ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Packagist
GHSA-vx6j-pjrh-vgjh
PHP file inclusion in the Sulu admin panel
### Impact _What kind of vulnerability is it? Who is impacted?_ An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution. * Compromised components: Arbitrary file read on the server, (Potential) Remote code execution * Exploitation pre-requisite: User account on the backend ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
{'CVE-2021-43836'}
2021-12-15T22:27:31Z
2021-12-15T22:54:20Z
HIGH
null
{'CWE-22'}
{'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836', 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu'}
null
{'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}
{'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}
Packagist
GHSA-rqgp-ccph-5w65
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3901'}
2021-11-02T18:42:29Z
2021-10-28T23:14:14Z
LOW
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2', 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901', 'https://github.com/firefly-iii/firefly-iii'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}
{'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}
Packagist
GHSA-93pj-4p65-qmr9
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
{'CVE-2022-0334'}
2022-02-02T16:13:31Z
2022-01-28T22:07:40Z
MODERATE
null
{'CWE-668', 'CWE-863'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2043664', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334', 'https://moodle.org/mod/forum/discuss.php?d=431102'}
null
{'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68'}
{'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84'}
Packagist
GHSA-55mm-5399-7r63
Reliance on Cookies without validation in OctoberCMS
### Impact Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding. Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them. ### Patches Issue has been patched in Build 468 (v1.0.468). >**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires). ### Workarounds Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468. ### References - https://blog.laravel.com/laravel-cookie-security-releases - https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9 ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat Assessment Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences. ### Acknowledgements Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team.
{'CVE-2020-15128'}
2021-03-04T18:25:42Z
2020-08-05T14:52:54Z
MODERATE
null
{'CWE-565', 'CWE-327'}
{'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c', 'https://github.com/octobercms/library/pull/508', 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}
null
{'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'}
{'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'}
Packagist
GHSA-6x98-fx9j-7c78
Disabled users able to log in with third party SSO plugin
### Impact Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address ### Patches Upgrade to 2.12.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2017-1000489'}
2021-01-19T21:13:44Z
2021-01-19T21:16:19Z
MODERATE
null
{'CWE-287'}
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489'}
null
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'}
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'}
Packagist
GHSA-wg8p-w946-c482
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0956'}
2022-03-29T16:42:37Z
2022-03-16T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2', 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956', 'https://github.com/star7th/showdoc'}
null
{'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}
{'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}
Packagist
GHSA-hj8g-cw8x-2c6m
Cross-site Scripting in Microweber
Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0719'}
2022-02-24T21:51:08Z
2022-02-24T00:00:53Z
HIGH
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719', 'https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'}
{'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'}
Packagist
GHSA-c9hq-g4q8-w893
Privilage Escalation in moodle
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25701'}
2021-03-24T23:17:02Z
2021-03-29T20:42:55Z
MODERATE
null
{'CWE-863'}
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413939', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895432'}
null
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}
Packagist
GHSA-mjvc-j6rv-9xj8
Insertion of Sensitive Information Into Debugging Code in Microweber
Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode.
{'CVE-2022-0721'}
2022-02-24T21:47:33Z
2022-02-24T00:00:54Z
HIGH
null
{'CWE-215'}
{'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0721', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb'}
null
{'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'}
{'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'}
Packagist
GHSA-32m2-9f76-4gv8
Business Logic Errors in SilverStripe Framework
SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors.
{'CVE-2022-0227'}
2022-02-11T20:51:39Z
2022-02-06T00:01:01Z
MODERATE
null
null
{'https://github.com/silverstripe/silverstripe-framework', 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227'}
null
{'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'}
{'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'}
Packagist
GHSA-8wf2-3ggj-78q9
Improper Authentication in phpmyadmin
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
{'CVE-2022-23807'}
2022-01-28T22:31:16Z
2022-01-28T22:44:40Z
MODERATE
null
{'CWE-287'}
{'https://github.com/phpmyadmin/phpmyadmin', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23807'}
null
{'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'}
{'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'}
Packagist
GHSA-4xww-6h7v-29jg
User enumeration in livehelperchat
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not.
{'CVE-2022-0083'}
2022-01-12T19:34:13Z
2022-01-21T23:37:07Z
MODERATE
null
{'CWE-209'}
{'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'}
{'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'}
Packagist
GHSA-728c-42pc-fwxg
Unrestricted Upload of File with Dangerous Type in Crater
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.
{'CVE-2022-0242'}
2022-01-19T14:08:43Z
2022-01-21T23:54:50Z
HIGH
null
{'CWE-434'}
{'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://github.com/crater-invoice/crater', 'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'}
null
{'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'}
{'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'}
Packagist
GHSA-gf2c-93hm-r9j5
Cross-site Scripting in kimai2
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates.
