ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-5vr6-hm68-5j9p | Cross-site Scripting in LibreNMS | LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php. | {'CVE-2021-44279'} | 2021-12-06T21:36:37Z | 2021-12-03T20:49:16Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279', 'https://github.com/advisories/GHSA-5vr6-hm68-5j9p', 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} | null | {'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} | {'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} |
GHSA | GHSA-v936-j8gp-9q3p | Open redirects on some federation and push requests | ### Impact
Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible.
For the most thorough protection server administrators should remove the deprecated `federation_ip_range_blacklist` from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new `ip_range_blacklist` and `ip_range_whitelist` settings if more specific control is necessary.
### Patches
Issue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954.
### Workarounds
Requests to internal IP addresses could be blocked at the system or network level. | {'CVE-2021-21273'} | 2022-04-19T19:02:47Z | 2021-02-26T17:28:34Z | LOW | 3.1 | {'CWE-601'} | {'https://github.com/matrix-org/synapse/releases/tag/v1.25.0', 'https://github.com/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746', 'https://github.com/matrix-org/synapse/pull/8821', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21273'} | null | {'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746'} | {'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746'} |
GHSA | GHSA-jv6v-fvvx-4932 | Arbitrary File Deletion vulnerability in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1241" alt="Screen Shot 2020-03-31 at 12 16 53 PM" src="https://user-images.githubusercontent.com/7253840/78060872-89354d00-7349-11ea-8c2b-5881b0a50736.png"> | {'CVE-2020-5296'} | 2022-04-19T19:02:26Z | 2020-06-03T21:58:21Z | MODERATE | 6.2 | {'CWE-73'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5296', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'http://seclists.org/fulldisclosure/2020/Aug/2'} | null | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} |
GHSA | GHSA-9jhm-8m8c-c3f4 | SSRF in Sydent due to missing validation of hostnames | ### Impact
Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.
It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.
### Patches
Fixed in 9e57334, 8936925, 3d531ed, 0f00412
### Workarounds
A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | {'CVE-2021-29431'} | 2021-04-19T14:54:15Z | 2021-04-19T14:54:15Z | HIGH | 7.7 | {'CWE-20', 'CWE-918'} | {'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://github.com/advisories/GHSA-9jhm-8m8c-c3f4', 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29431', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a', 'https://pypi.org/project/matrix-sydent/'} | null | {'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f'} | {'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a'} |
GHSA | GHSA-662x-fhqg-9p8v | Regular Expression Denial of Service in ua-parser-js | The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA. | {'CVE-2020-7733'} | 2021-07-29T22:28:04Z | 2021-05-07T16:18:19Z | HIGH | 7.5 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666', 'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d', 'https://github.com/advisories/GHSA-662x-fhqg-9p8v', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7733', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226'} | null | {'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d'} | {'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d'} |
GHSA | GHSA-v3mr-gp7j-pw5w | Possible SQL injection in tablelookupwizard Contao Extension | ### Impact
The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility.
### Patches
The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/terminal42/contao-tablelookupwizard
* Email us at [info@terminal42.ch](mailto:info@terminal42.ch)
| null | 2022-02-10T22:33:46Z | 2022-02-10T22:33:46Z | HIGH | 0 | {'CWE-89'} | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717', 'https://github.com/advisories/GHSA-v3mr-gp7j-pw5w', 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'} | null | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'} | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'} |
GHSA | GHSA-h77r-rp97-7rv4 | Privilage Escalation in moodle | In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10. | {'CVE-2020-25699'} | 2021-10-20T17:37:40Z | 2021-03-29T20:43:01Z | HIGH | 7.5 | {'CWE-863', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25699', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413936', 'https://github.com/advisories/GHSA-h77r-rp97-7rv4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'} | null | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} |
GHSA | GHSA-5jqp-qgf6-3pvh | Use of "infinity" as an input to datetime and date fields causes infinite loop in pydantic |
Impact
Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU).
Patches
Pydantic is be patched with fixes available in the following versions:
v1.8.2
v1.7.4
v1.6.2
All these versions are available on pypi, and will be available on conda-forge soon.
See the changelog for details.
Workarounds
If you absolutely can't upgrade, you can work around this risk using a validator to catch these values, brief demo:
from datetime import date
from pydantic import BaseModel, validator
class DemoModel(BaseModel):
date_of_birth: date
@validator('date_of_birth', pre=True)
def skip_infinite_values(cls, v):
try:
seconds = float(v)
except (ValueError, TypeError):
return v
else:
if seconds == float('inf'):
return date.max
elif seconds == float('-inf'):
return date.min
else:
return seconds
Note: this is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic.
If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.
References
This was fixed in commit 7e83fdd.
| {'CVE-2021-29510'} | 2022-04-19T19:02:57Z | 2021-05-13T20:23:17Z | LOW | 3.3 | {'CWE-835'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2HT266L6Q7H6ICP7DFGXOGBJHNNKMKB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMKAJX4O6IGBBCE32CO2G7PZQCCQSBLV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEFWM7DYKD2ZHE7R5YT5EQWJPV4ZKYRB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29510', 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh', 'https://github.com/advisories/GHSA-5jqp-qgf6-3pvh', 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} | null | {'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} | {'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} |
GHSA | GHSA-vvff-6wrr-4g7q | Missing Authentication for Critical Function in Foreman Ansible | An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-3589'} | 2022-04-05T19:28:40Z | 2022-03-24T00:00:17Z | CRITICAL | 9.9 | {'CWE-306'} | {'https://github.com/advisories/GHSA-vvff-6wrr-4g7q', 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969265', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589', 'https://access.redhat.com/security/cve/CVE-2021-3589'} | null | {'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'} | {'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'} |
GHSA | GHSA-vvf2-ppj9-pp49 | Inefficient Regular Expression Complexity in vuelidate | vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU. | {'CVE-2021-3794'} | 2022-05-04T03:24:56Z | 2021-09-20T20:42:06Z | HIGH | 7.5 | {'CWE-400', 'CWE-697'} | {'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d', 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794', 'https://github.com/advisories/GHSA-vvf2-ppj9-pp49'} | null | {'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d'} | {'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d'} |
GHSA | GHSA-rcrv-228c-gprj | Invalid URL generation in bitlyshortener | ### Impact
Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately.
### Patches
Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs.
### Workarounds
A workaround is to replace "https://j.mp/" in each generated short URL with "https://bit.ly/".
### References
* [Release notes](https://github.com/impredicative/bitlyshortener/releases) | null | 2022-01-21T18:39:40Z | 2022-01-21T18:39:40Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.6.0', 'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'} | null | {'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'} | {'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'} |
GHSA | GHSA-49x3-8228-3w3m | Inefficient Regular Expression Complexity in code-server | code-server is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3810'} | 2021-09-20T20:18:39Z | 2021-09-20T20:18:39Z | HIGH | 7.5 | {'CWE-1333'} | {'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223', 'https://github.com/advisories/GHSA-49x3-8228-3w3m', 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3810'} | null | {'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'} | {'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'} |
GHSA | GHSA-7r8m-45gc-m2c8 | Downloads Resources over HTTP in mongodb-instance | Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`.
## Recommendation
Update to version 0.0.3 or later. | {'CVE-2016-10572'} | 2021-01-08T19:14:35Z | 2019-02-18T23:52:14Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://www.npmjs.com/advisories/235', 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://nodesecurity.io/advisories/235', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'} | null | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} |
GHSA | GHSA-85rf-xh54-whp3 | Malicious URL drafting attack against iodines static file server may allow path traversal | ### Impact
A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version.
Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't be normally accessible from the public folder.
### Patches
The vulnerability was patched in version 0.7.34. Please upgrade to the latest version.
### Workarounds
A possible workaround would be to disable the static file service and it's `X-Sendfile` support, sending static files using nginx or a source code solution (sending the data dynamically).
However, it would be better to upgrade iodine to the latest version, as it also contains non-security related fixes.
### For more information
If you have any questions or comments about this advisory:
* Email [Boaz Segev](https://github.com/boazsegev) | null | 2021-08-25T21:02:39Z | 2019-10-07T16:52:13Z | LOW | 0 | {'CWE-22'} | {'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889', 'https://github.com/advisories/GHSA-85rf-xh54-whp3', 'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3'} | null | {'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889'} | {'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889'} |
GHSA | GHSA-x83m-p7pv-ch8v | Division by 0 in `QuantizedAdd` | ### Impact
An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedAdd`:
```python
import tensorflow as tf
x = tf.constant([68, 228], shape=[2, 1], dtype=tf.quint8)
y = tf.constant([], shape=[2, 0], dtype=tf.quint8)
min_x = tf.constant(10.723421015884028)
max_x = tf.constant(15.19578006631113)
min_y = tf.constant(-5.539003866682977)
max_y = tf.constant(42.18819949559947)
tf.raw_ops.QuantizedAdd(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero.
