schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 11
values | aliases
stringlengths 2
20
| summary
stringlengths 4
172
| details
stringlengths 47
3.95k
| severity
stringlengths 2
79
| affected
stringlengths 76
3.32k
| references
stringlengths 82
11.3k
| database_specific
stringlengths 131
190
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-fhjf-83wg-r2j9 | 2021-07-27T21:26:01Z | 2019-08-27T17:42:33Z | null | ['CVE-2019-10746'] | Prototype Pollution in mixin-deep | Versions of `mixin-deep` prior to 2.0.1 or 1.3.2 are vulnerable to Prototype Pollution. The `mixinDeep` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
If you are using `mixin-deep` 2.x, upgrade to version 2.0.1 or later.
If you are using `mixin-deep` 1.x, upgrade to version 1.3.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mixin-deep'}, 'ecosystem_specific': {'affected_functions': ['mixin-deep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mixin-deep'}, 'ecosystem_specific': {'affected_functions': ['mixin-deep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10746'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/mixin-deep/commit/8f464c8ce9761a8c9c2b3457eaeee9d404fa7af9'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/mixin-deep/commit/90ee1fab375fccfd9b926df718243339b4976d50'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1013'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}] | {'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:21:43Z', 'nvd_published_at': '2019-08-23T17:15:00Z'} |
1.4.0 | GHSA-5q54-8p9j-x74j | 2021-08-17T21:59:57Z | 2019-08-23T00:05:03Z | null | ['CVE-2019-14517'] | Cross-site Scripting in pandao editor.md | pandao Editor.md 1.5.0 allows XSS via the Javascript: string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'versions': ['1.5.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14517'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/709'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:08:06Z', 'nvd_published_at': '2019-08-01T23:15:00Z'} |
1.4.0 | GHSA-fp5j-3fpf-mhj5 | 2021-07-27T20:59:48Z | 2019-08-08T15:18:22Z | null | ['CVE-2019-10099'] | Sensitive data written to disk unencrypted in Spark | Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10099'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E'}] | {'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-08T15:16:27Z', 'nvd_published_at': '2019-08-07T17:15:00Z'} |
1.4.0 | GHSA-3j5x-7ccf-ppgm | 2023-09-01T19:51:44Z | 2019-08-21T16:15:33Z | null | ['CVE-2018-20858'] | Cross-site scripting in recommender-xblock | Recommender before 1.3.1 allows XSS. It is possible for a learner to craft a fake resource to recommender, that includes script which could possibly steal credentials from staff if they are lured into viewing the recommended resource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'recommender-xblock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20858'}, {'type': 'WEB', 'url': 'https://github.com/edx/RecommenderXBlock/pull/2'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/openedx-announce/SF8Sn6MuUTg'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T16:05:04Z', 'nvd_published_at': '2019-08-09T16:15:00Z'} |
1.4.0 | GHSA-4g88-fppr-53pp | 2021-08-17T22:17:11Z | 2019-08-27T17:43:33Z | null | ['CVE-2019-10747'] | Prototype Pollution in set-value | Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
If you are using `set-value` 3.x, upgrade to version 3.0.1 or later.
If you are using `set-value` 2.x, upgrade to version 2.0.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10747'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/95e9d9923f8a8b4a01da1ea138fcc39ec7b6b15f'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/cb12f14955dde6e61829d70d1851bfea6a3c31ad'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SETVALUE-450213'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1012'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:24:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gwp4-hfv6-p7hw | 2023-09-13T17:26:54Z | 2019-08-01T19:18:06Z | null | ['CVE-2019-14439'] | Deserialization of untrusted data in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2, 2.8.11.14, 2.7.9.6, and 2.6.7.3. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14439'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2389'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190814-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:37:50Z', 'nvd_published_at': '2019-07-30T11:15:00Z'} |
1.4.0 | GHSA-7vvr-h4p5-m7fh | 2023-08-07T15:09:13Z | 2019-07-26T16:10:20Z | null | ['CVE-2018-19801'] | Aubio is vulnerable to a NULL pointer dereference in new_aubio_filterbank | aubio v0.4.0 to v0.4.8 has a NULL pointer dereference in `new_aubio_filterbank` via invalid n_filters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19801'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog'}] | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:08:17Z', 'nvd_published_at': '2019-06-07T17:29:00Z'} |
1.4.0 | GHSA-c6jq-h4jp-72pr | 2023-08-07T14:56:40Z | 2019-07-26T16:10:25Z | null | ['CVE-2018-19802'] | Aubio is vulnerable to a NULL pointer dereference in new_aubio_notes function | aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference in `new_aubio_notes` function within `src/notes/notes.c`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19802'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/c5ee1307bdc004e43302abeca1802c2692b33a8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog'}] | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:08:26Z', 'nvd_published_at': '2019-06-07T17:29:00Z'} |
1.4.0 | GHSA-9ccv-p7fg-m73x | 2023-09-01T19:56:21Z | 2019-07-18T15:38:41Z | null | ['CVE-2019-1010017'] | XML Injection in python-libnmap | ### Description
python-libnmap is affected by a Billion-Laughs -style XML injection vulnerability.
### PoC
```python
ty = NmapParser()
payload = """
<!DOCTYPE lolz [
<!ENTITY lol "lol">
<!ELEMENT lolz (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
<!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">
]>
<lolz><hello>&lol3;</hello></lolz>
"""
ty.parse(payload)
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-libnmap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010017'}, {'type': 'WEB', 'url': 'https://github.com/savon-noir/python-libnmap/issues/87'}, {'type': 'WEB', 'url': 'https://github.com/savon-noir/python-libnmap/commit/71b707758851e4b622f87d9a73266e06f60aeab4'}] | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-18T15:38:22Z', 'nvd_published_at': '2019-07-15T03:15:00Z'} |
1.4.0 | GHSA-j3jp-gvr5-7hwq | 2022-09-17T00:18:27Z | 2019-07-30T20:47:25Z | null | ['CVE-2019-13611'] | python-engineio vulnerable to Cross-Site Request Forgery (CSRF) | ## WebSocket cross-origin vulnerability
### Impact
This is a Cross-Site Request Forgery (CSRF) vulnerability. It affects Socket.IO and Engine.IO web servers that authenticate clients using cookies.
### Patches
python-engineio version 3.9.0 patches this vulnerability by adding server-side Origin header checks.
### Workarounds
Do not use cookies for client authentication, or else add a CSRF token to the connection URL.