{'CVE-2021-3963'}
2021-11-22T18:42:37Z
2021-11-23T18:16:43Z
MODERATE
null
{'CWE-352'}
{'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8'}
null
{'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}
{'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}
Packagist
GHSA-h76r-vgf3-j6w5
Auth bypass and account takeover in October CMS
### Impact An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie. - To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing. - Due to the logic of how this mechanism works, a targeted user account must be logged in while the attacker is exploiting the vulnerability. - Authorization via persist cookie not shown in access logs. ### Patches - Issue has been patched in Build 472 and v1.1.5 - [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) ### Workarounds Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. [**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. ### Recommendations We recommend the following steps to make sure your server stays secure: - Keep server OS and system software up to date. - Keep October CMS software up to date. - Use a multi-factor authentication plugin. - Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. - Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. ### References Bugs found as part of Solar Security CMS Research. Credits to: • Andrey Basarygin • Andrey Guzei • Mikhail Khramenkov • Alexander Sidukov • Maxim Teplykh ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-29487'}
2022-01-20T15:39:14Z
2021-08-30T16:13:50Z
HIGH
null
{'CWE-287'}
{'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29487'}
null
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
Packagist
GHSA-x7cr-6qr6-2hh6
Missing input validation can lead to command execution in composer
The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used. This led to a vulnerability on Packagist.org and Private Packagist, i.e., using the composer.json `readme` field as a vector for injecting parameters into the `$file` argument for the Mercurial driver or via the `$identifier` argument for the Git and Mercurial drivers. Composer itself can be attacked through branch names by anyone controlling a Git or Mercurial repository, which is explicitly listed by URL in a project's composer.json. To the best of our knowledge, this was not actively exploited. The vulnerability has been patched on Packagist.org and Private Packagist within a day of the vulnerability report.
{'CVE-2022-24828'}
2022-04-22T20:15:38Z
2022-04-22T20:15:38Z
HIGH
null
{'CWE-94', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://www.tenable.com/security/tns-2022-09', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/', 'https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24828', 'https://github.com/composer/composer'}
null
{'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'}
{'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'}
Packagist
GHSA-xp82-jmw8-mjxp
Unrestricted Upload of File with Dangerous Type in ShowDoc
There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4.
{'CVE-2022-1034'}
2022-03-30T19:58:48Z
2022-03-23T00:00:23Z
HIGH
null
{'CWE-434'}
{'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7'}
null
{'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}
{'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}
Packagist
GHSA-24m3-w8g9-jwpq
Information disclosure of source code in SimpleSAMLphp
### Background The module controller in `SimpleSAML\Module` that processes requests for pages hosted by modules, has code to identify paths ending with `.php` and process those as PHP code. If no other suitable way of handling the given path exists it presents the file to the browser. ### Description The check to identify paths ending with `.php` does not account for uppercase letters. If someone requests a path ending with e.g. `.PHP` and the server is serving the code from a case-insensitive file system, such as on Windows, the processing of the PHP code does not occur, and the source code is instead presented to the browser. ### Affected versions SimpleSAMLphp versions **1.18.5 and older**. ### Impact An attacker may use this issue to gain access to the source code in third-party modules that is meant to be private, or even sensitive. However, the attack surface is considered small, as the attack will only work when SimpleSAMLphp serves such content from a file system that is not case-sensitive, such as on Windows. ### Resolution Upgrade the SimpleSAMLphp installation to version **1.18.6**. ### Credit This vulnerability was discovered and reported by Sławek Naczyński.
{'CVE-2020-5301'}
2021-10-20T22:23:05Z
2020-04-22T20:59:44Z
LOW
null
{'CWE-178', 'CWE-200'}
{'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/', 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
null
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
Packagist
GHSA-xc47-3rch-cv57
Improper Access Control in snipe-it
Users with no system permissions are able to see and create personal access tokens
{'CVE-2022-0178'}
2022-01-26T20:23:15Z
2022-01-26T20:24:23Z
MODERATE
null
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
null
{'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
{'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
Packagist
GHSA-7733-hjv6-4h47
Cross-Site Scripting in ternary conditional operator
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source:  This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following. ``` {showFullName ? fullName : defaultValue} ``` ### Solution Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5) * TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1) ### Credits Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)
{'CVE-2020-15241'}
2021-11-19T15:11:11Z
2020-10-08T19:55:53Z
MODERATE
null
{'CWE-79', 'CWE-601'}
{'https://github.com/TYPO3/Fluid', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'}
null
{'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}
{'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}
Packagist
GHSA-q2cv-94xm-qvg4
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3921'}
2021-11-17T21:12:31Z
2021-11-15T23:18:00Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5', 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://github.com/firefly-iii/firefly-iii'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}
Packagist
GHSA-m9fq-c9hp-59g7
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
{'CVE-2021-3785'}
2021-09-24T13:08:49Z
2021-09-20T20:42:52Z
MODERATE
null
{'CWE-79'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://github.com/yourls/yourls'}
null
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}
Packagist
GHSA-xw7v-qrhc-jjg2
Access Control vulnerability in Dolibarr
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
{'CVE-2021-37517'}
2022-04-18T22:21:50Z
2022-04-01T00:00:41Z
HIGH
null
{'CWE-863'}
{'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'}
null
{'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}
{'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}
Packagist
GHSA-6vfw-74wr-3chh
Cross-site Scripting in Crater Invoice
Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability.
{'CVE-2022-0372'}
2022-02-03T21:01:10Z
2022-01-28T00:03:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/pull/681'}
null
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
Packagist
GHSA-v94v-pxqp-5qgj
Cross-site Scripting in ShowDoc
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
{'CVE-2022-0950'}
2022-03-28T19:27:08Z
2022-03-16T00:00:48Z
MODERATE
null
{'CWE-79', 'CWE-434'}
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'}
null
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}
Packagist
GHSA-j8cx-j9j2-f29w
Insecure Storage of Sensitive Information in Microweber
Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software.