```cc
void VectorTensorAddition(const T* vector_data, float min_vector,
float max_vector, int64 vector_num_elements,
const T* tensor_data, float min_tensor,
float max_tensor, int64 tensor_num_elements,
float output_min, float output_max, Toutput* output) {
for (int i = 0; i < tensor_num_elements; ++i) {
const int64 vector_i = i % vector_num_elements;
...
}
}
```
Since `vector_num_elements` is [determined based on input shapes](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0.
### Patches
We have patched the issue in GitHub commit [744009c9e5cc5d0447f0dc39d055f917e1fd9e16](https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29549'} | 2021-05-21T14:23:38Z | 2021-05-21T14:23:38Z | LOW | 2.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29549', 'https://github.com/advisories/GHSA-x83m-p7pv-ch8v', 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v'} | null | {'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} | {'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} |
GHSA | GHSA-vpf5-82c8-9v36 | Prototype Pollution in algoliasearch-helper | The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns. | {'CVE-2021-23433'} | 2021-11-24T19:00:33Z | 2021-11-23T21:15:35Z | MODERATE | 0 | {'CWE-1321', 'CWE-915'} | {'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://github.com/advisories/GHSA-vpf5-82c8-9v36', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421'} | null | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} |
GHSA | GHSA-vm5j-vqr6-v7v8 | OS Command Injection in pixl-class | pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization. | {'CVE-2020-7640'} | 2021-12-10T20:04:56Z | 2021-12-10T20:04:56Z | HIGH | 9.8 | {'CWE-78'} | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://github.com/advisories/GHSA-vm5j-vqr6-v7v8', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} | null | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} |
GHSA | GHSA-pcgf-qjx2-qv4q | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1217'} | 2021-03-29T20:56:08Z | 2021-03-29T20:56:08Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-pcgf-qjx2-qv4q', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217', 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217'} | null | {'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} |
GHSA | GHSA-vmfg-rjjm-rjrj | Deserialization of Untrusted Data | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory. | {'CVE-2017-5929'} | 2022-04-19T15:46:12Z | 2021-06-07T16:07:36Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8', 'https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929', 'https://logback.qos.ch/news.html', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1675', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5929', 'https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E', 'https://github.com/advisories/GHSA-vmfg-rjjm-rjrj', 'https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E'} | null | {'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'} | {'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'} |
GHSA | GHSA-hhr9-7xvh-8xgc | Server side request forgery in LiveHelperChat | SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191 | {'CVE-2022-1213'} | 2022-04-19T17:55:45Z | 2022-04-06T00:01:32Z | HIGH | 7.7 | {'CWE-918'} | {'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213', 'https://github.com/advisories/GHSA-hhr9-7xvh-8xgc', 'https://github.com/LiveHelperChat/livehelperchat/issues/1752', 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'} | {'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'} |
GHSA | GHSA-8rm6-75mf-7r7r | Division by zero in TFLite's implementation of hashtable lookup | ### Impact
The TFLite implementation of hashtable lookup is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115):
```cc
const int num_rows = SizeOfDimension(value, 0);
const int row_bytes = value->bytes / num_rows;
```
An attacker can craft a model such that `values`'s first dimension would be 0.
### Patches
We have patched the issue in GitHub commit [5117e0851348065ed59c991562c0ec80d9193db2](https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29604'} | 2021-05-21T14:28:19Z | 2021-05-21T14:28:19Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29604', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r', 'https://github.com/advisories/GHSA-8rm6-75mf-7r7r'} | null | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'} | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'} |
GHSA | GHSA-gvm4-h8j3-rjrq | CHECK-fail in `LoadAndRemapMatrix` | ### Impact
An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`:
```python
import tensorflow as tf
ckpt_path = tf.constant([], shape=[0], dtype=tf.string)
old_tensor_name = tf.constant("")
row_remapping = tf.constant([], shape=[0], dtype=tf.int64)
col_remapping = tf.constant([1], shape=[1], dtype=tf.int64)
initializing_values = tf.constant(1.0)
tf.raw_ops.LoadAndRemapMatrix(
ckpt_path=ckpt_path, old_tensor_name=old_tensor_name,
row_remapping=row_remapping, col_remapping=col_remapping,
initializing_values=initializing_values, num_rows=0, num_cols=1)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) assumes that the `ckpt_path` is always a valid scalar.
```cc
const string& ckpt_path = ckpt_path_t->scalar<tstring>()();
```
However, an attacker can send any other tensor as the first argument of `LoadAndRemapMatrix`. This would cause the rank `CHECK` in `scalar<T>()()` to trigger and terminate the process.
### Patches
We have patched the issue in GitHub commit [77dd114513d7796e1e2b8aece214a380af26fbf4](https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29561'} | 2021-05-21T14:24:59Z | 2021-05-21T14:24:59Z | LOW | 2.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-gvm4-h8j3-rjrq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29561', 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} | null | {'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} | {'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} |
GHSA | GHSA-773q-5334-5gf9 | Memory over-allocation in evm-core | Prior to the patch, when executing specific EVM opcodes related
to memory operations that use `evm_core::Memory::copy_large`, the
crate can over-allocate memory when it is not needed, making it
possible for an attacker to perform denial-of-service attack.
The flaw was corrected in commit `19ade85`.
| null | 2021-08-25T20:55:36Z | 2021-08-25T20:55:36Z | MODERATE | 0 | {'CWE-789'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0066.html', 'https://github.com/rust-blockchain/evm/commit/19ade85', 'https://github.com/advisories/GHSA-773q-5334-5gf9'} | null | {'https://github.com/rust-blockchain/evm/commit/19ade85'} | {'https://github.com/rust-blockchain/evm/commit/19ade85'} |
GHSA | GHSA-wh37-37xw-54hr | Improper Authentication in requests-kerberos | python-requests-Kerberos through 0.5 does not handle mutual authentication | {'CVE-2014-8650'} | 2022-03-23T20:33:23Z | 2020-03-10T18:02:31Z | CRITICAL | 9.8 | {'CWE-287'} | {'http://www.securityfocus.com/bid/70909', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650', 'http://www.openwall.com/lists/oss-security/2014/11/07/1', 'https://github.com/requests/requests-kerberos/issues/35', 'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst', 'https://github.com/advisories/GHSA-wh37-37xw-54hr', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650', 'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6', 'https://github.com/requests/requests-kerberos/pull/36', 'https://security-tracker.debian.org/tracker/CVE-2014-8650'} | null | {'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6'} | {'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6'} |
GHSA | GHSA-q42p-pg8m-cqh6 | Prototype Pollution in handlebars | Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
## Recommendation
For handlebars 4.1.x upgrade to 4.1.2 or later.
For handlebars 4.0.x upgrade to 4.0.14 or later. | null | 2021-08-04T20:54:06Z | 2019-06-05T14:07:48Z | HIGH | 7.3 | {'CWE-471'} | {'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://www.npmjs.com/advisories/755', 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://github.com/advisories/GHSA-q42p-pg8m-cqh6'} | null | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} |
GHSA | GHSA-26cm-qrc6-mfgj | Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker | ### Impact
LDAP injection vulnerability, only affects instances with LDAP authentication enabled.
### Patches
Patch for vulnerability released with v1.16.3.
### Workarounds
Disable LDAP feature if in use
### References
[OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html
)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Thunderdome Github Repository](https://github.com/StevenWeathers/thunderdome-planning-poker)
* Email us at [steven@weathers.me](mailto:steven@weathers.me)
| {'CVE-2021-41232'} | 2022-04-19T19:03:13Z | 2021-11-08T18:16:21Z | HIGH | 8.1 | {'CWE-74', 'CWE-90'} | {'https://github.com/advisories/GHSA-26cm-qrc6-mfgj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41232', 'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1', 'https://github.com/github/securitylab/issues/464#issuecomment-957094994', 'https://github.com/StevenWeathers/thunderdome-planning-poker/security/advisories/GHSA-26cm-qrc6-mfgj'} | null | {'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'} | {'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'} |
GHSA | GHSA-9652-78hp-w58c | Stored cross-site scripting in PressBooks | PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS. | {'CVE-2021-3271'} | 2021-03-29T20:07:39Z | 2021-03-29T20:07:39Z | MODERATE | 4.8 | {'CWE-79'} | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8', 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/', 'https://github.com/pressbooks/pressbooks', 'https://github.com/pressbooks/pressbooks/pull/2072', 'https://github.com/advisories/GHSA-9652-78hp-w58c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3271'} | null | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'} | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'} |
GHSA | GHSA-65cv-r6x7-79hv | Possible XSS vulnerability in ActionView | There is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks.
### Impact
There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this:
```erb
<script>let a = `<%= j unknown_input %>`</script>
```
or
```erb
<script>let a = `<%= escape_javascript unknown_input %>`</script>
```
### Releases
The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations.
