ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist | GHSA-vx6j-pjrh-vgjh | PHP file inclusion in the Sulu admin panel | ### Impact
_What kind of vulnerability is it? Who is impacted?_
An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.
* Compromised components: Arbitrary file read on the server, (Potential) Remote code execution
* Exploitation pre-requisite: User account on the backend
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
| {'CVE-2021-43836'} | 2021-12-15T22:27:31Z | 2021-12-15T22:54:20Z | HIGH | null | {'CWE-22'} | {'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836', 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu'} | null | {'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'} | {'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'} |
Packagist | GHSA-rqgp-ccph-5w65 | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3901'} | 2021-11-02T18:42:29Z | 2021-10-28T23:14:14Z | LOW | null | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2', 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901', 'https://github.com/firefly-iii/firefly-iii'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'} | {'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'} |
Packagist | GHSA-93pj-4p65-qmr9 | Insufficient user authorization in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability. | {'CVE-2022-0334'} | 2022-02-02T16:13:31Z | 2022-01-28T22:07:40Z | MODERATE | null | {'CWE-668', 'CWE-863'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=2043664', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334', 'https://moodle.org/mod/forum/discuss.php?d=431102'} | null | {'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68'} | {'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84'} |
Packagist | GHSA-55mm-5399-7r63 | Reliance on Cookies without validation in OctoberCMS | ### Impact
Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding.
Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them.
### Patches
Issue has been patched in Build 468 (v1.0.468).
>**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires).
### Workarounds
Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468.
### References
- https://blog.laravel.com/laravel-cookie-security-releases
- https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences.
### Acknowledgements
Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team. | {'CVE-2020-15128'} | 2021-03-04T18:25:42Z | 2020-08-05T14:52:54Z | MODERATE | null | {'CWE-565', 'CWE-327'} | {'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c', 'https://github.com/octobercms/library/pull/508', 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'} | null | {'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'} | {'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'} |
Packagist | GHSA-6x98-fx9j-7c78 | Disabled users able to log in with third party SSO plugin | ### Impact
Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | {'CVE-2017-1000489'} | 2021-01-19T21:13:44Z | 2021-01-19T21:16:19Z | MODERATE | null | {'CWE-287'} | {'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489'} | null | {'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'} | {'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'} |
Packagist | GHSA-wg8p-w946-c482 | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | {'CVE-2022-0956'} | 2022-03-29T16:42:37Z | 2022-03-16T00:00:47Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2', 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956', 'https://github.com/star7th/showdoc'} | null | {'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'} | {'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'} |
Packagist | GHSA-hj8g-cw8x-2c6m | Cross-site Scripting in Microweber | Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting. | {'CVE-2022-0719'} | 2022-02-24T21:51:08Z | 2022-02-24T00:00:53Z | HIGH | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719', 'https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'} | {'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'} |
Packagist | GHSA-c9hq-g4q8-w893 | Privilage Escalation in moodle | If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10. | {'CVE-2020-25701'} | 2021-03-24T23:17:02Z | 2021-03-29T20:42:55Z | MODERATE | null | {'CWE-863'} | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413939', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895432'} | null | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} |
Packagist | GHSA-mjvc-j6rv-9xj8 | Insertion of Sensitive Information Into Debugging Code in Microweber | Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode. | {'CVE-2022-0721'} | 2022-02-24T21:47:33Z | 2022-02-24T00:00:54Z | HIGH | null | {'CWE-215'} | {'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0721', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb'} | null | {'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'} | {'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'} |
Packagist | GHSA-32m2-9f76-4gv8 | Business Logic Errors in SilverStripe Framework | SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors. | {'CVE-2022-0227'} | 2022-02-11T20:51:39Z | 2022-02-06T00:01:01Z | MODERATE | null | null | {'https://github.com/silverstripe/silverstripe-framework', 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227'} | null | {'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'} | {'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'} |
Packagist | GHSA-8wf2-3ggj-78q9 | Improper Authentication in phpmyadmin | An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. | {'CVE-2022-23807'} | 2022-01-28T22:31:16Z | 2022-01-28T22:44:40Z | MODERATE | null | {'CWE-287'} | {'https://github.com/phpmyadmin/phpmyadmin', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23807'} | null | {'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'} | {'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'} |
Packagist | GHSA-4xww-6h7v-29jg | User enumeration in livehelperchat | livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not. | {'CVE-2022-0083'} | 2022-01-12T19:34:13Z | 2022-01-21T23:37:07Z | MODERATE | null | {'CWE-209'} | {'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'} | {'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'} |
Packagist | GHSA-728c-42pc-fwxg | Unrestricted Upload of File with Dangerous Type in Crater | Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0. | {'CVE-2022-0242'} | 2022-01-19T14:08:43Z | 2022-01-21T23:54:50Z | HIGH | null | {'CWE-434'} | {'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://github.com/crater-invoice/crater', 'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'} | null | {'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'} | {'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'} |
Packagist | GHSA-gf2c-93hm-r9j5 | Cross-site Scripting in kimai2 | kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates. | {'CVE-2021-3963'} | 2021-11-22T18:42:37Z | 2021-11-23T18:16:43Z | MODERATE | null | {'CWE-352'} | {'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8'} | null | {'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'} | {'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'} |
Packagist | GHSA-h76r-vgf3-j6w5 | Auth bypass and account takeover in October CMS | ### Impact
An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie.
- To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing.
- Due to the logic of how this mechanism works, a targeted user account must be logged in while
the attacker is exploiting the vulnerability.
- Authorization via persist cookie not shown in access logs.
### Patches
- Issue has been patched in Build 472 and v1.1.5
- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
### Workarounds
Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
### Recommendations
We recommend the following steps to make sure your server stays secure:
- Keep server OS and system software up to date.