{'CVE-2022-0724'}
2022-02-24T22:27:40Z
2022-02-24T00:00:53Z
HIGH
null
{'CWE-922'}
{'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724'}
null
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}
Packagist
GHSA-q7rv-6hp3-vh96
Improper Input Validation in guzzlehttp/psr7
### Impact In proper header parsing. An attacker could sneak in a new line character and pass untrusted values. ### Patches The issue is patched in 1.8.4 and 2.1.1 ### Workarounds There are no known workarounds.
{'CVE-2022-24775'}
2022-03-25T19:26:33Z
2022-03-25T19:26:33Z
HIGH
null
{'CWE-20'}
{'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
null
{'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
{'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
Packagist
GHSA-wjfq-88q2-r34j
Unhandled exception when decoding form response JSON
### Impact When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`. An `InvalidArgumentException` is thrown by this function when it fails to fix an error found in the JSON, which is not caught by the caller. This leads to a server crash. ### Patches 56fe71d939c38fe14e18a31a673a9331bcc0e4ca ### Workarounds A plugin may handle `DataPacketReceiveEvent`, capture `ModalFormResponsePacket` and run the provided JSON through `stupid_json_decode`. Note that this requires copying the body of the function to a plugin, since the function is currently private. ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-01-21T21:16:09Z
2022-01-21T23:02:14Z
HIGH
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
{'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
Packagist
GHSA-q3j3-w37x-hq2q
Webcache Poisoning in symfony/http-kernel
Description ----------- When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks. In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue. Resolution ---------- Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3. Credits ------- We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue.
{'CVE-2021-41267'}
2021-11-25T00:18:27Z
2021-11-24T20:04:25Z
MODERATE
null
{'CWE-444'}
{'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41267'}
null
{'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}
{'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}
Packagist
GHSA-cx2r-mf6x-55rx
Stored XSS with custom URLs in PrestaShop module ps_linklist
### Impact Stored XSS when using custom URLs. ### Patches The problem is fixed in 3.1.0 ### References [Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-5273'}
2021-10-08T22:31:21Z
2021-10-12T16:01:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82', 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273', 'https://github.com/PrestaShop/ps_linklist'}
null
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}
Packagist
GHSA-pm3v-qxf6-fgxv
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.
{'CVE-2022-0285'}
2022-01-27T18:32:20Z
2022-01-21T18:08:43Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0285', 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835', 'https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c', 'https://github.com/pimcore/pimcore'}
null
{'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}
{'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}
Packagist
GHSA-8vq6-5f66-hp3r
Logic error in dolibarr/dolibarr
In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin.
{'CVE-2022-0746'}
2022-03-07T13:41:24Z
2022-02-26T00:00:44Z
MODERATE
null
null
{'https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd', 'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0746'}
null
{'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
{'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
Packagist
GHSA-wwgf-3xp7-cxj4
Potentially sensitive data exposure in Symfony Web Socket Bundle
### Impact Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (depending on the version of the bundle) the callback defined on a topic route is misconfigured, a `Gos\Bundle\WebSocketBundle\Topic\TopicInterface` implementation is not found for the callback, a topic which also implements `Gos\Bundle\WebSocketBundle\Topic\SecuredTopicInterface` rejects the connection, or an Exception is unhandled. This can result in an unintended broadcast to the websocket server potentially with data that should be considered sensitive. ### Patches In 1.10.4, 2.6.1, and 3.3.0, `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()` has been changed to no longer broadcast an event's data if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` fails. ### Workarounds Upgrade to 1.10.4, 2.6.1, and 3.3.0 Note, the 1.x branch is considered end of support as of July 1, 2020. ### For more information If you have any questions or comments about this advisory: * Open an issue in [this repository](https://github.com/GeniusesOfSymfony/WebSocketBundle)
null
2021-09-22T20:22:02Z
2020-07-07T16:33:45Z
MODERATE
null
{'CWE-200'}
{'https://github.com/GeniusesOfSymfony/WebSocketBundle', 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338', 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4', 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'}
null
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}
Packagist
GHSA-xxq4-3742-3h28
Generation of Error Message Containing Sensitive Information in microweber
microweber version 1.2.10 and prior may generate an error message containing sensitive information.
{'CVE-2022-0504'}
2022-02-09T22:23:35Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}
null
{'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}
{'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}
Packagist
GHSA-3c33-3465-fhx2
Exposure of Resource to Wrong Sphere in LibreNMS
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
{'CVE-2020-15877'}
2021-07-26T19:20:01Z
2021-09-08T17:27:16Z
HIGH
null
{'CWE-668'}
{'https://community.librenms.org/c/announcements', 'https://github.com/librenms/librenms/pull/11915', 'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c', 'https://github.com/librenms/librenms/compare/1.65...1.65.1', 'https://github.com/librenms/librenms/releases/tag/1.65.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15877', 'https://shielder.it/blog'}
null
{'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'}
{'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'}
Packagist
GHSA-455w-gv5p-wgg3
Cross-site Scripting in pimcore
pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules.