### References
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
https://www.christian-schneider.net/CrossSiteWebSocketHijacking.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [python-engineio](http://github.com/miguelgrinberg/python-engineio) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-engineio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/miguelgrinberg/python-engineio/security/advisories/GHSA-j3jp-gvr5-7hwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13611'}, {'type': 'WEB', 'url': 'https://github.com/miguelgrinberg/python-engineio/issues/128'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j3jp-gvr5-7hwq'}, {'type': 'PACKAGE', 'url': 'https://github.com/miguelgrinberg/python-engineio'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ffq8-576r-v26g | 2023-08-08T09:11:04Z | 2019-07-05T21:11:05Z | null | ['CVE-2016-6581'] | HPACK Denial of Service vulnerability (HPACK Bomb) | A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'hpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6581'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ffq8-576r-v26g'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-hyper/hpack'}, {'type': 'WEB', 'url': 'http://python-hyper.org/projects/hpack/en/stable/security/CVE-2016-6581.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/92315'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rqp5-pg7w-832p | 2023-08-25T21:06:23Z | 2019-07-31T04:21:27Z | null | ['CVE-2019-14281'] | datagrid contains code Injection backdoor | The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'datagrid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.6']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14281'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2072'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/datagrid/CVE-2019-14281.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/datagrid/versions'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:56:22Z', 'nvd_published_at': '2019-07-26T05:15:00Z'} |
1.4.0 | GHSA-grmf-4fq6-2r79 | 2023-08-07T14:47:53Z | 2019-07-26T16:10:28Z | null | ['CVE-2018-19800'] | aubio Buffer Overflow vulnerability | aubio v0.4.0 to v0.4.8 has a Buffer Overflow in `new_aubio_tempo`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19800'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/b1559f4c9ce2b304d8d27ffdc7128b6795ca82e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog'}] | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:08:33Z', 'nvd_published_at': '2019-06-07T17:29:00Z'} |
1.4.0 | GHSA-wg9m-gw3h-hg83 | 2023-07-05T20:09:55Z | 2019-07-16T00:42:27Z | null | ['CVE-2019-13146'] | field_test gem contains injection vulnerability | The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'field_test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}], 'versions': ['0.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/ankane/field_test/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2019-13146.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210115194802/http://www.securityfocus.com/bid/109114'}, {'type': 'ADVISORY', 'url': 'https://web.archive.org/web/20220526020623/https://nvd.nist.gov/vuln/detail/CVE-2019-13146'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T23:48:32Z', 'nvd_published_at': '2019-07-09T18:15:00Z'} |
1.4.0 | GHSA-hrj5-qp7x-rpg6 | 2023-01-25T22:46:17Z | 2019-07-26T16:10:15Z | null | ['CVE-2019-1010191'] | SQL Injection in marginalia | marginalia < 1.6 is affected by SQL Injection. The impact is an injection of any SQL queries when a user controller argument is added as a component. This issue affects users that add a component that is user controller, for instance a parameter or a header. The attack vector is inputting of SQL to a vulnerable vector (header, http parameter, etc). The fixed version is 1.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'marginalia'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010191'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/marginalia/pull/73'}, {'type': 'PACKAGE', 'url': 'https://github.com/basecamp/marginalia'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/marginalia/CVE-2019-1010191.yml'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:03:29Z', 'nvd_published_at': '2019-07-24T14:15:00Z'} |
1.4.0 | GHSA-5p5w-j3g7-w4wv | 2021-06-11T14:24:18Z | 2019-07-05T21:11:18Z | null | ['CVE-2017-11429'] | Authentication bypass via incorrect XML canonicalization and DOM traversal in saml2-js | Versions of `saml2-js` prior to 1.12.4 or 2.0.2 are vulnerable to authentication bypass.
The `saml2-js` library may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Security Assertion Markup Language (SAML) is an XML-based markup language for security assertions regarding authentication and permissions, most commonly used for single sign-on (SSO) services.
Some XML DOM traversal and canonicalization APIs may be inconsistent in handling of comments within XML nodes. Incorrect use of these APIs by some SAML libraries results in incorrect parsing of the inner text of XML nodes such that any inner text after the comment is lost prior to cryptographically signing the SAML message. Text after the comment therefore has no impact on the signature on the SAML message.
A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider
## Recommendation
If you use 1.x upgrade to version 1.12.4 or greater
If you use 2.x upgrade to version 2.02 or greater | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'saml2-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'saml2-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11429'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5p5w-j3g7-w4wv'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/567'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-94hm-8q65-rmxm | 2023-08-29T14:57:21Z | 2019-07-05T21:11:43Z | null | ['CVE-2017-11430'] | OmniAuth-SAML authentication bypass via incorrect XML canonicalization and DOM traversal | OmniAuth OmniAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11430'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/omniauth-saml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth-saml/CVE-2017-11430.yml'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j657-59rv-qwm6 | 2022-12-03T04:03:29Z | 2019-07-31T04:22:27Z | null | ['CVE-2019-5457'] | Cross-Site Scripting in min-http-server | All versions of `min-http-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available, consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'min-http-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5457'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570568'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1111'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:41:34Z', 'nvd_published_at': '2019-07-30T21:15:00Z'} |
1.4.0 | GHSA-hf4p-jm7r-vjjj | 2021-08-17T19:40:00Z | 2019-07-26T16:10:39Z | null | ['CVE-2018-15890'] | Deserialization of Untrusted Data in EthereumJ | An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.ethereum:ethereumj-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15890'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/ethereumj/issues/1161'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/ethereumj'}, {'type': 'WEB', 'url': 'https://github.com/frohoff/ysoserial/'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-26T09:08:20Z', 'nvd_published_at': '2019-06-20T17:15:00Z'} |
1.4.0 | GHSA-mcg9-64cp-xwp7 | 2021-08-17T15:47:23Z | 2019-07-05T21:08:09Z | null | ['CVE-2019-9827'] | Server-Side Request Forgery in Hawt Hawtio | Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:hawtio-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9827'}, {'type': 'WEB', 'url': 'https://www.ciphertechs.com/hawtio-advisory/'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T20:47:20Z', 'nvd_published_at': '2019-07-03T21:15:00Z'} |
1.4.0 | GHSA-h92m-42h4-82f6 | 2021-01-08T21:22:27Z | 2019-07-05T21:06:58Z | null | ['CVE-2019-16791'] | High severity vulnerability that affects postfix-mta-sts-resolver | ## Incorrect query parsing
### Impact
All users of versions prior to 0.5.1 can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
### Patches
Problem has been patched in version 0.5.1
### Workarounds
Users may remediate this vulnerability without upgrading by applying [these patches](https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b) to older suppoorted versions.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [postfix-mta-sts-resolver repo](https://github.com/Snawoot/postfix-mta-sts-resolver)
* Email me at [vladislav at vm-0 dot com](mailto:vladislav-ex-gh-advisory@vm-0.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'postfix-mta-sts-resolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Snawoot/postfix-mta-sts-resolver/security/advisories/GHSA-h92m-42h4-82f6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16791'}, {'type': 'WEB', 'url': 'https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h92m-42h4-82f6'}] | {'cwe_ids': ['CWE-757'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mfv8-q39f-mgfg | 2021-04-12T21:50:38Z | 2019-07-16T00:52:26Z | null | ['CVE-2019-1020005'] | Cross-site Scripting in invenio-communities | ## Cross-Site Scripting (XSS) vulnerability in Jinja templates
### Impact
A Cross-Site Scripting (XSS) vulnerability was discovered in two Jinja templates in the Invenio-Communities module. The vulnerability allows a user to create a new community and include script element tags inside the description and page fields.