- Keep October CMS software up to date.
- Use a multi-factor authentication plugin.
- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
### References
Bugs found as part of Solar Security CMS Research. Credits to:
• Andrey Basarygin
• Andrey Guzei
• Mikhail Khramenkov
• Alexander Sidukov
• Maxim Teplykh
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
| {'CVE-2021-29487'} | 2022-01-20T15:39:14Z | 2021-08-30T16:13:50Z | HIGH | null | {'CWE-287'} | {'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29487'} | null | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} |
Packagist | GHSA-x7cr-6qr6-2hh6 | Missing input validation can lead to command execution in composer | The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used.
This led to a vulnerability on Packagist.org and Private Packagist, i.e., using the composer.json `readme` field as a vector for injecting parameters into the `$file` argument for the Mercurial driver or via the `$identifier` argument for the Git and Mercurial drivers.
Composer itself can be attacked through branch names by anyone controlling a Git or Mercurial repository, which is explicitly listed by URL in a project's composer.json.
To the best of our knowledge, this was not actively exploited. The vulnerability has been patched on Packagist.org and Private Packagist within a day of the vulnerability report. | {'CVE-2022-24828'} | 2022-04-22T20:15:38Z | 2022-04-22T20:15:38Z | HIGH | null | {'CWE-94', 'CWE-20'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://www.tenable.com/security/tns-2022-09', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/', 'https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24828', 'https://github.com/composer/composer'} | null | {'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'} | {'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'} |
Packagist | GHSA-xp82-jmw8-mjxp | Unrestricted Upload of File with Dangerous Type in ShowDoc | There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4. | {'CVE-2022-1034'} | 2022-03-30T19:58:48Z | 2022-03-23T00:00:23Z | HIGH | null | {'CWE-434'} | {'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7'} | null | {'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'} | {'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'} |
Packagist | GHSA-24m3-w8g9-jwpq | Information disclosure of source code in SimpleSAMLphp | ### Background
The module controller in `SimpleSAML\Module` that processes requests for pages
hosted by modules, has code to identify paths ending with `.php` and process
those as PHP code. If no other suitable way of handling the given path exists it
presents the file to the browser.
### Description
The check to identify paths ending with `.php` does not account for uppercase
letters. If someone requests a path ending with e.g. `.PHP` and the server is
serving the code from a case-insensitive file system, such as on Windows, the
processing of the PHP code does not occur, and the source code is instead
presented to the browser.
### Affected versions
SimpleSAMLphp versions **1.18.5 and older**.
### Impact
An attacker may use this issue to gain access to the source code in third-party
modules that is meant to be private, or even sensitive. However, the attack
surface is considered small, as the attack will only work when SimpleSAMLphp
serves such content from a file system that is not case-sensitive, such as on
Windows.
### Resolution
Upgrade the SimpleSAMLphp installation to version **1.18.6**.
### Credit
This vulnerability was discovered and reported by Sławek Naczyński. | {'CVE-2020-5301'} | 2021-10-20T22:23:05Z | 2020-04-22T20:59:44Z | LOW | null | {'CWE-178', 'CWE-200'} | {'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/', 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'} | null | {'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'} | {'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'} |
Packagist | GHSA-xc47-3rch-cv57 | Improper Access Control in snipe-it | Users with no system permissions are able to see and create personal access tokens | {'CVE-2022-0178'} | 2022-01-26T20:23:15Z | 2022-01-26T20:24:23Z | MODERATE | null | {'CWE-284'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'} | null | {'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'} | {'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'} |
Packagist | GHSA-7733-hjv6-4h47 | Cross-Site Scripting in ternary conditional operator | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0)
> * CWE-79
---
:information_source: This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020
---
### Problem
It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following.
```
{showFullName ? fullName : defaultValue}
```
### Solution
Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described.
Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:
* TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5)
* TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1)
### Credits
Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.
### References
* [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013) | {'CVE-2020-15241'} | 2021-11-19T15:11:11Z | 2020-10-08T19:55:53Z | MODERATE | null | {'CWE-79', 'CWE-601'} | {'https://github.com/TYPO3/Fluid', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'} | null | {'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'} | {'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'} |
Packagist | GHSA-q2cv-94xm-qvg4 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3921'} | 2021-11-17T21:12:31Z | 2021-11-15T23:18:00Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5', 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://github.com/firefly-iii/firefly-iii'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'} | {'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'} |
Packagist | GHSA-m9fq-c9hp-59g7 | Cross-site Scripting in yourls | yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog. | {'CVE-2021-3785'} | 2021-09-24T13:08:49Z | 2021-09-20T20:42:52Z | MODERATE | null | {'CWE-79'} | {'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://github.com/yourls/yourls'} | null | {'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'} | {'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'} |
Packagist | GHSA-xw7v-qrhc-jjg2 | Access Control vulnerability in Dolibarr | An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service. | {'CVE-2021-37517'} | 2022-04-18T22:21:50Z | 2022-04-01T00:00:41Z | HIGH | null | {'CWE-863'} | {'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'} | null | {'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'} | {'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'} |
Packagist | GHSA-6vfw-74wr-3chh | Cross-site Scripting in Crater Invoice | Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability. | {'CVE-2022-0372'} | 2022-02-03T21:01:10Z | 2022-01-28T00:03:42Z | MODERATE | null | {'CWE-79'} | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/pull/681'} | null | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'} | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'} |
Packagist | GHSA-v94v-pxqp-5qgj | Cross-site Scripting in ShowDoc | The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting. | {'CVE-2022-0950'} | 2022-03-28T19:27:08Z | 2022-03-16T00:00:48Z | MODERATE | null | {'CWE-79', 'CWE-434'} | {'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'} | null | {'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'} | {'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'} |
Packagist | GHSA-j8cx-j9j2-f29w | Insecure Storage of Sensitive Information in Microweber | Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software. | {'CVE-2022-0724'} | 2022-02-24T22:27:40Z | 2022-02-24T00:00:53Z | HIGH | null | {'CWE-922'} | {'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724'} | null | {'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'} | {'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'} |
Packagist | GHSA-q7rv-6hp3-vh96 | Improper Input Validation in guzzlehttp/psr7 | ### Impact
In proper header parsing. An attacker could sneak in a new line character and pass untrusted values.