### Workarounds
For those that can't upgrade, the following monkey patch may be used:
```ruby
ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!(
{
"`" => "\\`",
"$" => "\\$"
}
)
module ActionView::Helpers::JavaScriptHelper
alias :old_ej :escape_javascript
alias :old_j :j
def escape_javascript(javascript)
javascript = javascript.to_s
if javascript.empty?
result = ""
else
result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP)
end
javascript.html_safe? ? result.html_safe : result
end
alias :j :escape_javascript
end
```
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series
* [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series
Please note that only the 5.2 and 6.0 series are supported at present. Users
of earlier unsupported releases are advised to upgrade as soon as possible as we
cannot guarantee the continued availability of security fixes for unsupported
releases.
### Credits
Thanks to Jesse Campos from Chef Secure | {'CVE-2020-5267'} | 2022-04-19T19:02:25Z | 2020-03-19T17:30:29Z | MODERATE | 4 | {'CWE-80'} | {'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv', 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a', 'https://github.com/advisories/GHSA-65cv-r6x7-79hv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html', 'http://www.openwall.com/lists/oss-security/2020/03/19/1', 'https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-5267.yml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html'} | null | {'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'} | {'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'} |
GHSA | GHSA-v2r9-c84j-v7xm | Moderate severity vulnerability that affects rdoc | darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL. | {'CVE-2013-0256'} | 2021-09-01T19:36:59Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-79'} | {'http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256', 'http://secunia.com/advisories/52774', 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=907820', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'http://www.ubuntu.com/usn/USN-1733-1', 'http://rhn.redhat.com/errata/RHSA-2013-0728.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html', 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60', 'https://github.com/advisories/GHSA-v2r9-c84j-v7xm', 'http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/'} | null | {'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'} | {'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'} |
GHSA | GHSA-6qcc-whgp-pjj2 | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | {'CVE-2022-0832'} | 2022-03-11T23:22:51Z | 2022-03-05T00:00:45Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0832', 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878', 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a', 'https://github.com/advisories/GHSA-6qcc-whgp-pjj2'} | null | {'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'} | {'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'} |
GHSA | GHSA-8wp2-vxpg-xcvp | Cross site scripting in facturascripts | facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account. | {'CVE-2022-1457'} | 2022-05-05T13:47:30Z | 2022-04-26T00:00:43Z | CRITICAL | 9 | {'CWE-79'} | {'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046', 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457', 'https://github.com/advisories/GHSA-8wp2-vxpg-xcvp'} | null | {'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'} | {'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'} |
GHSA | GHSA-2rq5-68hm-h4j8 | Cross-Site Request Forgery in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website. | {'CVE-2021-25931'} | 2021-05-28T22:26:41Z | 2021-05-25T18:46:55Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/advisories/GHSA-2rq5-68hm-h4j8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931'} | null | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} |
GHSA | GHSA-8qvx-f5gf-g43v | Logic error in dolibarr | The application does not check the input of price number lead to Business Logic error through negative price amount. | {'CVE-2022-0174'} | 2022-01-20T15:34:34Z | 2022-01-12T22:54:50Z | MODERATE | 4.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-8qvx-f5gf-g43v', 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32', 'https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0174'} | null | {'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'} | {'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'} |
GHSA | GHSA-jmqm-f2gx-4fjv | Sensitive information exposure through logs in npm-registry-fetch | Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files. | null | 2021-09-22T19:00:08Z | 2020-07-07T18:59:10Z | MODERATE | 5.3 | {'CWE-352'} | {'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88', 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432', 'https://github.com/advisories/GHSA-jmqm-f2gx-4fjv'} | null | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} |
GHSA | GHSA-w3w8-37jv-2c58 | Cross-Site Scripting in mustache | Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 2.2.1 or later.
Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes. | {'CVE-2015-8862'} | 2021-09-20T22:34:09Z | 2017-10-24T18:33:36Z | HIGH | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'https://www.tenable.com/security/tns-2016-18', 'https://nodesecurity.io/advisories/62', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://www.npmjs.com/advisories/62', 'http://www.securityfocus.com/bid/96436'} | null | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} |
GHSA | GHSA-8p9r-f949-699g | Path Traversal in browserless-chrome | This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server. | {'CVE-2020-7758'} | 2021-05-10T18:46:48Z | 2021-05-10T18:46:48Z | HIGH | 7.5 | {'CWE-22'} | {'https://www.npmjs.com/package/browserless-chrome', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175', 'https://github.com/advisories/GHSA-8p9r-f949-699g', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758', 'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable'} | null | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} |
GHSA | GHSA-4h9c-v5vg-5m6m | Access to restricted PHP code by dynamic static class access in smarty | ### Impact
Template authors could run restricted static php methods.
### Patches
Please upgrade to 3.1.40 or higher.
### References
See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter.
### For more information
If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
| {'CVE-2021-21408'} | 2022-01-20T15:33:56Z | 2022-01-12T22:43:42Z | HIGH | 8.8 | {'CWE-20'} | {'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.3', 'https://github.com/smarty-php/smarty/releases/tag/v3.1.43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408', 'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664', 'https://github.com/advisories/GHSA-4h9c-v5vg-5m6m'} | null | {'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'} | {'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'} |
GHSA | GHSA-p737-p57g-4cpr | Insertion of Sensitive Information into Log File in Jupyter notebook | ### Impact
_What kind of vulnerability is it?_
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Upgrade to Jupyter Server version 1.15.4
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org).
Credit: @3coins for reporting. Thank you!
| {'CVE-2022-24757'} | 2022-03-29T21:55:39Z | 2022-03-25T19:20:39Z | HIGH | 7.5 | {'CWE-532'} | {'https://github.com/advisories/GHSA-p737-p57g-4cpr', 'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757', 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr'} | null | {'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'} | {'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'} |
GHSA | GHSA-4gq5-ch57-c2mg | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. | {'CVE-2018-14719'} | 2021-06-11T15:38:44Z | 2019-01-04T19:09:49Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://seclists.org/bugtraq/2019/May/68', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.debian.org/security/2019/dsa-4452', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1823'} | null | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} |
GHSA | GHSA-j4mm-7pj3-jf7v | HTTP Method Spoofing | Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible.
### Impact
The vulnerability allows attackers to craft links or forms which may change the server state. For example, the following GET request would create a new user:
```sh
% curl -i -u admin:opencast \
'https://legacy.opencast.org/admin-ng/users/test.json?_method=PUT&username=test&password=attack'
HTTP/2 200
…
```
If an admin is logged in to legacy.opencast.org and accidentally clicks this link, a user will silently be created.
### Patches
This issue is fixed in Opencast 9.10 and 10.0.
### Workarounds
You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case.
### References
- [Fix for 10.0](https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8)
- [Fix for 9.10](https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
| {'CVE-2021-43807'} | 2022-04-19T19:03:13Z | 2021-12-14T21:43:00Z | HIGH | 7.5 | {'CWE-290'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444', 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43807'} | null | {'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'} | {'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'} |
GHSA | GHSA-6c8f-qphg-qjgp | Validation Bypass in kind-of | Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation.
## Recommendation
Upgrade to versions 6.0.3 or later. | {'CVE-2019-20149'} | 2021-08-23T15:03:56Z | 2020-03-31T15:59:54Z | HIGH | 7.5 | {'CWE-668'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://github.com/jonschlinkert/kind-of/issues/30', 'https://github.com/advisories/GHSA-6c8f-qphg-qjgp', 'https://www.npmjs.com/advisories/1490'} | null | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} |
GHSA | GHSA-q2qr-3c2p-9235 | Denial of Service (DoS) in HashiCorp Consul | HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4. | {'CVE-2020-12758'} | 2022-04-12T22:55:15Z | 2022-02-15T01:57:18Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/7783', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12758', 'https://github.com/advisories/GHSA-q2qr-3c2p-9235', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'} | null | {'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'} | {'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'} |
GHSA | GHSA-4m8h-h59m-m34j | Prototype Pollution in bmoor | The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664) | {'CVE-2021-23558'} | 2022-02-07T21:21:00Z | 2022-02-01T00:50:09Z | HIGH | 7.3 | {'CWE-1321'} | {'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23558', 'https://github.com/advisories/GHSA-4m8h-h59m-m34j'} | null | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} |
GHSA | GHSA-wmx6-vxcf-c3gr | Validation Bypass in slp-validate | Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.
## Recommendation
Upgrade to version 1.0.1 or later. | {'CVE-2019-16761'} | 2021-01-08T20:11:32Z | 2019-11-15T23:10:19Z | CRITICAL | 5.7 | {'CWE-20'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://www.npmjs.com/advisories/1422', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'} | null | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} |
GHSA | GHSA-ghww-cv4v-hmxx | Cross-Site Request Forgery microweber | microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2022-0638'} | 2022-02-26T01:13:33Z | 2022-02-18T00:00:34Z | MODERATE | 4.3 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0638', 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8', 'https://huntr.dev/bounties/9d3d883c-d74c-4fe2-9978-a8e3d1ccf9f3', 'https://github.com/advisories/GHSA-ghww-cv4v-hmxx'} | null | {'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'} | {'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'} |
GHSA | GHSA-77jf-fjjf-xcww | Invalid Curve Attack in openpgp | Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key.