### Patches
The problem has been patched in v1.0.0a20.
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'invenio-communities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0a20'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0a19'}}] | [{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-communities/security/advisories/GHSA-mfv8-q39f-mgfg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020005'}, {'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-communities/commit/505da72c5acd7dfbd4148f884c73c9c3372b76f4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mfv8-q39f-mgfg'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xx3h-j3cx-8qfj | 2021-08-17T15:50:15Z | 2019-07-05T21:08:20Z | null | ['CVE-2018-18326'] | Insufficient Entropy in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.2 incorrectly converts encryption key source values, resulting in lower than expected entropy. NOTE: this issue exists because of an incomplete fix for CVE-2018-15812. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18326'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T20:59:37Z', 'nvd_published_at': '2019-07-03T17:15:00Z'} |
1.4.0 | GHSA-j3g9-6fx5-gjv7 | 2021-08-17T15:49:30Z | 2019-07-05T21:08:16Z | null | ['CVE-2018-18325'] | Inadequate Encryption Strength in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18325'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T20:59:02Z', 'nvd_published_at': '2019-07-03T17:15:00Z'} |
1.4.0 | GHSA-7j93-2h6r-hm49 | 2023-02-01T09:19:41Z | 2019-07-31T04:22:36Z | null | ['CVE-2019-5458'] | Cross-Site Scripting in http-file-server | All versions of `http-file-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-file-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5458'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570563'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1110'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:41:20Z', 'nvd_published_at': '2019-07-30T21:15:00Z'} |
1.4.0 | GHSA-jf85-cpcp-j695 | 2023-09-05T22:24:55Z | 2019-07-10T19:45:23Z | null | ['CVE-2019-10744'] | Prototype Pollution in lodash | Versions of `lodash` before 4.17.12 are vulnerable to Prototype Pollution. The function `defaultsDeep` allows a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.17.12 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-amd'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.template'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.merge'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.defaultsdeep'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10744'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/pull/4336'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3024'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191004-0005/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LODASH-450202'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1065'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-10T19:41:11Z', 'nvd_published_at': '2019-07-26T00:15:00Z'} |
1.4.0 | GHSA-vxh3-mvv7-265j | 2021-04-12T21:46:33Z | 2019-07-16T00:52:15Z | null | ['CVE-2019-1020003'] | Cross-site scripting invenio-records | ## Cross-Site Scripting (XSS) vulnerability in administration interface
### Impact
A Cross-Site Scripting (XSS) vulnerability was discovered when rendering JSON for a record in the administration interface. The vulnerability could be exploited by e.g. a user who had access to upload a new record, that an admin user would then later view in the admin interface.
### Patches
All supported versions of Invenio-Records have been patched. You should upgrade to either v1.0.1, v1.1.1 or v1.2.2
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'invenio-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020003'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vxh3-mvv7-265j'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x64g-wjmw-w328 | 2023-02-09T19:26:17Z | 2019-07-05T21:10:52Z | null | ['CVE-2015-5306'] | Injection vulnerability that affects ironic-discoverd | OpenStack Ironic Inspector (aka ironic-inspector or ironic-discoverd), when debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-ironic-inspector-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5306'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:2685'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5306'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ironic-inspector/+bug/1506419'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1273698'}, {'type': 'WEB', 'url': 'https://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2685.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:22Z', 'nvd_published_at': '2015-11-25T20:59:00Z'} |
1.4.0 | GHSA-4g4c-8gqh-m4vm | 2023-08-29T14:11:16Z | 2019-07-16T00:41:55Z | null | ['CVE-2019-13589'] | paranoid2 gem Code backdoor | The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.1.5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paranoid2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.1.6']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13589'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2051'}, {'type': 'PACKAGE', 'url': 'https://github.com/anjlab/paranoid2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paranoid2/CVE-2019-13589.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/paranoid2/versions'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-PARANOID2-451600'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/109281'}] | {'cwe_ids': ['CWE-829'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T23:22:39Z', 'nvd_published_at': '2019-07-14T16:15:00Z'} |
1.4.0 | GHSA-5h5r-ffc4-c455 | 2023-03-06T22:51:34Z | 2019-07-08T20:32:35Z | null | ['CVE-2019-13354'] | strong_password Ruby gem malicious version causing Remote Code Execution vulnerability | The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Version 0.0.8 does not contain the backdoor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'strong_password'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.7'}, {'fixed': '0.0.8'}]}], 'versions': ['0.0.7']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13354'}, {'type': 'WEB', 'url': 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/'}, {'type': 'PACKAGE', 'url': 'https://github.com/bdmac/strong_password'}, {'type': 'WEB', 'url': 'https://github.com/bdmac/strong_password/releases'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/strong_password/CVE-2019-13354.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/strong_password/versions'}, {'type': 'WEB', 'url': 'https://withatwist.dev/strong-password-rubygem-hijacked.html'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-08T20:32:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6677-83pp-f862 | 2021-08-17T18:13:29Z | 2019-07-16T00:42:02Z | null | ['CVE-2019-13506'] | Cross-Site Scripting in @nuxt/devalue | Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys.
## Recommendation
Upgrade to version 1.2.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@nuxt/devalue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13506'}, {'type': 'WEB', 'url': 'https://github.com/Rich-Harris/devalue/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/devalue/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/devalue/releases/tag/v1.2.3'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt.js/compare/c0776eb...8d14cd4'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/814'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T23:34:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8w3j-g983-8jh5 | 2021-06-11T15:37:15Z | 2019-07-11T14:23:09Z | null | ['CVE-2019-1020013'] | Sensitive Data Exposure in parse-server | Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking.
`ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses.
### For more information
If you have any questions or comments about this advisory,
Open an issue in the [parse-server](https://github.com/parse-community/parse-server)
[Parse Community Vulnerability Disclosure Program](https://github.com/parse-community/parse-server/blob/master/SECURITY.md) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-8w3j-g983-8jh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8w3j-g983-8jh5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1114'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002)#Description_of_the_Issue'}] | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5frh-8cmj-gc59 | 2022-09-17T01:02:30Z | 2019-07-17T19:14:18Z | null | ['CVE-2019-1167'] | System.Management.Automation subject to bypass via script debugging | ## Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability
# Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability
## Executive Summary
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement.
An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine.
To exploit the vulnerability,
an attacker would first have access to the local machine where PowerShell is running in Constrained Language mode.
By doing that an attacker could leverage script debugging to abuse signed modules in an unintended way.
The update addresses the vulnerability by correcting how PowerShell functions in Constrained Language Mode.
System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).)
## Discussion
Please use PowerShell/PowerShell#TBD for discussion of this advisory.
## <a name="affected-software">Affected Software</a>
The vulnerability affects PowerShell Core prior to the following versions:
| PowerShell Core Version | Fixed in |
|-------------------------|-------------------|
| 6.1 | 6.1.5 |
| 6.2 | 6.2.2 |
## Advisory FAQ
### How do I know if I am affected?
If all of the following are true:
1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected.
1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`.
### How do I update to an unaffected version?
Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in PowerShell Core,
please email details to secure@microsoft.com.
### Support
You can ask questions about this issue on GitHub in the PowerShell organization.
This is located at https://github.com/PowerShell/.
The Announcements repo (https://github.com/PowerShell/Announcements)
will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions.
### What if the update breaks my script or module?
You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core.
This should be treated as a temporary measure.
Therefore, the script or module should be updated to work with the patched version of PowerShell Core.
### Acknowledgments
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information.
### External Links
[CVE-2019-1167](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167)
### Revisions
V1.0 (July 16, 2019): Advisory published.
*Version 1.0*
*Last Updated 2019-07-16* | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-5frh-8cmj-gc59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1167'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5frh-8cmj-gc59'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:09:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-94mf-xfg5-r247 | 2021-09-07T20:41:26Z | 2019-07-16T00:52:10Z | null | ['CVE-2019-1020006'] | Moderate severity vulnerability that affects invenio-app | ## APP_ALLOWED_HOSTS not always preventing host header injection
### Impact
A possible host header injection attack have been identified in Invenio-App. For an attack to be possible, all conditions below must be met:
1. Your webserver must have been configured to route all requests to your application.
2. You must have relied on ``APP_ALLOWED_HOSTS`` configuration variable to whitelist allowed host headers.
3. Flask's ``request.host`` must not have been evaluated during request handling.
An example of a view which does not evalute ``request.host`` is a simple view using just ``url_for`` to generate an external URL (similar is possible when rendering just a Jinja template):
```python
@app.route('/')
def index():
return url_for('index_url', _external=True)
```
This happens, because Werkzeug's trusted host feature, which ``APP_ALLOWED_HOSTS`` rely on, does not check the the list of trusted hosts in it's routing system that ``url_for`` is relying on.
### Patches
Invenio-App v1.0.6 and v1.1.1 fully fix the issue.
Note, we strongly recommend (see [Securing your instance](https://invenio.readthedocs.io/en/latest/deployment/securing-your-instance.html#allowed-hosts)) that you never route requests to your application with a wrong host header. The ``APP_ALLOWED_HOSTS`` configuration variable exists as an extra protective measure because it is easy to misconfigure your web server to allow requests with any host header.
### Workaround 1 - Configure your webserver
You should ensure that you never route requests with a wrong host header to your application. The workaround depends on which web server you are using to proxy requests to your application. In general it involves ensuring that the web server has two virtual hosts defined:
1. **Default virtual host**: a dummy default virtual host that by default is used unless the webserver can match the host header to another virtual host (i.e. a catch-all).
2. **Application virtual host**: the application virtual host responsible for proxing requests to the application, and configured to only reply to a whitelist of host headers.
Note, for instance in Nginx if you only configure the application virtual host, by default, it will also act as the default virtual host despite you having configured a whitelist of host headers.
Below is an example for Nginx. Note for clarity we have only included the virtual host for port 443, but this also extends to virtual hosts running on any other port.
```
# etc/nginx/nginx.conf
http {
# ...
include /etc/nginx/conf.d/*.conf;
}
```
**Default virtual host**
Notice, the ``server_name`` is ``_`` and the ``listen`` directive has it marked as ``default_server``.
```
# etc/nginx/conf.d/default.conf
server {
listen 443 default_server;
listen [::]:443 default_server;
server_name _;
# ...
return 301 https://www.example.com;
}
```
**Application virtual host**
Notice, the ``server_name`` is set to the host header whitelist.
```
# etc/nginx/conf.d/app.conf
server {
listen 443;
listen [::]:443;
server_name www.example.com;
# ...
}
```
### Workaround 2 - Include application snippet
We strongly recommend that you use the method described in Workaround 1.
If you are not able to upgrade to the patched versions of Invenio-App, you can include the following code snippet in your application to force evaluation of ``request.hosts``.
```python
@app.before_request
def before_request():
request.host
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'invenio-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}] | [{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-app/security/advisories/GHSA-94mf-xfg5-r247'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020006'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-94mf-xfg5-r247'}, {'type': 'PACKAGE', 'url': 'https://github.com/inveniosoftware/invenio-app'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7v35-qwwj-p98g | 2022-11-17T18:10:27Z | 2019-07-05T21:07:40Z | null | ['CVE-2019-9843'] | Improper Restriction of XML External Entity Reference in DiffPlug Spotless | In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-plugin-gradle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-maven-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9843'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/issues/358'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/pull/369'}, {'type': 'PACKAGE', 'url': 'https://github.com/diffplug/spotless'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/blob/master/plugin-maven/CHANGES.md#version-1200---march-14th-2018-javadoc-jcenter'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-01T16:09:01Z', 'nvd_published_at': '2019-06-28T18:15:00Z'} |
1.4.0 | GHSA-6r5x-hmgg-7h53 | 2019-12-20T02:08:50Z | 2019-07-15T19:46:01Z | 2019-07-15T19:46:01Z | [] | Remote code execution in Handlebars.js | Handlebars.js before 4.1.0 has Remote Code Execution (RCE) | [] | [{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/issues/1267#issue-187151586'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/commit/edc6220d51139b32c28e51641fadad59a543ae57'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-03T20:19:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vg35-vc9f-q7x2 | 2022-03-22T18:19:03Z | 2019-07-26T16:09:54Z | null | ['CVE-2019-1010268'] | Improper Restriction of XML External Entity Reference in ladon | Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ladon'}, 'ecosystem_specific': {'affected_functions': ['ladon.interfaces.soap.SOAPRequestHandler.parse_request']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.1'}, {'last_affected': '1.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010268'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jakobsg/ladon'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jakobsg/ladon/pull-requests/9'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43113'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T15:54:06Z', 'nvd_published_at': '2019-07-18T17:15:00Z'} |
1.4.0 | GHSA-h582-2pch-3xv3 | 2023-09-05T12:46:17Z | 2019-07-05T21:10:39Z | null | ['CVE-2015-5143'] | Django Denial-of-service by filling session store | The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5143'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h582-2pch-3xv3'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201510-06'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2015/jul/08/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1678.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1686.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3305'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/75666'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1032820'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2671-1'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4xcv-9jjx-gfj3 | 2021-08-17T15:44:45Z | 2019-07-05T21:07:58Z | null | [] | Denial of Service in mem | Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging.