### Patches
The issue is patched in 1.8.4 and 2.1.1
### Workarounds
There are no known workarounds.
| {'CVE-2022-24775'} | 2022-03-25T19:26:33Z | 2022-03-25T19:26:33Z | HIGH | null | {'CWE-20'} | {'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'} | null | {'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'} | {'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'} |
Packagist | GHSA-wjfq-88q2-r34j | Unhandled exception when decoding form response JSON | ### Impact
When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`.
An `InvalidArgumentException` is thrown by this function when it fails to fix an error found in the JSON, which is not caught by the caller. This leads to a server crash.
### Patches
56fe71d939c38fe14e18a31a673a9331bcc0e4ca
### Workarounds
A plugin may handle `DataPacketReceiveEvent`, capture `ModalFormResponsePacket` and run the provided JSON through `stupid_json_decode`.
Note that this requires copying the body of the function to a plugin, since the function is currently private.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-01-21T21:16:09Z | 2022-01-21T23:02:14Z | HIGH | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'} | {'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'} |
Packagist | GHSA-q3j3-w37x-hq2q | Webcache Poisoning in symfony/http-kernel | Description
-----------
When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks.
In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue.
Resolution
----------
Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3.
Credits
-------
We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue.
| {'CVE-2021-41267'} | 2021-11-25T00:18:27Z | 2021-11-24T20:04:25Z | MODERATE | null | {'CWE-444'} | {'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41267'} | null | {'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'} | {'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'} |
Packagist | GHSA-cx2r-mf6x-55rx | Stored XSS with custom URLs in PrestaShop module ps_linklist | ### Impact
Stored XSS when using custom URLs.
### Patches
The problem is fixed in 3.1.0
### References
[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html) | {'CVE-2020-5273'} | 2021-10-08T22:31:21Z | 2021-10-12T16:01:36Z | MODERATE | null | {'CWE-79'} | {'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82', 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273', 'https://github.com/PrestaShop/ps_linklist'} | null | {'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'} | {'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'} |
Packagist | GHSA-pm3v-qxf6-fgxv | Cross-site Scripting in pimcore | Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9. | {'CVE-2022-0285'} | 2022-01-27T18:32:20Z | 2022-01-21T18:08:43Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0285', 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835', 'https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c', 'https://github.com/pimcore/pimcore'} | null | {'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'} | {'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'} |
Packagist | GHSA-8vq6-5f66-hp3r | Logic error in dolibarr/dolibarr | In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin. | {'CVE-2022-0746'} | 2022-03-07T13:41:24Z | 2022-02-26T00:00:44Z | MODERATE | null | null | {'https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd', 'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0746'} | null | {'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'} | {'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'} |
Packagist | GHSA-wwgf-3xp7-cxj4 | Potentially sensitive data exposure in Symfony Web Socket Bundle | ### Impact
Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (depending on the version of the bundle) the callback defined on a topic route is misconfigured, a `Gos\Bundle\WebSocketBundle\Topic\TopicInterface` implementation is not found for the callback, a topic which also implements `Gos\Bundle\WebSocketBundle\Topic\SecuredTopicInterface` rejects the connection, or an Exception is unhandled. This can result in an unintended broadcast to the websocket server potentially with data that should be considered sensitive.
### Patches
In 1.10.4, 2.6.1, and 3.3.0, `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()` has been changed to no longer broadcast an event's data if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` fails.
### Workarounds
Upgrade to 1.10.4, 2.6.1, and 3.3.0
Note, the 1.x branch is considered end of support as of July 1, 2020.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repository](https://github.com/GeniusesOfSymfony/WebSocketBundle) | null | 2021-09-22T20:22:02Z | 2020-07-07T16:33:45Z | MODERATE | null | {'CWE-200'} | {'https://github.com/GeniusesOfSymfony/WebSocketBundle', 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338', 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4', 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'} | null | {'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'} | {'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'} |
Packagist | GHSA-xxq4-3742-3h28 | Generation of Error Message Containing Sensitive Information in microweber | microweber version 1.2.10 and prior may generate an error message containing sensitive information. | {'CVE-2022-0504'} | 2022-02-09T22:23:35Z | 2022-02-09T00:00:31Z | MODERATE | null | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'} | null | {'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'} | {'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'} |
Packagist | GHSA-3c33-3465-fhx2 | Exposure of Resource to Wrong Sphere in LibreNMS | An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php. | {'CVE-2020-15877'} | 2021-07-26T19:20:01Z | 2021-09-08T17:27:16Z | HIGH | null | {'CWE-668'} | {'https://community.librenms.org/c/announcements', 'https://github.com/librenms/librenms/pull/11915', 'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c', 'https://github.com/librenms/librenms/compare/1.65...1.65.1', 'https://github.com/librenms/librenms/releases/tag/1.65.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15877', 'https://shielder.it/blog'} | null | {'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'} | {'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'} |