## Recommendation
Upgrade to version 4.3.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0 | {'CVE-2019-9155'} | 2021-07-27T21:15:19Z | 2019-08-23T21:42:22Z | MODERATE | 5.9 | {'CWE-327'} | {'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1159', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225', 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e', 'https://github.com/openpgpjs/openpgpjs/pull/853', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155', 'https://github.com/advisories/GHSA-77jf-fjjf-xcww'} | null | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} |
GHSA | GHSA-f3rf-v9qm-9c89 | Cross-site Scripting in the femanager TYPO3 extension | The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website.
Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 core since versions 9.5.28, 10.4.18 and 11.3.0) to prevent upload of malicious SVG files or to set up a strict Content Security Policy for the destination folder of uploaded images. | {'CVE-2021-36787'} | 2022-01-26T22:27:17Z | 2021-09-01T18:36:51Z | MODERATE | 0 | {'CWE-79'} | {'http://seclists.org/fulldisclosure/2022/Jan/53', 'https://github.com/in2code-de/femanager/releases/tag/6.3.1', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010', 'https://typo3.org/help/security-advisories/security', 'https://extensions.typo3.org/extension/femanager/', 'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2', 'https://github.com/advisories/GHSA-f3rf-v9qm-9c89', 'http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36787'} | null | {'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'} | {'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'} |
GHSA | GHSA-v8v8-6859-qxm4 | Arbitrary shell command execution in logkitty | Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1. | {'CVE-2020-8149'} | 2021-01-08T20:12:59Z | 2020-06-05T14:47:02Z | HIGH | 0 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://hackerone.com/reports/825729', 'https://github.com/advisories/GHSA-v8v8-6859-qxm4', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf', 'https://github.com/zamotany/logkitty/pull/18'} | null | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} |
GHSA | GHSA-26hm-r6mg-963c | SQL Injection in JeecgBoot | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch. | {'CVE-2021-46089'} | 2022-02-10T22:58:39Z | 2022-01-26T00:01:25Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46089', 'https://github.com/jeecgboot/jeecg-boot/issues/3331', 'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0', 'https://github.com/advisories/GHSA-26hm-r6mg-963c'} | null | {'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'} | {'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'} |
GHSA | GHSA-74cr-77xc-8g6r | Prototype Pollution in @apollo/gateway | Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
Upgrade to version 0.6.2 or later.
| null | 2021-08-16T15:28:22Z | 2019-06-13T20:37:39Z | HIGH | 7.3 | {'CWE-400', 'CWE-1321'} | {'https://github.com/advisories/GHSA-74cr-77xc-8g6r', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://github.com/apollographql/apollo-server/pull/2779', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915', 'https://www.npmjs.com/advisories/917'} | null | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} |
GHSA | GHSA-h2fj-77wh-fh5w | Cross-site Scripting in livehelperchat | Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v. | {'CVE-2022-0612'} | 2022-02-24T13:52:13Z | 2022-02-17T00:00:36Z | MODERATE | 6.7 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0612', 'https://github.com/advisories/GHSA-h2fj-77wh-fh5w', 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b', 'https://huntr.dev/bounties/eadcf7d2-a479-4901-abcc-1505d3f1b32f'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'} | {'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'} |
GHSA | GHSA-h4m4-pgp4-whgm | The reset password form reveal users email address | ### Impact
The reset password form reveals the email address of users just by giving their username.
### Patches
The problem has been patched on XWiki 13.2RC1.
### Workarounds
It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2
### References
https://jira.xwiki.org/browse/XWIKI-18400
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xiwki.org)
* Email us at [Security ML](mailto:security@xwiki.org)
| {'CVE-2021-32731'} | 2021-07-13T14:00:59Z | 2021-07-02T19:19:04Z | MODERATE | 5.3 | {'CWE-200', 'CWE-668'} | {'https://github.com/advisories/GHSA-h4m4-pgp4-whgm', 'https://jira.xwiki.org/browse/XWIKI-18400', 'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm'} | null | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'} | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'} |
GHSA | GHSA-4rcq-jv2f-898j | Incorrect Provision of Specified Functionality in qutebrowser | # Description
After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has seen a certificate error prompt at this point (or set `content.ssl_strict` to `false` which is not recommended), this could still provide a false sense of security.
# Affected versions and patches
All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested.
The issue is fixed in qutebrowser v1.11.1 (pending release) and v1.12.0 (unreleased). Backported patches for older versions are available, but no further releases are planned.
# Mitigation
If you are unable to upgrade:
- Treat any host with a certificate exception as insecure, ignoring the URL color
- Or set `content.ssl_strict` to `True` (instead of `'ask'`), preventing certificate exceptions
# References
- qutebrowser issue: https://github.com/qutebrowser/qutebrowser/issues/5403
- Fix (master branch): https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975
- Related issue for KDE Falkon: https://bugs.kde.org/show_bug.cgi?id=420902
- Related issue for eric6 Web Browser: https://tracker.die-offenbachs.homelinux.org/eric/issue328 (fixed in eric6 20.6) | {'CVE-2020-11054'} | 2022-04-19T19:02:25Z | 2020-05-08T19:05:05Z | LOW | 3.5 | {'CWE-684'} | {'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11054', 'https://bugs.kde.org/show_bug.cgi?id=420902', 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/issues/5403', 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKAZOOTJ2MBHTYVYQQ52NL53F5CB2XAP/', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3', 'https://tracker.die-offenbachs.homelinux.org/eric/issue328', 'https://github.com/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467'} | null | {'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327'} | {'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975'} |
GHSA | GHSA-vf23-f26f-mjj9 | Moderate severity vulnerability that affects yourls/yourls | ## Type juggling vulnerability in the API
### Impact
YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass.
### Patches
https://github.com/YOURLS/YOURLS/releases/tag/1.7.4
https://github.com/YOURLS/YOURLS/pull/2542
### References
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14537
* https://github.com/Wocanilo/CVE-2019-14537
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [YOURLS repository](https://github.com/YOURLS/YOURLS) | {'CVE-2019-14537'} | 2021-09-20T21:42:52Z | 2019-09-23T18:32:02Z | CRITICAL | 9.8 | {'CWE-843'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/commits/master', 'https://github.com/advisories/GHSA-vf23-f26f-mjj9', 'https://github.com/YOURLS/YOURLS/pull/2542', 'https://github.com/Wocanilo/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/security/advisories/GHSA-vf23-f26f-mjj9', 'https://security-garage.com/index.php/cves/cve-2019-14537-api-authentication-bypass-via-type-juggling', 'https://github.com/YOURLS/YOURLS/releases'} | null | {'https://github.com/YOURLS/YOURLS/commits/master'} | {'https://github.com/YOURLS/YOURLS/commits/master'} |
GHSA | GHSA-c5gj-w4hx-gvmx | Business Logic Errors in microweber | Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart. | {'CVE-2022-0688'} | 2022-02-26T01:15:47Z | 2022-02-21T00:00:21Z | LOW | 2.7 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0688', 'https://huntr.dev/bounties/051ec6d4-0b0a-41bf-9ded-27813037c9c9', 'https://github.com/advisories/GHSA-c5gj-w4hx-gvmx', 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} | null | {'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} | {'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} |
GHSA | GHSA-3qr6-qrqm-8v86 | Integer Overflow or Wraparound in Microweber | In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters. | {'CVE-2022-1036'} | 2022-03-30T20:49:26Z | 2022-03-23T00:00:23Z | HIGH | 7.5 | {'CWE-190'} | {'https://github.com/advisories/GHSA-3qr6-qrqm-8v86', 'https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424', 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036'} | null | {'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'} | {'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'} |
GHSA | GHSA-wqq8-mqj9-697f | PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841 | ### Impact
We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/).