## Recommendation
Upgrade to version 4.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:mem:20180117'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1084'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-03T20:52:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hh56-x62g-gvhc | 2021-08-17T19:04:59Z | 2019-07-26T16:10:06Z | null | ['CVE-2019-1010113'] | Cross-site scripting in CLEditor | Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'CLEditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010113'}, {'type': 'WEB', 'url': 'https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T15:56:08Z', 'nvd_published_at': '2019-07-19T16:15:00Z'} |
1.4.0 | GHSA-r7j3-vvh2-xrpj | 2023-01-25T20:10:32Z | 2019-07-18T13:19:22Z | null | ['CVE-2019-13574'] | OS Command Injection in MiniMagick | In `lib/mini_magick/image.rb` in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because `Image.open` input is directly passed to `Kernel#open`, which accepts a `|` character followed by a command. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mini_magick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13574'}, {'type': 'WEB', 'url': 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'}, {'type': 'WEB', 'url': 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/'}, {'type': 'PACKAGE', 'url': 'https://github.com/minimagick/minimagick'}, {'type': 'WEB', 'url': 'https://github.com/minimagick/minimagick/compare/d484786...293f9bb'}, {'type': 'WEB', 'url': 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mini_magick/CVE-2019-13574.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jul/20'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4481'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-18T13:18:58Z', 'nvd_published_at': '2019-07-12T03:15:00Z'} |
1.4.0 | GHSA-qpxp-5j56-gg3x | 2023-08-08T16:12:35Z | 2019-07-31T04:22:03Z | null | ['CVE-2018-20857'] | samlr XML nodes comment attack | Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by `<!---->`. and then the attacker's domain name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'samlr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20857'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/samlr/pull/29'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/samlr/CVE-2018-20857.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/zendesk/samlr'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:49:20Z', 'nvd_published_at': '2019-07-26T12:15:00Z'} |
1.4.0 | GHSA-j9m2-6hq2-4r3c | 2021-04-12T21:57:28Z | 2019-07-16T00:52:22Z | null | ['CVE-2019-1020019'] | Cross-site Scripting in invenio-previewer | ## Cross-Site Scripting (XSS) vulnerability in JSON, Markdown and iPython Notebook previewers
### Impact
Several Cross-Site Scripting (XSS) vulnerabilities have been found in the JSON, Markdown and iPython Notebook previewers. The vulnerabilities would allow a malicous user to upload a JSON, Markdown or Notebook file with embedded scripts that would be executed by a victims browser.
### Patches
Invenio-Previewer v1.0.0a12 fixes the issue.
### Workarounds
You can remediate the vulnerability without upgrading by disabling the affected previewers. You do this by adding the following to your configuration:
```python
PREVIEWER_PREFERENCE = [
'csv_dthreejs',
'simple_image',
# 'json_prismjs',
'xml_prismjs',
# 'mistune',
'pdfjs',
# 'ipynb',
'zip',
]
```
Afterwards, you should not be able to preview JSON, Markdown or iPython Notebook files.
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'invenio-previewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0a12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0a11'}}] | [{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-previewer/security/advisories/GHSA-j9m2-6hq2-4r3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020019'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j9m2-6hq2-4r3c'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2fr-v8wf-8wwv | 2023-01-24T14:59:07Z | 2019-07-05T21:11:35Z | null | ['CVE-2017-11428'] | Ruby-SAML Improper Authentication vulnerability | OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11428'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mpf2-q34c-fc6j | 2023-08-31T09:27:12Z | 2019-07-22T14:53:58Z | null | ['CVE-2019-1010142'] | Infinite Loop in scapy | scapy is affected by a Denial of Service vulnerability resulting in an infinite loop and resource consumption rendering the program unresponsive. The component is: `_RADIUSAttrPacketListField.getfield(self..)`. The attack vector is over the network or in a pcap. both work. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'scapy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4-rc1'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010142'}, {'type': 'WEB', 'url': 'https://github.com/secdev/scapy/pull/1409'}, {'type': 'WEB', 'url': 'https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058'}, {'type': 'PACKAGE', 'url': 'https://github.com/secdev/scapy'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/'}, {'type': 'WEB', 'url': 'https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106674'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-22T14:21:26Z', 'nvd_published_at': '2019-07-19T16:15:00Z'} |
1.4.0 | GHSA-mph4-vhrx-mv67 | 2023-09-13T17:12:59Z | 2019-07-05T21:07:27Z | null | ['CVE-2019-12384'] | Deserialization of Untrusted Data in FasterXML jackson-databind | FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12384'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1820'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2720'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3292'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3297'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3901'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4352'}, {'type': 'WEB', 'url': 'https://blog.doyensec.com/2019/07/22/jackson-gadgets.html'}, {'type': 'WEB', 'url': 'https://doyensec.com/research.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190703-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T11:07:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qr7j-h6gg-jmgc | 2023-08-28T11:17:26Z | 2019-07-16T17:42:21Z | null | ['CVE-2018-11307'] | Deserialization of Untrusted Data in jackson-databind | An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11307'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2032'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-16T00:41:07Z', 'nvd_published_at': '2019-07-09T16:15:00Z'} |
1.4.0 | GHSA-c9jj-3wvg-q65h | 2021-06-15T17:00:24Z | 2019-07-05T21:12:54Z | null | ['CVE-2019-0228'] | Vulnerability that affects org.apache.pdfbox:pdfbox | Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XFDF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.14'}, {'fixed': '2.0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9jj-3wvg-q65h'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8a19bd6d43e359913341043c2a114f91f9e4ae170059539ad1f5673c@%3Ccommits.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bc8db1bf459f1ad909da47350ed554ee745abe9f25f2b50cad4e06dd@%3Cserver-dev.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/be86fcd7cd423a3fe6b73a3cb9d7cac0b619d0deb99e6b5d172c98f4@%3Ccommits.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a2141abeddae66dd57025f1681c8425834062b7c0c7e0b1d830a95d@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32b8102392a174b17fd19509a9e76047f74852b77b7bf46af95e45a2@%3Cserver-dev.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:58Z', 'nvd_published_at': '2019-04-17T15:29:00Z'} |