Packagist | GHSA-455w-gv5p-wgg3 | Cross-site Scripting in pimcore | pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules. | {'CVE-2022-0260'} | 2022-01-26T22:10:34Z | 2022-01-26T22:10:48Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11205', 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109', 'https://huntr.dev/bounties/89e4ab60-21ec-4396-92ad-5b78d4c2897e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260'} | null | {'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'} | {'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'} |
Packagist | GHSA-4574-qv3w-fcmg | Deserialization of Untrusted Data in codeception/codeception | This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation. | {'CVE-2021-23420'} | 2021-08-30T19:17:39Z | 2021-09-01T18:36:15Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420', 'https://github.com/Codeception/Codeception/blob/4.1/CHANGELOG-4.x.md#4122', 'https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585', 'https://github.com/JinYiTong/poc', 'https://github.com/Codeception/Codeception/pull/6241', 'https://github.com/Codeception/Codeception'} | null | {'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71'} | {'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71'} |
Packagist | GHSA-6r86-2jm9-9mh4 | File upload restriction bypass in Zenario CMS | Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server. | {'CVE-2022-23043'} | 2022-03-04T21:39:12Z | 2022-02-25T00:01:07Z | HIGH | null | {'CWE-434'} | {'https://fluidattacks.com/advisories/simone/', 'https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826', 'https://github.com/TribalSystems/Zenario', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043', 'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'} | null | {'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'} | {'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'} |
Packagist | GHSA-pc32-x737-74cv | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0704'} | 2022-03-29T15:16:23Z | 2022-03-17T00:00:48Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6'} | null | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} |
Packagist | GHSA-f884-gm86-cg3q | PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841 | ### Impact
We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
### Patches
In the [security patch](https://github.com/PrestaShop/ps_facetedsearch/releases/tag/v3.4.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
### Workarounds
Users can also simply remove the unwanted vendor/phpunit folder.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-9841
### For more information
If you have any questions or comments about this advisory, email us at security@prestashop.com | null | 2020-01-07T17:20:13Z | 2020-01-07T17:20:47Z | HIGH | null | null | {'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca', 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'} | null | {'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'} | {'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'} |
Packagist | GHSA-7r79-mrp6-8mhq | Rate limit missing in microweber | Microweber prior to version 1.3 does not rate limit password reset emails. | {'CVE-2022-0777'} | 2022-03-10T16:00:56Z | 2022-03-02T00:00:19Z | HIGH | null | {'CWE-640'} | {'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f', 'https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'} | {'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'} |
Packagist | GHSA-xcr3-4qvr-54rh | Cross-site Scripting in Pimcore | Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip. | {'CVE-2022-1351'} | 2022-04-22T20:46:44Z | 2022-04-15T00:00:45Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1351', 'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac', 'https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615', 'https://github.com/pimcore/pimcore'} | null | {'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'} | {'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'} |
Packagist | GHSA-x8wj-6m73-gfqp | Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle | ### Impact
The vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, OneupUploaderBundle is susceptible to a path
traversal vulnerability which can be exploited to upload files to
arbitrary folders on the filesystem. The assembly process can further be
misused with some restrictions to delete and copy files to other
locations.
The vulnerability can be exploited by any users that have legitimate
access to the upload functionality and can lead to arbitrary code
execution, denial of service and disclosure of confidential information.
### Patches
Yes, see version 1.9.3 and 2.1.5.
### References
https://owasp.org/www-community/attacks/Path_Traversal
### Credits:
This security vulnerability was found by Thibaud Kehler of SySS GmbH.
E-Mail: thibaud.kehler@syss.de | {'CVE-2020-5237'} | 2021-01-08T20:30:34Z | 2020-02-18T18:59:24Z | HIGH | null | {'CWE-23', 'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5237', 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c', 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt'} | null | {'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'} | {'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'} |
Packagist | GHSA-xh99-hw7h-wf63 | Unchecked validity of Facing values in PlayerActionPacket | ### Impact
A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`).
### Patches
f126479c37ff00a717a828f5271cf8e821d12d6c
### Workarounds
Using a plugin, cancel `DataPacketReceiveEvent` if the packet is `PlayerActionPacket` and the facing is outside the range 0-5 when receiving START_BREAK or CRACK_BLOCK actions, or UseItemTransactionData. However, beware that negative values may be legitimate in some cases.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-01-13T22:08:36Z | 2022-01-13T22:25:44Z | HIGH | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63', 'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'} | {'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'} |
Packagist | GHSA-qw36-p97w-vcqr | Cookie persistence after password changes in symfony/security-bundle | Description
-----------
Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password.
Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie.
Resolution
----------
Symfony now makes the password part of the signature by default. In that way, when the password changes then the cookie is not valid anymore.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc) for branch 5.3.
Credits
-------
We would like to thank Thibaut Decherit for reporting the issue and Wouter J for fixing the issue.