### Patches
In the [security patch](https://github.com/PrestaShop/autoupgrade/releases/tag/v4.10.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
### Workarounds
Users can also simply remove the unwanted vendor/phpunit folder.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-9841
### For more information
If you have any questions or comments about this advisory, email us at security@prestashop.com | null | 2020-01-08T03:10:30Z | 2020-01-08T03:10:30Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-wqq8-mqj9-697f', 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f', 'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} | null | {'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} | {'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} |
GHSA | GHSA-qhh5-9738-g9mx | Incorrect Default Permissions in Apache DolphinScheduler | Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface. | {'CVE-2020-13922'} | 2022-02-09T22:26:32Z | 2022-02-09T22:26:32Z | MODERATE | 6.5 | {'CWE-276'} | {'https://www.mail-archive.com/announce@apache.org/msg06076.html', 'https://github.com/advisories/GHSA-qhh5-9738-g9mx', 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13922'} | null | {'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'} | {'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'} |
GHSA | GHSA-x2mc-8fgj-3wmr | Improper Input Validation in tar-fs | A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. | {'CVE-2018-20835'} | 2021-08-03T21:27:51Z | 2019-05-01T18:37:18Z | HIGH | 7.5 | {'CWE-20'} | {'https://hackerone.com/reports/344595', 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835', 'https://github.com/advisories/GHSA-x2mc-8fgj-3wmr', 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} | null | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} |
GHSA | GHSA-w46j-8hm6-h8mm | XSS in apexcharts | The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields. | {'CVE-2021-23327'} | 2021-02-11T20:47:34Z | 2021-02-11T20:47:34Z | MODERATE | 0 | {'CWE-79'} | {'https://www.npmjs.com/package/apexcharts', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/advisories/GHSA-w46j-8hm6-h8mm', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327'} | null | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} |
GHSA | GHSA-mp9m-g7qj-6vqr | Unauthorized privilege escalation in Mod module | ### Impact
An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in.
### Patches
This exploit has been fixed on version & ``3.4.1``.
### Workarounds
Unloading the Mod module with ``unload mod`` __or__, disabling the ``massban`` command with ``command disable global massban`` can render this exploit not accessible. We still highly recommend updating to ``3.4.1`` to completely patch this issue.
### References
* https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red) | null | 2022-04-19T19:02:39Z | 2020-10-27T20:30:48Z | MODERATE | 0 | {'CWE-285'} | {'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr', 'https://github.com/advisories/GHSA-mp9m-g7qj-6vqr', 'https://pypi.org/project/Red-DiscordBot/', 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} | null | {'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} | {'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} |
GHSA | GHSA-4q96-6xhq-ff43 | malicious SVG attachment causing stored XSS vulnerability | ### Impact
An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
### Workarounds
It is not advised to work around this, but to upgrade MoinMoin to a patched version.
That said, a work around via a Content Security Policy in the web server might be possible.
Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
### For more information
If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).
### Credits
This vulnerability was discovered by:
Catarina Leite from the Checkmarx SCA AppSec team | {'CVE-2020-15275'} | 2021-04-05T20:33:18Z | 2020-11-11T15:54:41Z | LOW | 8.7 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15275', 'https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11', 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2', 'https://advisory.checkmarx.net/advisory/CX-2020-4285', 'https://github.com/advisories/GHSA-4q96-6xhq-ff43', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43', 'https://pypi.org/project/moin/'} | null | {'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2'} | {'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2'} |
GHSA | GHSA-28w5-j8xj-2xwc | Cross-site Scripting in the yoast_seo TYPO3 extension | The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | {'CVE-2021-36788'} | 2021-09-01T18:36:44Z | 2021-09-01T18:36:44Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-28w5-j8xj-2xwc', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-012', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'} | null | {'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'} | {'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'} |
GHSA | GHSA-rwr3-c2q8-gm56 | Moderate severity vulnerability that affects Pillow | Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component. | {'CVE-2016-9189'} | 2021-09-20T14:45:13Z | 2018-07-24T20:08:27Z | MODERATE | 5.5 | {'CWE-190'} | {'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189', 'http://www.securityfocus.com/bid/94234', 'https://github.com/python-pillow/Pillow/issues/2105', 'http://www.debian.org/security/2016/dsa-3710', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-rwr3-c2q8-gm56', 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'} | null | {'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'} | {'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'} |
GHSA | GHSA-wrvc-72w7-xpmj | Incorrect Comparison in sodiumoxide | An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties. | {'CVE-2019-25002'} | 2021-08-25T20:45:54Z | 2021-08-25T20:45:54Z | CRITICAL | 9.8 | {'CWE-697'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-25002', 'https://github.com/advisories/GHSA-wrvc-72w7-xpmj', 'https://github.com/sodiumoxide/sodiumoxide/pull/381', 'https://rustsec.org/advisories/RUSTSEC-2019-0026.html', 'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070'} | null | {'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070'} | {'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070'} |
GHSA | GHSA-jr37-66pj-36v7 | Cross-site Scripting in DayByDay CRM | In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks. | {'CVE-2022-22109'} | 2022-01-10T21:46:19Z | 2022-01-08T00:32:00Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22109', 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2', 'https://github.com/advisories/GHSA-jr37-66pj-36v7', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'} | {'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'} |
GHSA | GHSA-gqgv-6jq5-jjj9 | Prototype Pollution Protection Bypass in qs | Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
## Recommendation
Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later. | {'CVE-2017-1000048'} | 2021-08-25T21:03:57Z | 2020-04-30T17:16:47Z | HIGH | 7.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://github.com/ljharb/qs/issues/200', 'https://snyk.io/vuln/npm:qs:20170213', 'https://github.com/advisories/GHSA-gqgv-6jq5-jjj9', 'https://www.npmjs.com/advisories/1469', 'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} | null | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} |
GHSA | GHSA-fc38-mxwr-pfhx | Cross-Site Scripting via SVG media files | ### Impact
Cross-Site Scripting via SVG media files
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | {'CVE-2021-37710'} | 2021-08-23T19:43:00Z | 2021-08-23T19:43:00Z | HIGH | 8 | {'CWE-79'} | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423', 'https://github.com/advisories/GHSA-fc38-mxwr-pfhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710', 'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx'} | null | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'} | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'} |
GHSA | GHSA-v39p-96qg-c8rf | Prototype Pollution in object-path | This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different. | {'CVE-2021-23434'} | 2021-10-05T16:03:38Z | 2021-09-01T18:37:11Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423', 'https://github.com/mariocasciaro/object-path#0116', 'https://github.com/advisories/GHSA-v39p-96qg-c8rf', 'https://github.com/mariocasciaro/object-path%230116', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434', 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} | null | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} |
GHSA | GHSA-r89v-cgv7-3jhx | Bypass of fix for CVE-2020-15247, Twig sandbox escape | ### Impact
A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247:
An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP.
This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP.
### Patches
Issue has been patched in Build 470 (v1.0.470) and v1.1.1.
### Workarounds
Apply https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7 to your installation manually if unable to upgrade to Build 470 or v1.1.1.
### References
Reported by [ka1n4t](https://github.com/ka1n4t)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1108" alt="Screen Shot 2020-10-10 at 1 21 13 PM" src="https://user-images.githubusercontent.com/7253840/95663316-7de28b80-0afb-11eb-999d-a6526cf78709.png"> | {'CVE-2020-26231'} | 2022-04-19T19:02:40Z | 2020-11-23T20:54:18Z | LOW | 5.2 | {'CWE-862'} | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231', 'https://github.com/advisories/GHSA-r89v-cgv7-3jhx', 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx'} | null | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'} | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'} |
GHSA | GHSA-jm5c-rv3w-w83m | Denial of service in geth | ### Impact
Denial-of-service (crash) during block processing
### Details
Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library.
The crash was in the `uint256` library, where a buffer [underflowed](https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L442).
if `d == 0`, `dLen` remains `0`
and https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L451 will try to access index `[-1]`.
The `uint256` library was first merged in this [commit](https://github.com/ethereum/go-ethereum/commit/cf6674539c589f80031f3371a71c6a80addbe454), on 2020-06-08.
Exploiting this vulnerabilty would cause all vulnerable nodes to drop off the network.
The issue was brought to our attention through a [bug report](https://github.com/ethereum/go-ethereum/issues/21367), showing a `panic` occurring on sync from genesis on the Ropsten network.
It was estimated that the least obvious way to fix this would be to merge the fix into `uint256`, make a new release of that library and then update the geth-dependency.
- https://github.com/holiman/uint256/releases/tag/v1.1.1 was made the same day,
- PR to address the issue: https://github.com/holiman/uint256/pull/80
- PR to update geth deps: https://github.com/ethereum/go-ethereum/pull/21368
### Patches
Upgrade to v1.9.18 or higher
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org) | {'CVE-2020-26242'} | 2021-06-29T21:13:20Z | 2021-06-29T21:13:20Z | MODERATE | 6.5 | {'CWE-400', 'CWE-191', 'CWE-125'} | {'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m', 'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196', 'https://github.com/advisories/GHSA-jm5c-rv3w-w83m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26242'} | null | {'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'} | {'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'} |
GHSA | GHSA-qv2v-m59f-v5fw | Insecure randomness in socket.io | Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization.
