yiisoft/yii2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3689', 'https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}
null
{'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}
{'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}
Packagist
GHSA-8w3x-r6x7-c5r5
Cross-site Scripting in pimcore
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4084'}
2021-12-14T14:44:34Z
2021-12-16T14:28:27Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266', 'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084'}
null
{'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065'}
{'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065'}
Packagist
GHSA-pgcp-m69h-p2gr
Cross-site Scripting (XSS) in moodle
In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.
{'CVE-2020-25702'}
2021-03-24T23:15:17Z
2021-03-29T20:43:08Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25702', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895437', 'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://moodle.org/mod/forum/discuss.php?d=413940'}
null
{'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9'}
{'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9'}
Packagist
GHSA-gmrf-99gw-vvwj
/user/sessions endpoint allows detecting valid accounts
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer. If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc
null
2021-03-11T17:41:49Z
2021-03-11T17:42:08Z
HIGH
null
{'CWE-203'}
{'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj', 'https://packagist.org/packages/ezsystems/ezpublish-kernel', 'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'}
null
{'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'}
Packagist
GHSA-r6cm-wg48-rh2r
Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments
The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /index.php/backend_api/ajax_get_calendar_events Unfortunately, there is no authentication / permissions-check on that endpoint, the only required parameters in a POST request are "startDate", "endDate" and "csrfToken". Because the csrfToken can be obtained by any unauthenticated user just visiting the public form (and is valid for the backend as well), any attacker can query the backend API and obtain all sorts of private information about the appointment, in JSON format.
{'CVE-2022-0482'}
2022-04-17T17:13:16Z
2022-03-10T00:00:40Z
CRITICAL
null
{'CWE-863', 'CWE-359'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0482', 'https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26', 'http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html', 'https://github.com/alextselegidis/easyappointments/releases/tag/1.4.3', 'https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/', 'https://github.com/alextselegidis/easyappointments', 'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466'}
null
{'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466'}
{'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466'}
Packagist
GHSA-m884-279h-32v2
Exceptions displayed in non-debug configurations in Symfony
Description ----------- When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments. Resolution ---------- The `ErrorHandler` class now escapes all properties coming from the related Exception, and the stacktrace is not displayed anymore in non-`debug` environments. The patches for this issue are available [here](https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad) and [here](https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db) for branch 4.4. Credits ------- I would like to thank Luka Sikic for reporting & Yonel Ceruto and Jérémy Derussé for fixing the issue.
{'CVE-2020-5274'}
2021-05-12T23:54:24Z
2020-03-30T20:09:31Z
MODERATE
null
{'CWE-209'}
{'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5274'}
null
{'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'}
{'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'}
Packagist
GHSA-x5r2-hj5c-8jx6
SSRF in adminer
### Impact Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. ### Patches Patched by ccd2374b, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). ### Workarounds * Use a single driver version (e.g. `adminer-mysql.php`). * Protect access to Adminer also by other means, e.g. by HTTP password, IP address limiting or by OTP [plugin](https://www.adminer.org/plugins/). ### References https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf ### For more information If you have any questions or comments about this advisory: * Comment at ccd2374b.
{'CVE-2021-21311'}
2021-06-24T19:56:17Z
2021-02-11T20:42:59Z
HIGH
null
{'CWE-918'}
{'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351', 'https://packagist.org/packages/vrana/adminer', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21311', 'https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6'}
null
{'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351'}
{'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351'}
Packagist
GHSA-533p-cp2g-99wp
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3931'}
2021-11-17T21:12:46Z
2021-11-15T23:19:09Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3931', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'}
null
{'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'}
{'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'}
Packagist
GHSA-xg6r-5gx4-qxjm
invoiceninja is vulnerable to Cross-site Scripting
invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3977'}
2022-01-05T20:32:32Z
2022-01-06T21:58:34Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35', 'https://github.com/invoiceninja/invoiceninja'}
null
{'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'}
{'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'}
Packagist
GHSA-7xj5-fwqr-5378
Cross-site Scripting in craftcms/cms
Craft CMS before 3.7.29 allows cross-site scripting.
{'CVE-2022-28378'}
2022-04-18T22:20:39Z
2022-04-04T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/craftcms/cms', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'}
null
{'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'}
{'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'}
Packagist
GHSA-mw75-qvfr-hpmr
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0938'}
2022-03-23T15:38:52Z
2022-03-15T00:01:01Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}
null
{'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}
{'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}
Packagist
GHSA-3p9j-442x-hjp7
Business Logic Errors in microweber
microweber prior to 1.2.11 allows multiple uses of a single-use coupon.
{'CVE-2022-0689'}
2022-02-23T19:27:39Z
2022-02-20T00:00:31Z
MODERATE
null
null
{'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689', 'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649'}
null
{'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}
{'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}
Packagist
GHSA-gj26-g5qf-jrh7
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
{'CVE-2022-0589'}
2022-02-24T13:06:10Z
2022-02-16T00:01:51Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://github.com/librenms/librenms', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589'}
null
{'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'}
{'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'}
Packagist
GHSA-5fxv-xx5p-g2fv
Integer Overflow in microweber
Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters
{'CVE-2022-0968'}
2022-03-25T17:13:37Z
2022-03-16T00:00:46Z
HIGH
null
{'CWE-190'}
{'https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968', 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}
null
{'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}
{'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}
Packagist
GHSA-96v6-hrwg-p378
Weak Password Requirements in Daybyday CRM
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.