| {'CVE-2021-41268'} | 2021-12-01T14:36:09Z | 2021-11-24T20:05:22Z | MODERATE | null | {'CWE-384'} | {'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/symfony/symfony', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41268', 'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'} | null | {'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'} | {'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'} |
Packagist | GHSA-jh5x-hfhg-78jq | Deserialization of Untrusted Data in Archive_Tar | Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. See: https://github.com/pear/Archive_Tar/issues/33 | {'CVE-2020-28948'} | 2022-04-01T18:11:11Z | 2021-04-22T16:20:50Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://github.com/pear/Archive_Tar/issues/33', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948', 'https://github.com/pear/Archive_Tar', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://www.debian.org/security/2020/dsa-4817', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://security.gentoo.org/glsa/202101-23'} | null | {'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'} | {'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'} |
Packagist | GHSA-8wcc-f2vq-h4gx | Cross-site Scripting in livehelperchat | Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed. | {'CVE-2022-0370'} | 2022-02-03T20:34:04Z | 2022-01-28T23:06:22Z | MODERATE | null | {'CWE-79'} | {'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca', 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0370'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'} | {'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'} |
Packagist | GHSA-c697-r227-pq6h | Unrestricted Upload of File with Dangerous Type in pimcore | Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore | {'CVE-2022-0263'} | 2022-01-25T20:47:39Z | 2022-01-21T23:33:58Z | HIGH | null | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0263', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6', 'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'} | null | {'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'} | {'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'} |
Packagist | GHSA-gp6w-ccqv-p7qr | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3729'} | 2021-08-24T20:06:36Z | 2021-08-25T14:49:58Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3729', 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76', 'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712', 'https://github.com/firefly-iii/firefly-iii/'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'} | {'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'} |
Packagist | GHSA-hx6g-q9v2-xh7v | Information exposure in elgg | elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'. | {'CVE-2021-3980'} | 2021-12-06T22:01:08Z | 2021-12-16T15:30:48Z | HIGH | null | {'CWE-359'} | {'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126', 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac', 'https://github.com/Elgg/Elgg/pull/13791', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980', 'https://github.com/Elgg/Elgg'} | null | {'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'} | {'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'} |
Packagist | GHSA-p48w-vf3c-rqjx | Cross-Site Scripting in Bootstrap Package | ### Problem
It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
The following templates are affected by the vulnerability:
* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html`
* `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html`
* `Resources/Private/Partials/ContentElements/Header/SubHeader.html`
Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b).
### Solution
Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described.
Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. | {'CVE-2021-21365'} | 2021-04-27T19:43:14Z | 2021-04-29T21:51:21Z | MODERATE | null | {'CWE-79'} | {'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} | null | {'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} | {'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} |
Packagist | GHSA-93wh-35r4-6qmw | Exposure of Sensitive Information to an Unauthorized Actor in moodle | It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | {'CVE-2021-20281'} | 2021-03-24T23:14:27Z | 2021-03-29T20:43:23Z | MODERATE | null | {'CWE-200'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939041', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281'} | null | {'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'} | {'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'} |
Packagist | GHSA-g475-pch5-6wvv | Authentication bypass in MAGMI | MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication. | {'CVE-2020-5777'} | 2021-05-05T19:06:27Z | 2021-05-06T18:54:35Z | CRITICAL | null | {'CWE-287'} | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://www.tenable.com/security/research/tra-2020-51'} | null | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'} | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'} |
Packagist | GHSA-wg4r-q74r-p7c8 | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0941'} | 2022-03-23T15:42:44Z | 2022-03-15T00:01:03Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} | null | {'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} | {'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} |
Packagist | GHSA-xwjr-6fj7-fc6h | Local File Inclusion by unauthenticated users | ### Impact
An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request.
### Patches
Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
### Workarounds
Apply https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4 to your installation manually if unable to upgrade to Build 469.
### References
Reported by [ka1n4t](https://github.com/ka1n4t)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1105" alt="Screen Shot 2020-10-10 at 1 05 19 PM" src="https://user-images.githubusercontent.com/7253840/95663086-4ffc4780-0af9-11eb-9bb6-fd40cf11c033.png"> | {'CVE-2020-15246'} | 2021-11-19T13:46:03Z | 2020-11-23T19:48:12Z | HIGH | null | {'CWE-863', 'CWE-22'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246'} | null | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} |
Packagist | GHSA-r5gm-4p5w-pq2p | Remote code execution in verot/class.upload.php | class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions. | {'CVE-2019-19576'} | 2021-08-19T16:24:46Z | 2020-01-16T22:17:40Z | CRITICAL | null | {'CWE-434'} | {'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/jra89/CVE-2019-19576', 'http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html', 'https://www.verot.net/php_class_upload.htm', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19576', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3', 'https://www.verot.net'} | null | {'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'} | {'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124'} |
Packagist | GHSA-97cc-825c-399g | Cross site scripting in remdex/livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4050'} | 2021-12-09T18:07:18Z | 2021-12-10T20:33:29Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'} | {'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'} |
Packagist | GHSA-m5vx-8chx-qvmm | Form validation can be skipped | ### Impact
By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators.
We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified.
That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent.
### Patches
https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246
### Workarounds
Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data.
Alternatively a custom Finisher can be added as first finisher.
### References
This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567
Original report: https://tickets.neos.io/#ticket/zoom/411 (internal) | {'CVE-2021-32697'} | 2021-07-29T14:34:11Z | 2021-06-22T15:15:08Z | MODERATE | null | {'CWE-20'} | {'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm', 'https://github.com/neos/form/releases/tag/5.1.3'} | null | {'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'} | {'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'} |
Packagist | GHSA-mrvj-7q4f-5p42 | Cross-site scripting in eZ Platform Kernel | ### Impact
In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.
### Patches
The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at:
https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109
### Important note
You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content. | null | 2021-03-19T19:56:16Z | 2021-03-19T19:56:42Z | HIGH | null | {'CWE-79'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2'} | null | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'} |
Packagist | GHSA-jj8r-p9f5-fmvv | Cross-site Scripting in TYPO3 extension | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. | {'CVE-2021-36785'} | 2021-08-30T17:07:59Z | 2021-08-30T17:22:25Z | MODERATE | null | {'CWE-79'} | {'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://typo3.org/help/security-advisories/security', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso'} | null | {'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'} | {'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'} |
Packagist | GHSA-hxmr-5gv9-6p8v | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0. | {'CVE-2022-0575'} | 2022-02-24T13:06:37Z | 2022-02-15T00:02:47Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54', 'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'} | null | {'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'} | {'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'} |
Packagist | GHSA-g3h8-cg9x-47qw | PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby | ### Impact
An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file.
Visitors without Panel access *cannot* use this attack vector.
### Patches
The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.4.5](https://github.com/getkirby/kirby/releases/tag/3.4.5). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
**Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.
### Workarounds
Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881).