## Recommendation
Update to v0.9.7 or later. | {'CVE-2017-16031'} | 2021-09-16T21:04:34Z | 2018-11-07T00:29:37Z | HIGH | 7.5 | {'CWE-330'} | {'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://github.com/socketio/socket.io/pull/857', 'https://nodesecurity.io/advisories/321', 'https://www.npmjs.com/advisories/321', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031', 'https://github.com/socketio/socket.io/issues/856', 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} | null | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} |
GHSA | GHSA-34jx-wx69-9x8v | Symlink Attack in kubectl cp | The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0. | {'CVE-2019-1002101'} | 2022-04-12T22:40:43Z | 2022-02-15T01:57:18Z | MODERATE | 5.5 | {'CWE-59'} | {'http://www.securityfocus.com/bid/107652', 'https://access.redhat.com/errata/RHBA-2019:0636', 'https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/', 'https://github.com/advisories/GHSA-34jx-wx69-9x8v', 'https://github.com/kubernetes/kubernetes/pull/75037', 'https://access.redhat.com/errata/RHBA-2019:0620', 'https://access.redhat.com/errata/RHBA-2019:0619', 'http://www.openwall.com/lists/oss-security/2019/06/21/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1002101', 'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013', 'http://www.openwall.com/lists/oss-security/2019/08/05/5'} | null | {'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'} | {'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'} |
GHSA | GHSA-gjqc-q9g6-q2j3 | `CHECK`-failures in binary ops in Tensorflow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [any binary op](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137) would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved:
```cc
functor::BinaryFunctor<Device, Functor, 1>()(
eigen_device, out->template flat<Tout>(),
input_0.template flat<Tin>(), input_1.template flat<Tin>(),
error_ptr);
```
If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service.
### Patches
We have patched the issue in GitHub commit [a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9](https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23583'} | 2022-02-11T20:37:11Z | 2022-02-10T00:34:13Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-gjqc-q9g6-q2j3', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23583', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3'} | null | {'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'} | {'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'} |
GHSA | GHSA-mq5p-2mcr-m52j | Code injection in nbgitpuller | ### Impact
Due to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment.
### Patches
0.10.2
### Workarounds
None, other than upgrade to 0.10.2 or downgrade to 0.8.x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [nbgitpuller](https://github.com/jupyterhub/nbgitpuller/issues)
* Email our security team at [security@ipython.org](mailto:security@ipython.org)
| {'CVE-2021-39160'} | 2022-03-22T21:07:19Z | 2021-08-30T16:17:06Z | CRITICAL | 0 | {'CWE-94'} | {'https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25', 'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481', 'https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39160', 'https://github.com/advisories/GHSA-mq5p-2mcr-m52j'} | null | {'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481'} | {'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481'} |
GHSA | GHSA-rg3m-hqc5-344v | `SparseFillEmptyRows` heap OOB | ### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L194-L241) of `SparseFillEmptyRows` can be made to trigger a heap OOB access:
```python
import tensorflow as tf
data=tf.raw_ops.SparseFillEmptyRows(
indices=[[0,0],[0,0],[0,0]],
values=['sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss'],
dense_shape=[5,3],
default_value='o')
```
This occurs whenever the size of `indices` does not match the size of `values`.
### Patches
We have patched the issue in GitHub commit [67bfd9feeecfb3c61d80f0e46d89c170fbee682b](https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41224'} | 2021-11-10T18:45:55Z | 2021-11-10T18:45:55Z | HIGH | 7.1 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41224', 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b', 'https://github.com/advisories/GHSA-rg3m-hqc5-344v'} | null | {'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} | {'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} |
GHSA | GHSA-2xmm-g482-4439 | DQL injection through sorting parameters blocked | ### Impact
Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway.
### Patches
The issue is fixed in version 1.10.1 and in 1.11-rc.1
### Workarounds
You have to overwrite your `Sylius\Component\Grid\Sorting\Sorter.php` class:
```php
<?php
// src/App/Sorting/Sorter.php
declare(strict_types=1);
namespace App\Sorting;
use Symfony\Component\HttpKernel\Exception\BadRequestHttpException;
use Sylius\Component\Grid\Data\DataSourceInterface;
use Sylius\Component\Grid\Definition\Grid;
use Sylius\Component\Grid\Parameters;
use Sylius\Component\Grid\Sorting\SorterInterface;
final class Sorter implements SorterInterface
{
public function sort(DataSourceInterface $dataSource, Grid $grid, Parameters $parameters): void
{
$enabledFields = $grid->getFields();
$expressionBuilder = $dataSource->getExpressionBuilder();
$sorting = $parameters->get('sorting', $grid->getSorting());
$this->validateSortingParams($sorting, $enabledFields);
foreach ($sorting as $field => $order) {
$this->validateFieldNames($field, $enabledFields);
$gridField = $grid->getField($field);
$property = $gridField->getSortable();
if (null !== $property) {
$expressionBuilder->addOrderBy($property, $order);
}
}
}
private function validateSortingParams(array $sorting, array $enabledFields): void
{
foreach (array_keys($enabledFields) as $key) {
if (array_key_exists($key, $sorting) && !in_array($sorting[$key], ['asc', 'desc'])) {
throw new BadRequestHttpException(sprintf('%s is not valid, use asc or desc instead.', $sorting[$key]));
}
}
}
private function validateFieldNames(string $fieldName, array $enabledFields): void
{
$enabledFieldsNames = array_keys($enabledFields);
if (!in_array($fieldName, $enabledFieldsNames, true)) {
throw new BadRequestHttpException(sprintf('%s is not valid field, did you mean one of these: %s?', $fieldName, implode(', ', $enabledFieldsNames)));
}
}
}
```
and register it in your container:
```yaml
# config/services.yaml
services:
# ...
sylius.grid.sorter:
class: App\Sorting\Sorter
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at [security@sylius.com](mailto:security@sylius.com) | {'CVE-2022-24752'} | 2022-04-19T19:03:27Z | 2022-03-15T19:09:16Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439', 'https://github.com/advisories/GHSA-2xmm-g482-4439', 'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784', 'https://github.com/Sylius/SyliusGridBundle/pull/222', 'https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24752', 'https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2'} | null | {'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'} | {'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'} |
GHSA | GHSA-rxch-gp62-574w | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-4108'} | 2022-01-04T19:01:10Z | 2021-12-16T14:13:27Z | MODERATE | 6.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4108', 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4', 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2', 'https://github.com/advisories/GHSA-rxch-gp62-574w'} | null | {'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'} | {'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'} |
GHSA | GHSA-44cw-p2hm-gpf6 | Disabled Hostname Verification in Opencast | Opencast before version 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests.
Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks.
### Patches
This problem is fixed in Opencast 7.9 and Opencast 8.9
### Self-Signed Certificates
Please be aware that fixing the problem means that Opencast will not simply accept any self-signed certificates any longer without properly importing them. If you need those, please make sure to import them into the Java key store. Better yet, get a valid certificate e.g. from [Let's Encrypt](https://letsencrypt.org). | {'CVE-2020-26234'} | 2022-04-19T19:02:40Z | 2020-12-08T22:37:59Z | HIGH | 4.8 | {'CWE-297'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26234', 'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc', 'https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6', 'https://github.com/advisories/GHSA-44cw-p2hm-gpf6'} | null | {'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'} | {'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'} |
GHSA | GHSA-vc9j-fhvv-8vrf | Remote Code Execution in scratch-vm | MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented.
NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts. | {'CVE-2020-14000'} | 2021-09-22T21:24:08Z | 2020-07-27T19:55:52Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://github.com/advisories/GHSA-vc9j-fhvv-8vrf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000', 'https://github.com/LLK/scratch-vm/pull/2476'} | null | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} |
GHSA | GHSA-gq9m-qvpx-68hc | Insufficient Entropy in werkzeug | Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id. | {'CVE-2019-14806'} | 2021-08-17T21:13:25Z | 2019-08-21T16:15:24Z | HIGH | 7.5 | {'CWE-331'} | {'https://github.com/advisories/GHSA-gq9m-qvpx-68hc', 'https://palletsprojects.com/blog/werkzeug-0-15-3-released/', 'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246', 'https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14806'} | null | {'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'} | {'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'} |
GHSA | GHSA-fj59-f6c3-3vw4 | Command Injection in systeminformation | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()`
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation) | {'CVE-2020-26300'} | 2022-04-27T18:18:55Z | 2020-10-27T20:40:00Z | MODERATE | 5.9 | {'CWE-78'} | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607', 'https://www.npmjs.com/package/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4', 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4'} | null | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} |
GHSA | GHSA-m8fw-534v-xm85 | Cross-Site Scripting (XSS) in cloudcmd | Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable.
## Recommendation
Update to version 9.1.6 or later. | null | 2021-08-04T20:42:50Z | 2019-06-04T15:43:29Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-m8fw-534v-xm85', 'https://www.npmjs.com/advisories/642', 'https://hackerone.com/reports/341044)', 'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38', 'https://hackerone.com/reports/341044'} | null | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} |
GHSA | GHSA-7v3x-h7r2-34jv | Insufficient Session Expiration in Pterodactyl API | ### Impact
A vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to.
It is important to note that **a malicious user must first compromise an existing API key for a user to exploit this issue**. It cannot be exploited by chance, and requires a coordinated attack against an individual account using a known API key.