{'CVE-2022-0260'}
2022-01-26T22:10:34Z
2022-01-26T22:10:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11205', 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109', 'https://huntr.dev/bounties/89e4ab60-21ec-4396-92ad-5b78d4c2897e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260'}
null
{'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'}
{'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'}
Packagist
GHSA-4574-qv3w-fcmg
Deserialization of Untrusted Data in codeception/codeception
This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
{'CVE-2021-23420'}
2021-08-30T19:17:39Z
2021-09-01T18:36:15Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420', 'https://github.com/Codeception/Codeception/blob/4.1/CHANGELOG-4.x.md#4122', 'https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585', 'https://github.com/JinYiTong/poc', 'https://github.com/Codeception/Codeception/pull/6241', 'https://github.com/Codeception/Codeception'}
null
{'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71'}
{'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71'}
Packagist
GHSA-6r86-2jm9-9mh4
File upload restriction bypass in Zenario CMS
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
{'CVE-2022-23043'}
2022-03-04T21:39:12Z
2022-02-25T00:01:07Z
HIGH
null
{'CWE-434'}
{'https://fluidattacks.com/advisories/simone/', 'https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826', 'https://github.com/TribalSystems/Zenario', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043', 'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}
null
{'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}
{'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}
Packagist
GHSA-pc32-x737-74cv
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0704'}
2022-03-29T15:16:23Z
2022-03-17T00:00:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6'}
null
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
Packagist
GHSA-f884-gm86-cg3q
PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841
### Impact We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE. This vulnerability impacts - phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841) - phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers) ### Patches In the [security patch](https://github.com/PrestaShop/ps_facetedsearch/releases/tag/v3.4.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading. ### Workarounds Users can also simply remove the unwanted vendor/phpunit folder. ### References https://nvd.nist.gov/vuln/detail/CVE-2017-9841 ### For more information If you have any questions or comments about this advisory, email us at security@prestashop.com
null
2020-01-07T17:20:13Z
2020-01-07T17:20:47Z
HIGH
null
null
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca', 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'}
null
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'}
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'}
Packagist
GHSA-7r79-mrp6-8mhq
Rate limit missing in microweber
Microweber prior to version 1.3 does not rate limit password reset emails.
{'CVE-2022-0777'}
2022-03-10T16:00:56Z
2022-03-02T00:00:19Z
HIGH
null
{'CWE-640'}
{'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f', 'https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'}
{'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'}
Packagist
GHSA-xcr3-4qvr-54rh
Cross-site Scripting in Pimcore
Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip.
{'CVE-2022-1351'}
2022-04-22T20:46:44Z
2022-04-15T00:00:45Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1351', 'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac', 'https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615', 'https://github.com/pimcore/pimcore'}
null
{'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'}
{'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'}
Packagist
GHSA-x8wj-6m73-gfqp
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
### Impact The vulnerability was identified in the web service for a chunked file upload. While the names of the POST parameters vary with the used frontend, their values are always used in the same way to build a path where the chunks are stored and assembled temporarily. By not validating these parameters properly, OneupUploaderBundle is susceptible to a path traversal vulnerability which can be exploited to upload files to arbitrary folders on the filesystem. The assembly process can further be misused with some restrictions to delete and copy files to other locations. The vulnerability can be exploited by any users that have legitimate access to the upload functionality and can lead to arbitrary code execution, denial of service and disclosure of confidential information. ### Patches Yes, see version 1.9.3 and 2.1.5. ### References https://owasp.org/www-community/attacks/Path_Traversal ### Credits: This security vulnerability was found by Thibaud Kehler of SySS GmbH. E-Mail: thibaud.kehler@syss.de
{'CVE-2020-5237'}
2021-01-08T20:30:34Z
2020-02-18T18:59:24Z
HIGH
null
{'CWE-23', 'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5237', 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c', 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt'}
null
{'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}
{'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}
Packagist
GHSA-xh99-hw7h-wf63
Unchecked validity of Facing values in PlayerActionPacket
### Impact A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`). ### Patches f126479c37ff00a717a828f5271cf8e821d12d6c ### Workarounds Using a plugin, cancel `DataPacketReceiveEvent` if the packet is `PlayerActionPacket` and the facing is outside the range 0-5 when receiving START_BREAK or CRACK_BLOCK actions, or UseItemTransactionData. However, beware that negative values may be legitimate in some cases. ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-01-13T22:08:36Z
2022-01-13T22:25:44Z
HIGH
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63', 'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}
{'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}
Packagist
GHSA-qw36-p97w-vcqr
Cookie persistence after password changes in symfony/security-bundle
Description ----------- Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Resolution ---------- Symfony now makes the password part of the signature by default. In that way, when the password changes then the cookie is not valid anymore. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc) for branch 5.3. Credits ------- We would like to thank Thibaut Decherit for reporting the issue and Wouter J for fixing the issue.
{'CVE-2021-41268'}
2021-12-01T14:36:09Z
2021-11-24T20:05:22Z
MODERATE
null
{'CWE-384'}
{'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/symfony/symfony', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41268', 'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'}
null
{'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'}
{'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'}
Packagist
GHSA-jh5x-hfhg-78jq
Deserialization of Untrusted Data in Archive_Tar
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. See: https://github.com/pear/Archive_Tar/issues/33
{'CVE-2020-28948'}
2022-04-01T18:11:11Z
2021-04-22T16:20:50Z
HIGH
null
{'CWE-502'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://github.com/pear/Archive_Tar/issues/33', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948', 'https://github.com/pear/Archive_Tar', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://www.debian.org/security/2020/dsa-4817', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://security.gentoo.org/glsa/202101-23'}
null
{'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}
{'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}
Packagist
GHSA-8wcc-f2vq-h4gx
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed.