### Credits
Thanks to Thore Imhof of Accenture for reporting the problem. | {'CVE-2020-26255'} | 2021-01-07T22:37:40Z | 2020-12-08T14:42:08Z | LOW | null | {'CWE-434'} | {'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://packagist.org/packages/getkirby/panel', 'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26255', 'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881'} | null | {'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'} | {'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'} |
Packagist | GHSA-mxr5-mc97-63rc | Account Takeover in Octobercms | ### Impact
An attacker can request an account password reset and then gain access to the account using a specially crafted request.
- To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form.
### Patches
- Issue has been patched in Build 472 and v1.1.5
- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
### Workarounds
Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
### Recommendations
We recommend the following steps to make sure your server stays secure:
- Keep server OS and system software up to date.
- Keep October CMS software up to date.
- Use a multi-factor authentication plugin.
- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
### References
Bugs found as part of Solar Security CMS Research. Credits to:
• Andrey Basarygin
• Andrey Guzei
• Mikhail Khramenkov
• Alexander Sidukov
• Maxim Teplykh
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
| {'CVE-2021-32648'} | 2022-02-23T22:21:06Z | 2021-08-30T16:13:02Z | HIGH | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} | null | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} |
Packagist | GHSA-9f8f-574q-8jmf | Manipulation of product reviews via API | ### Impact
Manipulation of product reviews via API
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| {'CVE-2021-37707'} | 2021-08-26T19:40:47Z | 2021-08-30T16:14:00Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} | null | {'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} | {'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} |
Packagist | GHSA-cjw5-f2x5-r4q5 | Cross-site Scripting in TastyIgniter | TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS). | {'CVE-2022-0602'} | 2022-04-19T14:12:53Z | 2022-04-06T00:01:29Z | HIGH | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0602', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://github.com/tastyigniter/TastyIgniter', 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'} | null | {'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'} | {'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'} |
Packagist | GHSA-735v-wx75-xmmm | Cross-site Scripting in grav | In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering. | {'CVE-2022-0268'} | 2022-01-31T21:45:04Z | 2022-01-27T18:27:56Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} | null | {'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} | {'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} |
Packagist | GHSA-cchx-mfrc-fwqr | Improper authentication in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security. | {'CVE-2019-10911'} | 2021-09-30T18:40:15Z | 2020-02-12T18:45:08Z | HIGH | null | {'CWE-287', 'CWE-200'} | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911', 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash', 'https://github.com/symfony/symfony ', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml', 'https://symfony.com/cve-2019-10911', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19'} | null | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'} | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'} |
Packagist | GHSA-f9p3-h6cg-2cjr | Improper neutralization of formula elements in yii-helpers | Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data. | {'CVE-2022-1544'} | 2022-05-04T03:01:04Z | 2022-05-03T00:00:46Z | HIGH | null | {'CWE-1236'} | {'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://github.com/luyadev/yii-helpers', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} | null | {'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} | {'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} |
Packagist | GHSA-7x2h-3v2v-24p9 | Cross-Site Request Forgery in microweber | microweber version 1.2.10 and prior is vulnerable to cross-site request forgery. | {'CVE-2022-0505'} | 2022-02-14T22:33:33Z | 2022-02-09T00:00:31Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'} | null | {'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'} | {'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'} |
Packagist | GHSA-jq4p-mq33-w375 | Cross-site Scripting when rendering error messages in laminas-form | ### Impact
When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Site Scripting (XSS) attack.
### Patches
The following versions were issued to mitigate the vulnerability:
- 2.17.1
- 3.0.2
- 3.1.1
### Workarounds
At the top of a view script where you call the `formElementErrors()` view helper, place the following code:
```php
use Laminas\Form\ElementInterface;
use Laminas\View\PhpRenderer;
$escapeMessages = function (ElementInterface $formOrElement, PhpRenderer $renderer): void {
$messages = $element->getMessages();
if (! $messages) {
return;
}
$escaped = [];
array_walk_recursive(
$messages,
static function (string $item) use (&$escaped, $renderer): void {
$escaped[] = $renderer->escapeHtml($item);
}
};
$element->setMessages($escaped);
};
```
Before calling `formElementErrors()` with a form, fieldset, or element, call the above closure as follows
```php
// Usage with a form
// $this is the view renderer
$escapeMessages($form, $this);
// Usage with a fieldset
// $this is the view renderer
$escapeMessages($fieldset, $this);
// Usage with a form element
// $this is the view renderer
$escapeMessages($element, $this);
```
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/laminas/laminas-form/issues/new)
* Email us at [security@getlaminas.org](mailto:security@getlaminas.org) | {'CVE-2022-23598'} | 2022-02-07T21:16:31Z | 2022-01-28T23:08:29Z | MODERATE | null | {'CWE-79'} | {'https://github.com/laminas/laminas-form/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598', 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://getlaminas.org/security/advisory/LP-2022-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFF6WJ5I7PSEBRF6I753WKE2BXFBGQXE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLNABVK26CE4PFL57VLY242FW3QY4CPC/'} | null | {'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'} | {'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'} |
Packagist | GHSA-75p7-527p-w8wp | Server-Side Request Forgery and Open Redirect in AllTube Download | ### Impact
On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured).
The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.)
### Patches
3.0.3 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
The fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/3d092891044f2685ed66c73c870a021bee319c37/patches/youtube-dl-disable-generic.diff) to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched.
However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**.