1.4.0 | GHSA-wg6j-r28m-7293 | 2023-08-28T13:34:04Z | 2019-07-31T04:21:19Z | null | ['CVE-2019-14282'] | Code backdoor in simple_captcha2 | The simple_captcha2 gem 0.2.3 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'simple_captcha2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.2.3']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14282'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2073'}, {'type': 'PACKAGE', 'url': 'https://github.com/pludoni/simple-captcha'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/simple_captcha2/CVE-2019-14282.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/simple_captcha2/versions/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUBY-SIMPLECAPTCHA2-455501'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T04:00:04Z', 'nvd_published_at': '2019-07-26T05:15:00Z'} |
1.4.0 | GHSA-5wv5-4vpf-pj6m | 2023-08-07T15:15:22Z | 2019-07-19T16:12:46Z | null | ['CVE-2019-1010083'] | Pallets Project Flask is vulnerable to Denial of Service via Unexpected memory usage | The Pallets Project Flask before 1.0 is affected by unexpected memory usage. The impact is denial of service. The attack vector is crafted encoded JSON data. The fixed version is 1. NOTE this may overlap CVE-2018-1000656. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flask'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010083'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/flask'}, {'type': 'WEB', 'url': 'https://www.palletsprojects.com/blog/flask-1-0-released/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-19T04:59:45Z', 'nvd_published_at': '2019-07-17T14:15:00Z'} |
1.4.0 | GHSA-hf23-9pf7-388p | 2022-10-06T18:15:30Z | 2019-07-26T16:09:47Z | null | ['CVE-2019-10173'] | Deserialization of Untrusted Data and Code Injection in xstream | It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10173'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4352'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10173'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.11'}] | {'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T10:11:50Z', 'nvd_published_at': '2019-07-23T13:15:00Z'} |
1.4.0 | GHSA-cmfg-87vq-g5g4 | 2023-09-13T16:22:03Z | 2019-07-17T15:26:12Z | null | ['CVE-2019-12814'] | Deserialization of untrusted data in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12814'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2341'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3292'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3297'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd@%3Ccommits.accumulo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190625-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-17T14:51:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h595-8pw6-5q6v | 2021-08-17T17:50:14Z | 2019-07-05T21:08:36Z | null | ['CVE-2018-15811'] | Inadequate Encryption Strength in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15811'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T21:01:31Z', 'nvd_published_at': '2019-07-03T17:15:00Z'} |
1.4.0 | GHSA-6c7v-2f49-8h26 | 2023-09-05T13:06:43Z | 2019-07-03T20:37:25Z | null | ['CVE-2019-12781'] | Django Incorrect HTTP detection with reverse-proxy connecting via HTTPS | An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12781'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jul/10'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190705-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4043-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4476'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/jul/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/01/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/109018'}] | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-03T20:26:13Z', 'nvd_published_at': '2019-07-01T14:15:00Z'} |
1.4.0 | GHSA-g8m7-qhv7-9h5x | 2021-09-22T18:35:22Z | 2019-07-05T21:07:14Z | null | [] | Path Traversal in serve-here.js | Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 1.2.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'serve-here'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vivaxy/here/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296254'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/569966'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/554'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:17:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wqfc-cr59-h64p | 2021-08-17T19:40:44Z | 2019-07-31T04:22:15Z | null | ['CVE-2019-5448'] | Missing Encryption of Sensitive Data in yarn | Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5448'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/640904'}, {'type': 'WEB', 'url': 'https://github.com/ChALkeR/notes/blob/master/Yarn-vuln.md'}, {'type': 'WEB', 'url': 'https://yarnpkg.com/blog/2019/07/12/recommended-security-update/'}] | {'cwe_ids': ['CWE-311', 'CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:41:57Z', 'nvd_published_at': '2019-07-30T21:15:00Z'} |
1.4.0 | GHSA-rg32-m3hf-772v | 2023-08-29T15:29:43Z | 2019-07-16T00:41:40Z | null | ['CVE-2019-1010306'] | Slanger Arbitrary command execution | Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'slanger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306'}, {'type': 'WEB', 'url': 'https://github.com/stevegraham/slanger/pull/238'}, {'type': 'WEB', 'url': 'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/slanger/CVE-2019-1010306.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/stevegraham/slanger'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T21:51:37Z', 'nvd_published_at': '2019-07-15T15:15:00Z'} |
1.4.0 | GHSA-p3w6-jcg4-52xh | 2022-09-17T00:26:01Z | 2019-07-02T15:43:41Z | null | ['CVE-2019-13177'] | Improper Verification of Cryptographic Signature in django-rest-registration | ## Misusing the Django Signer API leads to predictable signatures used in verification emails
### Impact
The vulnerability is a high severity one. Anyone using Django REST Registration library versions `0.2.*` - `0.4.*` with e-mail verification option (which is recommended, but needs [additional configuration](https://django-rest-registration.readthedocs.io/en/latest/quickstart.html#preferred-configuration)) is affected.
In the worst case, the attacker can take over any Django user by resetting his/her password without even receiving the reset password verification link, just by guessing the signature from publicly available data (more detailed description below).
### Patches
The problem has been patched in version `0.5.0`. All library users should upgrade to version `0.5.0` or higher.
The fix will invalidate all previously generated signatures , and in consequence, all verification links in previously sent verification e-mails. Therefore semi-major version `0.5.0` was released instead of version `0.4.6` to mark that incompatibility.
### Workarounds
The easiest way way is to disable the verification options by using something like the minimal configuration described [here](https://django-rest-registration.readthedocs.io/en/latest/quickstart.html#minimal-configuration). This will unfortunately disable checking whether the given e-mail is valid and make unable to users who registered an account but didn't verify it before config change.