{'CVE-2022-0370'}
2022-02-03T20:34:04Z
2022-01-28T23:06:22Z
MODERATE
null
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca', 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0370'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'}
{'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'}
Packagist
GHSA-c697-r227-pq6h
Unrestricted Upload of File with Dangerous Type in pimcore
Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore
{'CVE-2022-0263'}
2022-01-25T20:47:39Z
2022-01-21T23:33:58Z
HIGH
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0263', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6', 'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}
null
{'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}
{'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}
Packagist
GHSA-gp6w-ccqv-p7qr
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3729'}
2021-08-24T20:06:36Z
2021-08-25T14:49:58Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3729', 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76', 'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712', 'https://github.com/firefly-iii/firefly-iii/'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'}
{'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'}
Packagist
GHSA-hx6g-q9v2-xh7v
Information exposure in elgg
elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'.
{'CVE-2021-3980'}
2021-12-06T22:01:08Z
2021-12-16T15:30:48Z
HIGH
null
{'CWE-359'}
{'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126', 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac', 'https://github.com/Elgg/Elgg/pull/13791', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980', 'https://github.com/Elgg/Elgg'}
null
{'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}
{'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}
Packagist
GHSA-p48w-vf3c-rqjx
Cross-Site Scripting in Bootstrap Package
### Problem It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. The following templates are affected by the vulnerability: * `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html` * `Resources/Private/Partials/ContentElements/Header/SubHeader.html` Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b). ### Solution Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
{'CVE-2021-21365'}
2021-04-27T19:43:14Z
2021-04-29T21:51:21Z
MODERATE
null
{'CWE-79'}
{'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
null
{'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
{'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
Packagist
GHSA-93wh-35r4-6qmw
Exposure of Sensitive Information to an Unauthorized Actor in moodle
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
{'CVE-2021-20281'}
2021-03-24T23:14:27Z
2021-03-29T20:43:23Z
MODERATE
null
{'CWE-200'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939041', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281'}
null
{'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}
{'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}
Packagist
GHSA-g475-pch5-6wvv
Authentication bypass in MAGMI
MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication.
{'CVE-2020-5777'}
2021-05-05T19:06:27Z
2021-05-06T18:54:35Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://www.tenable.com/security/research/tra-2020-51'}
null
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'}
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'}
Packagist
GHSA-wg4r-q74r-p7c8
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0941'}
2022-03-23T15:42:44Z
2022-03-15T00:01:03Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
null
{'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
{'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
Packagist
GHSA-xwjr-6fj7-fc6h
Local File Inclusion by unauthenticated users
### Impact An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. ### Patches Issue has been patched in Build 469 (v1.0.469) and v1.1.0. ### Workarounds Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469. ### References Reported by [ka1n4t](https://github.com/ka1n4t) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1105" alt="Screen Shot 2020-10-10 at 1 05 19 PM" src="https://user-images.githubusercontent.com/7253840/95663086-4ffc4780-0af9-11eb-9bb6-fd40cf11c033.png">
{'CVE-2020-15246'}
2021-11-19T13:46:03Z
2020-11-23T19:48:12Z
HIGH
null
{'CWE-863', 'CWE-22'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246'}
null
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
Packagist
GHSA-r5gm-4p5w-pq2p
Remote code execution in verot/class.upload.php
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
{'CVE-2019-19576'}
2021-08-19T16:24:46Z
2020-01-16T22:17:40Z
CRITICAL
null
{'CWE-434'}
{'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/jra89/CVE-2019-19576', 'http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html', 'https://www.verot.net/php_class_upload.htm', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19576', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3', 'https://www.verot.net'}
null
{'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'}
{'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124'}
Packagist
GHSA-97cc-825c-399g
Cross site scripting in remdex/livehelperchat
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4050'}
2021-12-09T18:07:18Z
2021-12-10T20:33:29Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}
{'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}
Packagist
GHSA-m5vx-8chx-qvmm
Form validation can be skipped
### Impact By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. ### Patches https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246 ### Workarounds Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. ### References This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567 Original report: https://tickets.neos.io/#ticket/zoom/411 (internal)
{'CVE-2021-32697'}
2021-07-29T14:34:11Z
2021-06-22T15:15:08Z
MODERATE
null
{'CWE-20'}
{'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm', 'https://github.com/neos/form/releases/tag/5.1.3'}
null
{'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'}
{'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'}
Packagist
GHSA-mrvj-7q4f-5p42
Cross-site scripting in eZ Platform Kernel
### Impact In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims. ### Patches The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at: https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109 ### Important note You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.
null
2021-03-19T19:56:16Z
2021-03-19T19:56:42Z
HIGH
null
{'CWE-79'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2'}
null
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}
Packagist
GHSA-jj8r-p9f5-fmvv
Cross-site Scripting in TYPO3 extension
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.
{'CVE-2021-36785'}
2021-08-30T17:07:59Z
2021-08-30T17:22:25Z
MODERATE
null
{'CWE-79'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://typo3.org/help/security-advisories/security', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso'}
null
{'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}
{'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}
Packagist
GHSA-hxmr-5gv9-6p8v
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0575'}
2022-02-24T13:06:37Z
2022-02-15T00:02:47Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54', 'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
null
{'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
{'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
Packagist
GHSA-g3h8-cg9x-47qw
PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby
### Impact An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel access *cannot* use this attack vector. ### Patches The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.4.5](https://github.com/getkirby/kirby/releases/tag/3.4.5). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. **Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14. ### Workarounds Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881). ### Credits Thanks to Thore Imhof of Accenture for reporting the problem.