### References
* https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a
* https://github.com/ytdl-org/youtube-dl/issues/30691
| {'CVE-2022-24739'} | 2022-03-09T20:13:46Z | 2022-03-09T15:17:31Z | HIGH | null | {'CWE-918', 'CWE-601'} | {'https://github.com/Rudloff/alltube', 'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp'} | null | {'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | {'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'} |
Packagist | GHSA-f77h-m9w2-vvg2 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4017'} | 2021-12-02T20:24:56Z | 2021-12-03T20:38:57Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4017', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | null | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} |
Packagist | GHSA-356r-77q8-f64f | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1 | {'CVE-2021-3819'} | 2021-09-30T18:35:17Z | 2021-09-29T17:12:37Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5', 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9', 'https://github.com/firefly-iii/firefly-iii'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'} | {'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'} |
Packagist | GHSA-738m-f33v-qc2r | SMTP Injection in PHPMailer | ### Impact
Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
### Patches
Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0).
### Workarounds
Manually strip line breaks from email addresses before passing them to PHPMailer.
### References
https://nvd.nist.gov/vuln/detail/CVE-2015-8476
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | {'CVE-2015-8476'} | 2020-03-05T21:57:18Z | 2020-03-05T22:09:19Z | LOW | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.securityfocus.com/bid/78619', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://www.openwall.com/lists/oss-security/2015/12/05/1', 'http://www.debian.org/security/2015/dsa-3416', 'http://www.openwall.com/lists/oss-security/2015/12/04/5', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html'} | null | {'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'} | {'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'} |
Packagist | GHSA-4286-h47h-m5v6 | Improper Authentication in showdoc | ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions. | {'CVE-2021-41745'} | 2021-10-25T18:46:11Z | 2021-10-25T19:43:24Z | HIGH | null | {'CWE-434', 'CWE-287'} | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability'} | null | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'} | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'} |
Packagist | GHSA-6fmv-q269-55cw | Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit template.
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by Aquilao Null | {'CVE-2020-15277'} | 2021-01-08T21:18:07Z | 2020-10-30T17:05:59Z | HIGH | null | {'CWE-434', 'CWE-74'} | {'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} | null | {'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} | {'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} |
Packagist | GHSA-jmhf-9fj8-88gh | Open Redirect in AllTube | ### Impact
Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain.
### Patches
3.0.1 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
### References
* https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a
* https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203/
* https://nvd.nist.gov/vuln/detail/CVE-2022-0692 | {'CVE-2022-0692'} | 2022-03-02T21:07:57Z | 2022-02-23T21:15:01Z | MODERATE | null | {'CWE-601'} | {'https://github.com/Rudloff/alltube', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | null | {'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | {'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} |
Packagist | GHSA-c53v-qmrx-93hg | Open redirect in shopware | ### Impact
Arbitrary redirect while using certain URLs
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
| {'CVE-2022-21651'} | 2022-01-06T20:18:17Z | 2022-01-06T23:49:19Z | MODERATE | null | {'CWE-601'} | {'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} | null | {'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} | {'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} |
Packagist | GHSA-rpg7-q4cv-p466 | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4123'} | 2022-01-04T18:52:37Z | 2021-12-17T20:00:16Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'} | {'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'} |
Packagist | GHSA-q3x2-jvp3-wj78 | Unrestricted XML files leading to cross-site scripting in Microweber | Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack. | {'CVE-2022-0963'} | 2022-03-29T15:42:17Z | 2022-03-16T00:00:47Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'} | null | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'} | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'} |
Packagist | GHSA-9pgx-gcph-mpqr | XSS via the history parameter in SQL command | ### Impact
Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected.
### Patches
Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9).
### Workarounds
Use browser which encodes URL parameters (e.g. Chrome or Firefox).
### References
https://sourceforge.net/p/adminer/bugs-and-features/775/
### For more information
If you have any questions or comments about this advisory:
* Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/
| {'CVE-2020-35572'} | 2021-10-06T21:19:31Z | 2021-02-11T20:42:28Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd', 'https://sourceforge.net/p/adminer/news/', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr', 'https://github.com/vrana/adminer'} | null | {'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'} | {'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'} |
Packagist | GHSA-2p6g-gjp8-ggg9 | Validation bypass in personnummer | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan) | null | 2020-09-11T16:41:24Z | 2020-09-09T17:29:34Z | LOW | null | null | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'} | null | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'} | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'} |
Packagist | GHSA-vrgp-3ph6-2wwq | SQL Injection in Dolibarr | An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement. | {'CVE-2021-36625'} | 2022-04-13T14:57:08Z | 2022-04-01T00:00:41Z | HIGH | null | {'CWE-89'} | {'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} | null | {'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} | {'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} |
Packagist | GHSA-389p-fchr-q2mg | Path Traversal in ImpressCMS | ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress. | {'CVE-2022-24977'} | 2022-02-25T17:59:00Z | 2022-02-15T00:02:47Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/ImpressCMS/impresscms', 'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://r0.haxors.org/posts?id=8'} | null | {'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'} | {'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'} |
Packagist | GHSA-g92x-8m54-p89v | Cross-Site Request Forgery in snipe-it | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3858'} | 2021-10-22T13:56:56Z | 2021-10-21T17:48:55Z | MODERATE | null | {'CWE-352'} | {'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'} | null | {'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'} | {'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'} |
Packagist | GHSA-jx5q-g37m-h5hj | Client-Side JavaScript Prototype Pollution in oro/platform | ### Summary
By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution.
### Workarounds
Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype` | {'CVE-2021-43852'} | 2022-01-04T22:46:13Z | 2022-01-06T18:29:51Z | MODERATE | null | {'CWE-74', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43852', 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://github.com/oroinc/platform'} | null | {'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'} | {'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'} |
Packagist | GHSA-7322-jrq4-x5hf | File reference keys leads to incorrect hashes on HMAC algorithms | ### Impact
Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents.
The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly.
### Patches
All versions have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative.