Less harsh way is to temporarily disable just the the reset password functionality:
```python
REST_REGISTRATION = {
# ...
'RESET_PASSWORD_VERIFICATION_ENABLED': False,
# ...
}
```
Which should disallow the worst case, which is account takeover by an attacker. The attacker can still use the register-email endpoint to change the email to its own (but it is less critical than resetting the password in this case).
If one already set `'RESET_PASSWORD_VERIFICATION_ONE_TIME_USE'` setting key to `True` in `REST_REGISTRATION` Django setting (which is not the default setting) then it should mitigate the security issue in case of password reset (in this case, the signature is much harder to guess by the attacker). But even in this case upgrade to newest version is highly recommended.
### Technical description
After the code [was refactored](https://github.com/apragacz/django-rest-registration/commit/b6d921e9decc9bb36a4c6d58bc607471aa824a2e) to use the [official Signer class](https://docs.djangoproject.com/en/dev/topics/signing/) the salt
was passed wrongly as secret key, replacing the `SECRET_KEY` set in
Django settings file. This leads to the Django `SECRET_KEY` not being used by the signer object. The secret key of the signer ends to be the salt which in most cases is a static string which is publicly available.
In consequence this allows, with verification enabled, to guess
the signature contained in the verification link (which is sent in a verification e-mail) by a potential attacker very easily.
The bug went unnoticed for very long time so multiple versions are affected:
this bug affects versions `0.2.*`, `0.3.*`, `0.4.*`; version `0.1.*` is not affected.
Recently released version `0.5.0` contains the [fix](https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5) which correctly passes the salt to the Signer constructor as keyword argument instead as a positonal argument. It also contains additonal test so this problem should not reappear in the future.
### Thanks
I'd like to thank @peterthomassen from https://desec.io DNS security project for finding the bug. I'd like also to thank his employer, SSE (https://www.securesystems.de) for funding his work.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub issues project page](https://github.com/apragacz/django-rest-registration/issues)
* Email @apragacz, author of the library | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-rest-registration'}, 'ecosystem_specific': {'affected_functions': ['rest_registration.verification.DataSigner.__init__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apragacz/django-rest-registration/security/advisories/GHSA-p3w6-jcg4-52xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13177'}, {'type': 'WEB', 'url': 'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p3w6-jcg4-52xh'}, {'type': 'PACKAGE', 'url': 'https://github.com/apragacz/django-rest-registration'}, {'type': 'WEB', 'url': 'https://github.com/apragacz/django-rest-registration/releases/tag/0.5.0'}] | {'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-grgm-pph5-j5h7 | 2021-08-31T21:17:26Z | 2019-07-31T04:22:49Z | null | ['CVE-2019-10156'] | Exposure of Sensitive Information to an Unauthorized Actor in ansible | A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10156'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/57188'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/04e94274fb92e116e9082cc9b86b1fd05c836922'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/3ff6505e8ff0e4655bab008886983476ef903375'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a11c3edfa41e7e4a4db323cdabfc2eae1b61da2a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3744'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3789'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:40:27Z', 'nvd_published_at': '2019-07-30T23:15:00Z'} |
1.4.0 | GHSA-x5rq-j2xg-h7qm | 2022-03-09T22:54:28Z | 2019-07-19T16:13:07Z | null | ['CVE-2019-1010266'] | Regular Expression Denial of Service (ReDoS) in lodash | lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11. | [] | [{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-amd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010266'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/3359'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/wiki/Changelog'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190919-0004/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LODASH-73639'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-19T16:11:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-958r-g534-ccmr | 2022-09-17T00:54:46Z | 2019-07-05T21:11:13Z | null | ['CVE-2019-9845'] | MadsKristensen.AspNetCore.Miniblog subject to Improper Input Validation | madskristensen Miniblog.Core through 2019-01-16 allows remote attackers to execute arbitrary ASPX code via an IMG element with a data: URL, because SaveFilesToDisk in Controllers/BlogController.cs writes a decoded base64 string to a file without validating the extension. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'MadsKristensen.AspNetCore.Miniblog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9845'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-958r-g534-ccmr'}, {'type': 'PACKAGE', 'url': 'https://github.com/madskristensen/Miniblog.Core'}, {'type': 'WEB', 'url': 'https://github.com/madskristensen/Miniblog.Core/blob/master/src/Controllers/BlogController.cs#L142'}, {'type': 'WEB', 'url': 'https://rastating.github.io/miniblog-remote-code-execution/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pf46-gqg9-j3v3 | 2021-08-17T16:06:33Z | 2019-07-05T21:08:24Z | null | ['CVE-2018-15812'] | Insufficient Entropy in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15812'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T21:01:22Z', 'nvd_published_at': '2019-07-03T17:15:00Z'} |
1.4.0 | GHSA-j8j8-348v-wfm3 | 2023-09-01T20:33:47Z | 2019-07-05T21:11:26Z | null | ['CVE-2017-11427'] | Python-saml allows manipulation of SAML data without invalidation of cryptographic signature | OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11427'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/python-saml/commit/fad881b4432febea69d70691dfed51c93f0de10f'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8j8-348v-wfm3'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xfhh-rx56-rxcr | 2021-07-27T20:57:14Z | 2019-07-02T15:28:38Z | null | ['CVE-2019-1020001'] | Path Traversal vulnerability that affects yard | ## Possible arbitrary path traversal and file access via `yard server`
### Impact
A path traversal vulnerability was discovered in YARD <= 0.9.19 when using `yard server` to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions.
Thanks to CuongMX from Viettel Cyber Security for discovering this vulnerability.
### Patches
Please upgrade to YARD v0.9.20 immediately if you are relying on yard server to host documentation in any untrusted environments.