{'CVE-2022-22110'}
2022-01-24T22:07:06Z
2022-01-08T00:31:51Z
HIGH
null
{'CWE-521'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22110', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110', 'https://github.com/Bottelet/DaybydayCRM/', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}
null
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}
Packagist
GHSA-2cqg-q7jm-j35c
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3938'}
2021-11-17T21:13:25Z
2021-11-15T23:19:42Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3938', 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9', 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063', 'https://github.com/snipe/snipe-it'}
null
{'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}
{'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}
Packagist
GHSA-m2jh-fxw4-gphm
HTTP Host Header Injection
### Meta * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5) ### Problem It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment. This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability. ### Solution Update your instance to TYPO3 version 11.5.0 which addresses the problem described. ### Credits Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015) * [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0
{'CVE-2021-41114'}
2021-10-05T18:47:01Z
2021-10-05T20:23:35Z
MODERATE
null
{'CWE-20', 'CWE-644'}
{'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm', 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114', 'https://typo3.org/security/advisory/typo3-core-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941', 'https://github.com/TYPO3/typo3'}
null
{'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'}
{'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'}
Packagist
GHSA-3374-7h99-xr85
Cross-site scripting in forkcms
Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.
{'CVE-2020-23049'}
2021-10-29T13:52:23Z
2021-10-25T19:43:05Z
MODERATE
null
{'CWE-79'}
{'https://www.vulnerability-lab.com/get_content.php?id=2208', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23049', 'https://github.com/forkcms/forkcms', 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}
null
{'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}
{'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}
Packagist
GHSA-x68c-4gmm-5g43
kimai2 is vulnerable to Cross-site Scripting
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3985'}
2021-12-03T15:19:53Z
2021-12-03T20:40:38Z
HIGH
null
{'CWE-79'}
{'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985', 'https://github.com/kevinpapst/kimai2', 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}
null
{'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'}
{'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'}
Packagist
GHSA-h7vq-5qgw-jwwq
CSV Injection Vulnerability
### Impact In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel. If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update. ### Patches This has been patched in Craft 3.7.14. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28 * https://twitter.com/craftcmsupdates/status/1442928690145366018 ### For more information If you have any questions or comments about this advisory, email us at support@craftcms.com ---------- Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli
{'CVE-2021-41824'}
2021-10-18T19:11:00Z
2021-10-18T19:04:16Z
HIGH
null
{'CWE-1236'}
{'https://github.com/craftcms/cms', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2', 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}
null
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}
{'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}
Packagist
GHSA-cpq8-x35g-m439
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling.
{'CVE-2021-3783'}
2021-09-16T18:19:29Z
2021-09-20T20:43:15Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984', 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783', 'https://github.com/yourls/yourls'}
null
{'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}
{'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'}
Packagist
GHSA-w4pj-7p68-3vgv
Stored XSS in October
### Impact A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field. ### Patches Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission. ### Workarounds Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin). ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
{'CVE-2020-11083'}
2021-03-04T18:26:22Z
2020-08-05T14:52:44Z
LOW
null
{'CWE-79'}
{'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'http://seclists.org/fulldisclosure/2020/Aug/2'}
null
{'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94'}
{'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'}
Packagist
GHSA-7vmw-7x57-q6jw
Cross-site scripting
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
{'CVE-2021-32713'}
2021-06-25T15:33:55Z
2021-09-08T18:00:00Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32713', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'}
null
{'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}
{'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}
Packagist
GHSA-m553-9wmx-533h
Cross-site scripting in Dolibarr
In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
{'CVE-2019-16197'}
2021-08-18T19:24:26Z
2019-11-08T20:05:31Z
MODERATE
null
{'CWE-79'}
{'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}
null
{'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}
{'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}
Packagist
GHSA-2v2v-fx7r-f2fh
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4082'}
2021-12-14T14:45:36Z
2021-12-16T14:28:10Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}
null
{'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}
{'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}
Packagist
GHSA-xgx2-332h-9x6q
SQL Injection in Yeswiki
An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0.
{'CVE-2021-43091'}
2022-03-30T15:24:00Z
2022-03-26T00:00:32Z
HIGH
null
{'CWE-89'}
{'https://github.com/yeswiki/yeswiki', 'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/'}
null
{'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'}
{'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'}
Packagist
GHSA-67c7-5v9j-227r
Cross-site Scripting in kimai2
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3983'}
2021-12-03T15:16:39Z
2021-12-03T20:43:06Z
MODERATE
null
{'CWE-79'}
{'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3983', 'https://github.com/kevinpapst/kimai2', 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}
null
{'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'}
{'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'}