### Workarounds
Use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of your keys:
```diff
-use Lcobucci\JWT\Signer\Key\LocalFileReference;
+use Lcobucci\JWT\Signer\Key\InMemory;
-$key = LocalFileReference::file(__DIR__ . '/public-key.pem');
+$key = InMemory::file(__DIR__ . '/public-key.pem');
``` | {'CVE-2021-41106'} | 2021-09-29T18:04:31Z | 2021-09-29T17:09:40Z | MODERATE | null | {'CWE-345'} | {'https://github.com/lcobucci/jwt', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'} | null | {'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'} | {'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'} |
Packagist | GHSA-9vwf-54m9-gc4f | snipe-it is vulnerable to Improper Access Control | snipe-it is vulnerable to Improper Access Control | {'CVE-2021-4089'} | 2021-12-15T15:21:35Z | 2021-12-16T14:32:39Z | MODERATE | null | {'CWE-863', 'CWE-284'} | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://github.com/snipe/snipe-it', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'} | null | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'} | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'} |
Packagist | GHSA-rphc-h572-2x9f | Cross-site Scripting in showdoc/showdoc | ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently no known workaround. | {'CVE-2022-0960'} | 2022-03-24T22:38:55Z | 2022-03-15T00:00:55Z | CRITICAL | null | {'CWE-79', 'CWE-434'} | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e'} | null | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'} | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'} |
Packagist | GHSA-wwgq-9jhf-qgw6 | Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys | ### Impact
Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints:
* Sending a test email.
* Generating a node auto-deployment token.
At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system.
### Patches
This has been addressed in https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 which will be released as `1.6.6`.
### Workarounds
Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.
| {'CVE-2021-41273'} | 2021-11-17T21:08:25Z | 2021-11-18T15:46:57Z | MODERATE | null | {'CWE-352'} | {'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel'} | null | {'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'} | {'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'} |
Packagist | GHSA-wc7v-77jr-5c3m | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3944'} | 2021-12-03T15:35:34Z | 2021-12-03T20:38:37Z | LOW | null | {'CWE-352'} | {'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9', 'https://github.com/bookstackapp/bookstack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944', 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} | null | {'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} | {'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} |
Packagist | GHSA-vwxp-9qmf-w299 | Cross-site Scripting in LiveHelperChat | LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93. | {'CVE-2022-0394'} | 2022-02-03T19:18:02Z | 2022-02-01T00:49:48Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'} | {'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'} |
Packagist | GHSA-rfjc-xrmf-5vvw | Privilege escalation by backend users assigned to the default "Publisher" system role | ### Impact
Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access.
### Patches
Issue has been patched in Build 470 (v1.0.470) & v1.1.1.
### Workarounds
Apply https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829 to your installation manually if unable to upgrade to Build 470 or v1.1.1.
### References
Reported by [Hoan Hoang](https://github.com/hoanhp)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1098" alt="Screen Shot 2020-10-10 at 1 37 25 PM" src="https://user-images.githubusercontent.com/7253840/95663611-e6326c80-0afd-11eb-8a1e-8b767a7202fb.png"> | {'CVE-2020-15248'} | 2021-11-19T13:40:25Z | 2020-11-23T19:47:27Z | LOW | null | {'CWE-863', 'CWE-269'} | {'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15248'} | null | {'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'} | {'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'} |
Packagist | GHSA-xp5q-77mh-6hm2 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3728'} | 2021-08-24T20:02:07Z | 2021-08-25T14:50:17Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'} | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'} |
Packagist | GHSA-3wwj-wh2w-g4xp | CRLF Injection in microweber | CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0666'} | 2022-02-23T15:04:54Z | 2022-02-19T00:01:35Z | HIGH | null | {'CWE-93'} | {'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'} | {'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'} |
Packagist | GHSA-4p92-fv6v-fhfj | Cross-site Scripting in microweber | Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting. | {'CVE-2022-0723'} | 2022-03-09T20:43:44Z | 2022-02-27T00:00:15Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'} | null | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'} | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'} |
Packagist | GHSA-j5qg-w9jg-3wg3 | Inability to de-op players if listed in ops.txt with non-lowercase letters | ### Impact
Originally reported in iTXTech/Genisys#1188
```txt
PotterHarry98
potterharry98
```
`deop PotterHarry98`
will remove `potterharry98` from the ops.txt but not `PotterHarry98`.
Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match:
https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449
This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters.
### Patches
4d37b79ff7f9d9452e988387f97919a9a1c4954e
### Workarounds
This can be easily addressed by removing the offending lines from ops.txt manually.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP)
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2021-12-16T15:47:47Z | 2021-12-16T18:53:57Z | LOW | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisys/issues/1188'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'} | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'} |
Packagist | GHSA-qv7g-j98v-8pp7 | XSS vulnerability on email template preview page | ### Summary
Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template.
### Workarounds
There are no workarounds that address this vulnerability. | {'CVE-2021-41236'} | 2022-01-04T17:51:41Z | 2022-01-06T18:34:35Z | MODERATE | null | {'CWE-79'} | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'} | null | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'} | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'} |
Packagist | GHSA-579x-cjvr-cqj9 | Observable Response Discrepancy in Lost Password Service | ### Impact
It is possible to enumerate usernames via the forgot password functionality
### Patches
Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
| {'CVE-2021-39189'} | 2021-09-17T18:38:47Z | 2021-09-20T19:53:55Z | MODERATE | null | {'CWE-203', 'CWE-204'} | {'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/', 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'} | null | {'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'} | {'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'} |
Packagist | GHSA-mr6r-82x4-f4jj | Timing attacks might allow practical recovery of the long-term private key | In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical recovery of the long-term private key. | {'CVE-2019-10764'} | 2021-08-18T22:40:49Z | 2019-11-20T01:34:50Z | HIGH | null | {'CWE-203'} | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://minerva.crocs.fi.muni.cz/', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'} | null | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'} | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.