{'CVE-2020-26255'}
2021-01-07T22:37:40Z
2020-12-08T14:42:08Z
LOW
null
{'CWE-434'}
{'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://packagist.org/packages/getkirby/panel', 'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26255', 'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881'}
null
{'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'}
{'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'}
Packagist
GHSA-mxr5-mc97-63rc
Account Takeover in Octobercms
### Impact An attacker can request an account password reset and then gain access to the account using a specially crafted request. - To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form. ### Patches - Issue has been patched in Build 472 and v1.1.5 - [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) ### Workarounds Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade. [**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here. ### Recommendations We recommend the following steps to make sure your server stays secure: - Keep server OS and system software up to date. - Keep October CMS software up to date. - Use a multi-factor authentication plugin. - Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area. - Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities. ### References Bugs found as part of Solar Security CMS Research. Credits to: • Andrey Basarygin • Andrey Guzei • Mikhail Khramenkov • Alexander Sidukov • Maxim Teplykh ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-32648'}
2022-02-23T22:21:06Z
2021-08-30T16:13:02Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
null
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
Packagist
GHSA-9f8f-574q-8jmf
Manipulation of product reviews via API
### Impact Manipulation of product reviews via API ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
{'CVE-2021-37707'}
2021-08-26T19:40:47Z
2021-08-30T16:14:00Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
null
{'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
{'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
Packagist
GHSA-cjw5-f2x5-r4q5
Cross-site Scripting in TastyIgniter
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
{'CVE-2022-0602'}
2022-04-19T14:12:53Z
2022-04-06T00:01:29Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0602', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://github.com/tastyigniter/TastyIgniter', 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'}
null
{'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}
{'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}
Packagist
GHSA-735v-wx75-xmmm
Cross-site Scripting in grav
In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering.
{'CVE-2022-0268'}
2022-01-31T21:45:04Z
2022-01-27T18:27:56Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
null
{'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
{'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
Packagist
GHSA-cchx-mfrc-fwqr
Improper authentication in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
{'CVE-2019-10911'}
2021-09-30T18:40:15Z
2020-02-12T18:45:08Z
HIGH
null
{'CWE-287', 'CWE-200'}
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911', 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash', 'https://github.com/symfony/symfony ', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml', 'https://symfony.com/cve-2019-10911', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19'}
null
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}
Packagist
GHSA-f9p3-h6cg-2cjr
Improper neutralization of formula elements in yii-helpers
Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.
{'CVE-2022-1544'}
2022-05-04T03:01:04Z
2022-05-03T00:00:46Z
HIGH
null
{'CWE-1236'}
{'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://github.com/luyadev/yii-helpers', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
null
{'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
{'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
Packagist
GHSA-7x2h-3v2v-24p9
Cross-Site Request Forgery in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site request forgery.
{'CVE-2022-0505'}
2022-02-14T22:33:33Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'}
null
{'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}
{'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}
Packagist
GHSA-jq4p-mq33-w375
Cross-site Scripting when rendering error messages in laminas-form
### Impact When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Site Scripting (XSS) attack. ### Patches The following versions were issued to mitigate the vulnerability: - 2.17.1 - 3.0.2 - 3.1.1 ### Workarounds At the top of a view script where you call the `formElementErrors()` view helper, place the following code: ```php use Laminas\Form\ElementInterface; use Laminas\View\PhpRenderer; $escapeMessages = function (ElementInterface $formOrElement, PhpRenderer $renderer): void { $messages = $element->getMessages(); if (! $messages) { return; } $escaped = []; array_walk_recursive( $messages, static function (string $item) use (&$escaped, $renderer): void { $escaped[] = $renderer->escapeHtml($item); } }; $element->setMessages($escaped); }; ``` Before calling `formElementErrors()` with a form, fieldset, or element, call the above closure as follows ```php // Usage with a form // $this is the view renderer $escapeMessages($form, $this); // Usage with a fieldset // $this is the view renderer $escapeMessages($fieldset, $this); // Usage with a form element // $this is the view renderer $escapeMessages($element, $this); ``` ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/laminas/laminas-form/issues/new) * Email us at [security@getlaminas.org](mailto:security@getlaminas.org)
{'CVE-2022-23598'}
2022-02-07T21:16:31Z
2022-01-28T23:08:29Z
MODERATE
null
{'CWE-79'}
{'https://github.com/laminas/laminas-form/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598', 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://getlaminas.org/security/advisory/LP-2022-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFF6WJ5I7PSEBRF6I753WKE2BXFBGQXE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLNABVK26CE4PFL57VLY242FW3QY4CPC/'}
null
{'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}
{'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}
Packagist
GHSA-75p7-527p-w8wp
Server-Side Request Forgery and Open Redirect in AllTube Download
### Impact On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) ### Patches 3.0.3 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) The fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/3d092891044f2685ed66c73c870a021bee319c37/patches/youtube-dl-disable-generic.diff) to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched. However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**. ### References * https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a * https://github.com/ytdl-org/youtube-dl/issues/30691
{'CVE-2022-24739'}
2022-03-09T20:13:46Z
2022-03-09T15:17:31Z
HIGH
null
{'CWE-918', 'CWE-601'}
{'https://github.com/Rudloff/alltube', 'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp'}
null
{'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
{'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'}
Packagist
GHSA-f77h-m9w2-vvg2
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4017'}
2021-12-02T20:24:56Z
2021-12-03T20:38:57Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4017', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
null
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
Packagist
GHSA-356r-77q8-f64f
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1
{'CVE-2021-3819'}
2021-09-30T18:35:17Z
2021-09-29T17:12:37Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5', 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9', 'https://github.com/firefly-iii/firefly-iii'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}