### Patches
This issue has been addressed in the `v1.7.0` release of Pterodactyl Panel.
### Workarounds
Those not wishing to upgrade may apply the change below:
```diff
diff --git a/app/Http/Middleware/Api/AuthenticateKey.php b/app/Http/Middleware/Api/AuthenticateKey.php
index eb25dac6..857bfab2 100644
--- a/app/Http/Middleware/Api/AuthenticateKey.php
+++ b/app/Http/Middleware/Api/AuthenticateKey.php
@@ -70,7 +70,7 @@ class AuthenticateKey
} else {
$model = $this->authenticateApiKey($request->bearerToken(), $keyType);
- $this->auth->guard()->loginUsingId($model->user_id);
+ $this->auth->guard()->onceUsingId($model->user_id);
}
```
### For more information
If you have any questions or comments about this advisory please reach out to `Tactical Fish#8008` on [Discord](https://discord.gg/pterodactyl) or email `dane@pterodactyl.io`.
| null | 2022-04-19T19:03:20Z | 2022-01-21T18:43:05Z | MODERATE | 6 | {'CWE-613'} | {'https://github.com/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/releases/tag/v1.7.0', 'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} | null | {'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} | {'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} |
GHSA | GHSA-vmm6-w4cf-7f3x | Authentication Bypass For Endpoints With Anonymous Access in Opencast | ### Impact
Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access.
This way, an attacker can, for example, fake a remember-me token, assume the identity of the global system administrator and request non-public content from the search service without ever providing any proper authentication.
### Patches
This problem is fixed in Opencast 7.6 and Opencast 8.1
### Workarounds
As a workaround for older, unpatched versions, disabling remember-me cookies in `etc/security/mh_default_org.xml` will mitigate the problem but will obviously also disable this feature without obvious indication. To deactivate this, remove the following line from the security configuration:
```xml
<sec:remember-me … />
```
### References
- [Remember-me cookie in the security configuration file](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5206'} | 2021-10-20T18:03:08Z | 2020-01-30T21:21:30Z | CRITICAL | 8.7 | {'CWE-285'} | {'https://github.com/advisories/GHSA-vmm6-w4cf-7f3x', 'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5206', 'https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x'} | null | {'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'} | {'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'} |
GHSA | GHSA-6pj2-5fqq-xvjc | Incorrect Authorization in latte/latte | This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions. | {'CVE-2021-23803'} | 2022-01-06T20:56:27Z | 2022-01-06T20:56:27Z | CRITICAL | 9.8 | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23803', 'https://github.com/nette/latte/issues/279', 'https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226', 'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210', 'https://github.com/advisories/GHSA-6pj2-5fqq-xvjc'} | null | {'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'} | {'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'} |
GHSA | GHSA-9w4w-cpc8-h2fq | Exposure of Sensitive Information to an Unauthorized Actor in httpie | ### Impact
HTTPie have the practical concept of [sessions](https://httpie.io/docs/cli/sessions), which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. As an example, we can make an authenticated request and save it to a [named session](https://httpie.io/docs/cli/named-sessions) called `api`:
```bash
$ http --session api -a user:pass pie.dev/basic-auth/user/pass
```
```json
{
"authenticated": true,
"user": "user"
}
```
Since we have now saved the authentication data to that session, we won‘t have to enter it again and again on every invocation. We can simply reference the session, and HTTPie will use the saved state directly from it:
```bash
$ http --session api pie.dev/basic-auth/user/pass
```
```json
{
"authenticated": true,
"user": "user"
}
```
One particular use case of these sessions is storing cookies (commonly referred to as a `Cookie Jar`). If a response has a `Set-Cookie`
header, HTTPie will parse it and store the actual cookie in the session. And from that point on, all outgoing requests will attach that cookie (in the form of a `Cookie` header).
This is extremely useful, especially when you are dealing with websites which manage their own state on the client-side through cookies.
```bash
$ http -F --session jar pie.dev/cookies/set/x/y
```
```json
{
"cookies": {
"x": "y"
}
}
```
Before `3.1.0`, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website, e.g:
```bash
$ http -F --session jar pie.dev/redirect-to url==https://httpbin.org/cookies
```
(Pre 3.1.0)
```json
{
"cookies": {
"x": "y"
}
}
```
(Post 3.1.0)
```json
{
"cookies": {}
}
```
This behavior has been corrected in this release (with taking [RFC 6265 — HTTP State Management Mechanism](https://datatracker.ietf.org/doc/html/rfc6265) into the consideration).
A huge credit goes to [@Glyph](https://github.com/glyph) for disclosing the original vulnerability to us (through [huntr.dev](http://huntr.dev/)).
### Patches
We suggest users to upgrade their HTTPie version to `3.1.0` or higher, and run `httpie cli sessions upgrade` command on their sessions.
### For more information
If you have any questions or comments about this advisory:
* Email us: [`security@httpie.io`](mailto:security@httpie.io)
> Please note that this entry is covered by both [CVE-2022-24737](https://www.cvedetails.com/cve/CVE-2022-24737) and [CVE-2022-0430](https://nvd.nist.gov/vuln/detail/CVE-2022-0430).
| {'CVE-2022-24737'} | 2022-03-29T22:16:58Z | 2022-03-07T23:44:28Z | MODERATE | 6.5 | {'CWE-200'} | {'https://github.com/advisories/GHSA-9w4w-cpc8-h2fq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QZD2AZOL7XLNZVAV6GDNXYU6MFRU5RS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5VYSYKEKVZEVEBIWAADGDXG4Y3EWCQ3/', 'https://github.com/httpie/httpie/releases/tag/3.1.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24737', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXFCHGTW3V32GD6GXXJZE5QAOSDT3RTY/', 'https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq'} | null | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} |
GHSA | GHSA-pw54-mh39-w3hc | Regular expression denial of service in npm-user-validate | This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters. | {'CVE-2020-7754'} | 2021-05-10T19:08:15Z | 2021-05-10T19:08:15Z | HIGH | 7.5 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://github.com/advisories/GHSA-pw54-mh39-w3hc', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p', 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} | null | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} |
GHSA | GHSA-h97g-4mx7-5p2p | Open Redirect in apostrophe | Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end.
## Recommendation
Update to version 2.92.0 or later. | null | 2021-09-28T21:18:58Z | 2020-09-03T17:11:36Z | MODERATE | 0 | {'CWE-601'} | {'https://github.com/advisories/GHSA-h97g-4mx7-5p2p', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089', 'https://www.npmjs.com/advisories/1029', 'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} | null | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} |
GHSA | GHSA-mm8j-9x84-m9cv | Arbitrary code injection in json-sanitizer | OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents. | {'CVE-2021-23899'} | 2021-06-16T17:34:18Z | 2021-06-16T17:34:18Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899', 'https://github.com/advisories/GHSA-mm8j-9x84-m9cv'} | null | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} |
GHSA | GHSA-8p8g-f9vg-r7xr | Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit | Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path parameter on POST, PUT or DELETE request. This vulnerability appears to have been fixed in 2.5.0 and later. | {'CVE-2018-1000850'} | 2021-09-07T20:25:07Z | 2018-12-21T17:48:19Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982', 'https://github.com/square/retrofit/blob/master/CHANGELOG.md', 'https://ihacktoprotect.com/post/retrofit-path-traversal/'} | null | {'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'} | {'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'} |
GHSA | GHSA-pjjf-hc4q-g298 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3775'} | 2021-11-17T21:11:30Z | 2021-11-15T23:16:17Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-pjjf-hc4q-g298', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3775', 'https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3'} | null | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} |
GHSA | GHSA-rwv8-jvff-jq28 | Path Traversal in public | Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.
## Recommendation
Update to version 0.1.3 or later. | {'CVE-2018-3731'} | 2021-01-08T01:57:45Z | 2018-07-18T21:20:30Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://hackerone.com/reports/312918', 'https://www.npmjs.com/advisories/571', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731'} | null | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} |
GHSA | GHSA-8m28-w6xg-35hw | Cross-Site Request Forgery (CSRF) in livehelperchat | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2022-0231'} | 2022-01-26T20:22:08Z | 2022-01-26T20:22:08Z | MODERATE | 6.5 | {'CWE-352'} | {'https://github.com/advisories/GHSA-8m28-w6xg-35hw', 'https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf', 'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0231'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'} | {'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'} |
GHSA | GHSA-vpc2-7xmf-ppmf | Out-of-bounds Write in ChakraCore | Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054. | {'CVE-2020-17048'} | 2021-08-02T17:26:11Z | 2021-08-02T17:26:11Z | HIGH | 8.1 | {'CWE-787'} | {'https://github.com/advisories/GHSA-vpc2-7xmf-ppmf', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048', 'https://github.com/chakra-core/ChakraCore/pull/6528'} | null | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'} | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'} |
GHSA | GHSA-5hj3-vjjf-f5m7 | Heap OOB in `SdcaOptimizerV2` | ### Impact
An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`:
```python
import tensorflow as tf
tf.raw_ops.SdcaOptimizerV2(
sparse_example_indices=[[1]],
sparse_feature_indices=[[1]],
sparse_feature_values=[[1.0,2.0]],
dense_features=[[1.0]],
example_weights=[1.0],
example_labels=[],
sparse_indices=[1],
sparse_weights=[1.0],
dense_weights=[[1.0]],
example_state_data=[[100.0,100.0,100.0,100.0]],
loss_type='logistic_loss',
l1=100.0,
l2=100.0,
num_loss_partitions=1,
num_inner_iterations=1,
adaptive=True)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/sdca_internal.cc#L320-L353) does not check that the length of `example_labels` is the same as the number of examples.