{'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}
Packagist
GHSA-738m-f33v-qc2r
SMTP Injection in PHPMailer
### Impact Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts. ### Patches Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0). ### Workarounds Manually strip line breaks from email addresses before passing them to PHPMailer. ### References https://nvd.nist.gov/vuln/detail/CVE-2015-8476 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2015-8476'}
2020-03-05T21:57:18Z
2020-03-05T22:09:19Z
LOW
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.securityfocus.com/bid/78619', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://www.openwall.com/lists/oss-security/2015/12/05/1', 'http://www.debian.org/security/2015/dsa-3416', 'http://www.openwall.com/lists/oss-security/2015/12/04/5', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html'}
null
{'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
{'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
Packagist
GHSA-4286-h47h-m5v6
Improper Authentication in showdoc
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
{'CVE-2021-41745'}
2021-10-25T18:46:11Z
2021-10-25T19:43:24Z
HIGH
null
{'CWE-434', 'CWE-287'}
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability'}
null
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}
Packagist
GHSA-6fmv-q269-55cw
Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit template. Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by Aquilao Null
{'CVE-2020-15277'}
2021-01-08T21:18:07Z
2020-10-30T17:05:59Z
HIGH
null
{'CWE-434', 'CWE-74'}
{'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
null
{'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
{'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
Packagist
GHSA-jmhf-9fj8-88gh
Open Redirect in AllTube
### Impact Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain. ### Patches 3.0.1 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) ### References * https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a * https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203/ * https://nvd.nist.gov/vuln/detail/CVE-2022-0692
{'CVE-2022-0692'}
2022-03-02T21:07:57Z
2022-02-23T21:15:01Z
MODERATE
null
{'CWE-601'}
{'https://github.com/Rudloff/alltube', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
null
{'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
{'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
Packagist
GHSA-c53v-qmrx-93hg
Open redirect in shopware
### Impact Arbitrary redirect while using certain URLs ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
{'CVE-2022-21651'}
2022-01-06T20:18:17Z
2022-01-06T23:49:19Z
MODERATE
null
{'CWE-601'}
{'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
null
{'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
{'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
Packagist
GHSA-rpg7-q4cv-p466
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4123'}
2022-01-04T18:52:37Z
2021-12-17T20:00:16Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}
{'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}
Packagist
GHSA-q3x2-jvp3-wj78
Unrestricted XML files leading to cross-site scripting in Microweber
Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack.
{'CVE-2022-0963'}
2022-03-29T15:42:17Z
2022-03-16T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'}
null
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}
Packagist
GHSA-9pgx-gcph-mpqr
XSS via the history parameter in SQL command
### Impact Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected. ### Patches Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). ### Workarounds Use browser which encodes URL parameters (e.g. Chrome or Firefox). ### References https://sourceforge.net/p/adminer/bugs-and-features/775/ ### For more information If you have any questions or comments about this advisory: * Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/
{'CVE-2020-35572'}
2021-10-06T21:19:31Z
2021-02-11T20:42:28Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd', 'https://sourceforge.net/p/adminer/news/', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr', 'https://github.com/vrana/adminer'}
null
{'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
{'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
Packagist
GHSA-2p6g-gjp8-ggg9
Validation bypass in personnummer
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-11T16:41:24Z
2020-09-09T17:29:34Z
LOW
null
null
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'}
null
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'}
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'}
Packagist
GHSA-vrgp-3ph6-2wwq
SQL Injection in Dolibarr
An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.
{'CVE-2021-36625'}
2022-04-13T14:57:08Z
2022-04-01T00:00:41Z
HIGH
null
{'CWE-89'}
{'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
null
{'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
{'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
Packagist
GHSA-389p-fchr-q2mg
Path Traversal in ImpressCMS
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
{'CVE-2022-24977'}
2022-02-25T17:59:00Z
2022-02-15T00:02:47Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/ImpressCMS/impresscms', 'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://r0.haxors.org/posts?id=8'}
null
{'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}
{'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}
Packagist
GHSA-g92x-8m54-p89v
Cross-Site Request Forgery in snipe-it
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3858'}
2021-10-22T13:56:56Z
2021-10-21T17:48:55Z
MODERATE
null
{'CWE-352'}
{'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'}
null
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}
Packagist
GHSA-jx5q-g37m-h5hj
Client-Side JavaScript Prototype Pollution in oro/platform
### Summary By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. ### Workarounds Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype`
{'CVE-2021-43852'}
2022-01-04T22:46:13Z
2022-01-06T18:29:51Z
MODERATE
null
{'CWE-74', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43852', 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://github.com/oroinc/platform'}
null
{'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}
{'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}
Packagist
GHSA-7322-jrq4-x5hf
File reference keys leads to incorrect hashes on HMAC algorithms
### Impact Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly. ### Patches All versions have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative. ### Workarounds Use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of your keys: ```diff -use Lcobucci\JWT\Signer\Key\LocalFileReference; +use Lcobucci\JWT\Signer\Key\InMemory; -$key = LocalFileReference::file(__DIR__ . '/public-key.pem'); +$key = InMemory::file(__DIR__ . '/public-key.pem'); ```
{'CVE-2021-41106'}
2021-09-29T18:04:31Z
2021-09-29T17:09:40Z
MODERATE
null
{'CWE-345'}
{'https://github.com/lcobucci/jwt', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'}
null
{'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}
{'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}
Packagist
GHSA-9vwf-54m9-gc4f
snipe-it is vulnerable to Improper Access Control
snipe-it is vulnerable to Improper Access Control
{'CVE-2021-4089'}
2021-12-15T15:21:35Z
2021-12-16T14:32:39Z
MODERATE
null
{'CWE-863', 'CWE-284'}
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://github.com/snipe/snipe-it', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'}
null
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}
Packagist
GHSA-rphc-h572-2x9f
Cross-site Scripting in showdoc/showdoc
ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently no known workaround.
{'CVE-2022-0960'}
2022-03-24T22:38:55Z
2022-03-15T00:00:55Z
CRITICAL
null
{'CWE-79', 'CWE-434'}
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e'}
null
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}
Packagist
GHSA-wwgq-9jhf-qgw6
Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys
### Impact Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: * Sending a test email. * Generating a node auto-deployment token. At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system. ### Patches This has been addressed in https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 which will be released as `1.6.6`. ### Workarounds Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.
{'CVE-2021-41273'}
2021-11-17T21:08:25Z
2021-11-18T15:46:57Z
MODERATE
null
{'CWE-352'}
{'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel'}
null
{'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}
{'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}
Packagist
GHSA-wc7v-77jr-5c3m
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3944'}
2021-12-03T15:35:34Z
2021-12-03T20:38:37Z
LOW
null
{'CWE-352'}
{'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9', 'https://github.com/bookstackapp/bookstack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944', 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
null
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
Packagist
GHSA-vwxp-9qmf-w299
Cross-site Scripting in LiveHelperChat
LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93.
{'CVE-2022-0394'}
2022-02-03T19:18:02Z
2022-02-01T00:49:48Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
{'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
Packagist
GHSA-rfjc-xrmf-5vvw
Privilege escalation by backend users assigned to the default "Publisher" system role
### Impact Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. ### Patches Issue has been patched in Build 470 (v1.0.470) & v1.1.1. ### Workarounds Apply https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829 to your installation manually if unable to upgrade to Build 470 or v1.1.1. ### References Reported by [Hoan Hoang](https://github.com/hoanhp) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1098" alt="Screen Shot 2020-10-10 at 1 37 25 PM" src="https://user-images.githubusercontent.com/7253840/95663611-e6326c80-0afd-11eb-8a1e-8b767a7202fb.png">
{'CVE-2020-15248'}
2021-11-19T13:40:25Z
2020-11-23T19:47:27Z
LOW
null
{'CWE-863', 'CWE-269'}
{'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15248'}
null
{'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}
{'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'}
Packagist
GHSA-xp5q-77mh-6hm2
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3728'}
2021-08-24T20:02:07Z
2021-08-25T14:50:17Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'}
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'}
Packagist
GHSA-3wwj-wh2w-g4xp
CRLF Injection in microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0666'}
2022-02-23T15:04:54Z
2022-02-19T00:01:35Z
HIGH
null
{'CWE-93'}
{'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}
{'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}
Packagist
GHSA-4p92-fv6v-fhfj
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0723'}
2022-03-09T20:43:44Z
2022-02-27T00:00:15Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'}
null
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}
Packagist
GHSA-j5qg-w9jg-3wg3
Inability to de-op players if listed in ops.txt with non-lowercase letters
### Impact Originally reported in iTXTech/Genisys#1188 ```txt PotterHarry98 potterharry98 ``` `deop PotterHarry98` will remove `potterharry98` from the ops.txt but not `PotterHarry98`. Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449 This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters. ### Patches 4d37b79ff7f9d9452e988387f97919a9a1c4954e ### Workarounds This can be easily addressed by removing the offending lines from ops.txt manually. ### For more information If you have any questions or comments about this advisory: * Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP) * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2021-12-16T15:47:47Z
2021-12-16T18:53:57Z
LOW
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisys/issues/1188'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}
Packagist
GHSA-qv7g-j98v-8pp7
XSS vulnerability on email template preview page
### Summary Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template. ### Workarounds There are no workarounds that address this vulnerability.
{'CVE-2021-41236'}
2022-01-04T17:51:41Z
2022-01-06T18:34:35Z
MODERATE
null
{'CWE-79'}
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'}
null
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
Packagist
GHSA-579x-cjvr-cqj9
Observable Response Discrepancy in Lost Password Service
### Impact It is possible to enumerate usernames via the forgot password functionality ### Patches Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
{'CVE-2021-39189'}
2021-09-17T18:38:47Z
2021-09-20T19:53:55Z
MODERATE
null
{'CWE-203', 'CWE-204'}
{'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/', 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}
null
{'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}
{'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}
Packagist
GHSA-mr6r-82x4-f4jj
Timing attacks might allow practical recovery of the long-term private key
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical recovery of the long-term private key.
{'CVE-2019-10764'}
2021-08-18T22:40:49Z
2019-11-20T01:34:50Z
HIGH
null
{'CWE-203'}
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://minerva.crocs.fi.muni.cz/', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'}
null
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}