### Patches
We have patched the issue in GitHub commit [a4e138660270e7599793fa438cd7b2fc2ce215a6](https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37672'} | 2021-08-25T14:41:39Z | 2021-08-25T14:41:39Z | MODERATE | 5.5 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37672', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7', 'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6', 'https://github.com/advisories/GHSA-5hj3-vjjf-f5m7'} | null | {'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6'} | {'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6'} |
GHSA | GHSA-hfg5-xpvw-c9x4 | Improper Input Validation in Apache Camel | Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel users should upgrade to 3.2.0. | {'CVE-2020-11971'} | 2022-04-22T18:21:41Z | 2021-05-21T19:20:30Z | HIGH | 7.5 | {'CWE-20'} | {'https://issues.apache.org/jira/browse/CAMEL-14811', 'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c', 'http://www.openwall.com/lists/oss-security/2020/05/14/7', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r7968b5086e861da2cf635a7b215e465ce9912d5f16c683b8e56819c4@%3Ccommits.camel.apache.org%3E', 'https://camel.apache.org/security/CVE-2020-11971.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r3d0ae14ca224e69fb1c653f0a5d9e56370ee12d8896aa4490aeae14a@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/rb0033c4e9dade1fdf22493314062364ff477e9a8b417f687dc168468@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11971', 'https://lists.apache.org/thread.html/r16f4f9019840bc923e25d1b029fb42fe2676c4ba36e54824749a8da9@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r938dc2ded68039ab747f6d7a12153862495d4b38107d3ed111994386@%3Cissues.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-hfg5-xpvw-c9x4', 'https://lists.apache.org/thread.html/r45da6abb42a9e6853ec8affdbf591f1db3e90c5288de9d3753124c79@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r8988311eb2481fd8a87e69cf17ffb8dc81bfeba5503021537f72db0a@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rc907a3d385a9c62416d686608e7241c864be8ef2ac16a3bdb0e33649@%3Cissues.activemq.apache.org%3E'} | null | {'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'} | {'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'} |
GHSA | GHSA-gp2m-7cfp-h6gf | Incorrect persistent NameID generation in SimpleSAMLphp | ### Background
When a SimpleSAMLphp Identity Provider is misconfigured, a bug in the software when trying to build a persistent `NameID` to univocally identify the authenticating subject could cause different users to get the same identifier generated, depending on the attributes available for them right after authentication.
Please note that even though this is possible thanks to a bug, **an IdP must be misconfigured** to release persistent `NameID`s even if it is not properly configured to generate them based on the specifics of the deployment.
### Description
Persistent `NameID`s will typically be sent as part of the `Subject` element of a SAML assertion, or as the contents of the `eduPersonTargetedID` attribute. Here is an example of such a `NameID`:
<NameID Format=“urn:oasis:names:tc:SAML:2.0:nameid-format:persistent“>
zbonsm0Yn9Gnw14uQEEPr6AO7d+IvxwCQN3t+o24jYs=
</NameID>
Some service providers will use this information to identify a user across sessions because a persistent `NameID` will never change for a given user. This could lead to different users accessing the same account in those service providers.
In order to be affected by this issue, the following circumstances must concur:
- SimpleSAMLphp acts as an identity provider.
- The service provider asking for authentication requests a persistent `NameID`.
- No `saml:PersistentNameID` authentication processing filter is configured (neither for the whole IdP, nor for a given SP).
- No `simplesaml.nameidattribute` configuration option is set (neither for the whole IdP, nor for a given SP).
- One of the following alternatives:
- No `userid.attribute` configuration option is set **and** the users don't have an `eduPersonPrincipalName` attribute in the users backend, **or**
- the `userid.attribute` configuration option is set to an empty or missing attribute.
If all these requirements are met, the `SimpleSAML_Auth_ProcessingChain` class will try to keep a unique user identifier in the state array (`addUserID()` method). Bear in mind that this code is executed **before** all the authentication processing filters configured, meaning that only those attributes retrieved for the user during **initial authentication** will be available. If no `userid.attribute` configuration option is set, the default `eduPersonPrincipalName` will then be used. However, since it is missing, no identifier will be kept. Alternatively, if `userid.attribute` is set to a missing or empty attribute, the `addUserID()` method will abort trying to register an identifier.
After executing all authentication processing filters, SimpleSAMLphp will build a SAML assertion. If the service provider requests persistent `NameID`s, SimpleSAMLphp will attempt to generate one given that none is already available (because the `saml:PersistentNameID` filter was not used). At this point, the code will look for the `simplesaml.nameidattribute` configuration option in either the local IdP metadata or in the remote SP metadata. If none of them are configured, it will default to the unique user identifier previously registered by `SimpleSAML_Auth_ProcessingChain`. If no identifier was kept there, the code will log an error message:
Unable to generate NameID. Check the userid.attribute option.
However, instead of aborting the `NameID` generation at that point, it will go on and use a value missing from the state array as the source for the computation, meaning the `null` type will be used. Hence, all users connecting to a given service provider will get the same `NameID` generated, because all the input parameters will be the same:
- The SP's entity identifier.
- The IdP's entity identifier.
- The `null` value.
- The common secret salt from the main configuration.
### Affected versions
All SimpleSAMLphp versions between 1.7.0 and 1.14.10, inclusive.
### Impact
Those identity providers affected by this bug and misconfigured as previously described could be issuing SAML assertions with common `NameID`s for all or a subset of their users. If a service provider uses those `NameID`s to identify the users of the affected IdP, all the users will be associated with the same user account at the service provider, causing all sorts of potential security issues like information disclosure or unauthorized access.
While we can consider this unlikely to happen, some cases have been already observed. In particular, some identity providers using default configurations and consuming metadata automatically (i.e. using the _metarefresh_ module) while using a user backend like _Active Directory_ that does not populate `eduPersonPrincipalName` are particularly sensitive to this issue.
### Resolution
Upgrade to the latest version.
Configure a `saml:PersistentNameID` authentication processing filter according to your needs. Remember to check that **the attribute used as the source** for the `NameID` **is present at the moment the `saml:PersistentNameID` filter is executed**. The attribute used must be **unique** per user, and **must not change** over time. | {'CVE-2017-12873'} | 2021-08-19T16:44:18Z | 2020-01-24T21:28:06Z | CRITICAL | 9.8 | {'CWE-384'} | {'https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html', 'https://github.com/advisories/GHSA-gp2m-7cfp-h6gf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12873', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-gp2m-7cfp-h6gf', 'https://www.debian.org/security/2018/dsa-4127', 'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953', 'https://simplesamlphp.org/security/201612-04'} | null | {'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'} | {'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'} |
GHSA | GHSA-p493-635q-r6gr | Remote code execution via the `pretty` option. | ### Impact
If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend.
### Patches
Upgrade to `pug@3.0.1` or `pug-code-gen@3.0.2` or `pug-code-gen@2.0.3`, which correctly sanitise the parameter.
### Workarounds
If there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade.
### References
Original report: https://github.com/pugjs/pug/issues/3312
### For more information
If you believe you have found other vulnerabilities, please **DO NOT** open an issue. Instead, you can follow the instructions in our [Security Policy](https://github.com/pugjs/pug/blob/master/SECURITY.md) | {'CVE-2021-21353'} | 2021-03-04T17:42:33Z | 2021-03-03T02:03:52Z | HIGH | 6.8 | {'CWE-74'} | {'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://github.com/pugjs/pug/issues/3312', 'https://github.com/pugjs/pug/pull/3314', 'https://www.npmjs.com/package/pug-code-gen', 'https://www.npmjs.com/package/pug', 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21353', 'https://github.com/advisories/GHSA-p493-635q-r6gr'} | null | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} |
GHSA | GHSA-7jh9-6cpf-h4m7 | XSS in hello.js | This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1). | {'CVE-2020-7741'} | 2021-09-27T20:56:45Z | 2021-01-13T19:07:01Z | CRITICAL | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7741', 'https://github.com/advisories/GHSA-7jh9-6cpf-h4m7', 'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546'} | null | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.