### Workarounds
For users who cannot upgrade, it is possible to perform path sanitization of HTTP requests at your webserver level. WEBrick, for example, can perform such sanitization by default (which you can use via `yard server -s webrick`), as can certain rules in your webserver configuration. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'yard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.20'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020001'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xfhh-rx56-rxcr'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:08Z', 'nvd_published_at': '2019-07-29T13:15:00Z'} |
1.4.0 | GHSA-2mp5-m968-gwr2 | 2023-02-03T20:45:52Z | 2019-07-16T00:41:34Z | null | ['CVE-2019-5447'] | Path Traversal in http-file-server | All versions of `http-file-server` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-file-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.2.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5447'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570133'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1077'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T21:41:32Z', 'nvd_published_at': '2019-07-15T18:15:00Z'} |
1.4.0 | GHSA-p5xp-6vpf-jwvh | 2021-10-29T22:01:59Z | 2019-09-23T18:32:27Z | null | ['CVE-2019-10199'] | Improper Input Validation and Cross-Site Request Forgery in Keycloak | It was found that Keycloak's account console, up to 6.0.1, did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10199'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10199'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-20', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:25:55Z', 'nvd_published_at': '2019-08-14T17:15:00Z'} |
1.4.0 | GHSA-rwpr-83g3-96g7 | 2023-01-25T22:46:45Z | 2019-09-23T18:33:07Z | null | ['CVE-2019-16145'] | Cross-site scripting in padrino-contrib | The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a caption. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'padrino-contrib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16145'}, {'type': 'WEB', 'url': 'https://github.com/padrino/padrino-contrib/pull/35'}, {'type': 'PACKAGE', 'url': 'https://github.com/padrino/padrino-contrib'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T14:58:55Z', 'nvd_published_at': '2019-09-09T21:15:00Z'} |
1.4.0 | GHSA-g5m7-57ph-j6p8 | 2021-08-17T22:25:20Z | 2019-09-11T23:04:57Z | null | ['CVE-2019-5475'] | OS Command Injection in Nexus Yum Repository Plugin | The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus.plugins:nexus-yum-repository-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5475'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/654888'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T14:40:16Z', 'nvd_published_at': '2019-09-03T20:15:00Z'} |
1.4.0 | GHSA-cgjv-rghq-qhgp | 2021-08-17T22:22:48Z | 2019-09-11T23:00:57Z | null | [] | Path Traversal in algo-httpserv | Versions of `algo-httpserv` prior to 1.1.2 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 1.1.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'algo-httpserv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ALGOHTTPSERV-174741'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/889'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T23:12:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h822-r4r5-v8jg | 2023-09-13T18:20:57Z | 2019-09-23T18:33:25Z | null | ['CVE-2019-14540'] | Polymorphic Typing issue in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10, 2.8.11.5, and 2.6.7.3. It is related to `com.zaxxer.hikari.HikariConfig`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14540'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2410'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2449'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/d4983c740fec7d5576b207a8c30a63d3ea7443de'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e497427717c5d377f8d7ccce6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191004-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T09:23:48Z', 'nvd_published_at': '2019-09-15T22:15:00Z'} |
1.4.0 | GHSA-gvxv-5fp2-358q | 2022-11-17T18:24:26Z | 2019-09-11T23:08:57Z | null | ['CVE-2019-10753'] | Incorrect Resource Transfer Between Spheres in eclipse-wtp | In all versions prior to version 3.9.6 for eclipse-wtp, all versions prior to version 9.4.4 for eclipse-cdt, and all versions prior to version 3.0.1 for eclipse-groovy, Spotless was resolving dependencies over an insecure channel (http). If the build occurred over an insecure connection, a malicious user could have perform a Man-in-the-Middle attack during the build and alter the build artifacts that were produced. In case that any of these artifacts were compromised, any developers using these could be altered. **Note:** In order to validate that this artifact was not compromised, the maintainer would need to confirm that none of the artifacts published to the registry were not altered with. Until this happens, we can not guarantee that this artifact was not compromised even though the probability that this happened is low. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-eclipse-wtp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-eclipse-cdt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-eclipse-groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10753'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/issues/360'}, {'type': 'PACKAGE', 'url': 'https://github.com/diffplug/spotless'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMDIFFPLUGSPOTLESS-460377'}] | {'cwe_ids': ['CWE-669'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:56:33Z', 'nvd_published_at': '2019-09-05T20:15:00Z'} |
1.4.0 | GHSA-q8wc-9xvp-g3c3 | 2021-08-17T22:29:12Z | 2019-09-23T18:33:18Z | null | ['CVE-2019-16148'] | Cross-site scripting in Sakai | Sakai through 12.6 allows XSS via a chat user name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.sakaiproject:chat-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '12.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16148'}, {'type': 'WEB', 'url': 'https://github.com/sakaiproject/sakai/pull/6971'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T14:57:19Z', 'nvd_published_at': '2019-09-09T13:15:00Z'} |
1.4.0 | GHSA-fcjw-8rhj-gwwc | 2023-01-23T20:12:32Z | 2019-09-11T23:06:57Z | null | ['CVE-2019-16109'] | Authentication Bypass in Devise | An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. (However, there is no scenario within Devise itself in which such database records would exist.) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16109'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/issues/5071'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/pull/5132'}, {'type': 'PACKAGE', 'url': 'https://github.com/plataformatec/devise'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/compare/v4.7.0...v4.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise/CVE-2019-16109.yml'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:42:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pg2f-r7pc-6fxx | 2021-08-17T22:19:46Z | 2019-09-11T22:57:57Z | null | ['CVE-2019-11457'] | Cross-Site Request Forgery in MicroPyramid Django CRM | Multiple CSRF issues exist in MicroPyramid Django CRM 0.2.1 via /change-password-by-admin/, /api/settings/add/, /cases/create/, /change-password-by-admin/, /comment/add/, /documents/1/view/, /documents/create/, /opportunities/create/, and /login/. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11457'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/blog/web-security/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154219/Django-CRM-0.2.1-Cross-Site-Request-Forgery.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/Aug/30'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-28T15:35:37Z', 'nvd_published_at': '2019-08-27T15:15:00Z'} |
1.4.0 | GHSA-62gw-3rmj-wmp2 | 2021-09-01T22:36:39Z | 2019-09-13T13:25:47Z | null | ['CVE-2019-1301'] | High severity vulnerability that affects System.Management.Automation | ## Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in .NET Core
# Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in PowerShell Core
## Executive Summary
A denial of service vulnerability exists when PowerShell Core or .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a PowerShell Core scripts.
The update addresses the vulnerability by correcting how the .NET Core handles web requests.
System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).)
## Discussion
Please [open a support question](https://github.com/PowerShell/PowerShell/issues/new?assignees=&labels=Issue-Question&template=Support_Question.md&title=Support+Question) to discussion the PowerShell aspects of this advisory.
Please use dotnet/announcements#121 for discussion of the .NET aspects this advisory.
## <a name="affected-software">Affected Software</a>
The vulnerability affects PowerShell Core prior to the following versions:
| PowerShell Core Version | Fixed in |
|-------------------------|-------------------|
| 6.1 | 6.1.6 |
| 6.2 | 6.2.3 |
| 7.0 | unaffected |
## Advisory FAQ
### How do I know if I am affected?
If all of the following are true:
1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected.
1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`.
### How do I update to an unaffected version?
Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in PowerShell Core,
please email details to secure@microsoft.com.
### Support
You can ask questions about this issue on GitHub in the PowerShell organization.
This is located at https://github.com/PowerShell/.
The Announcements repo (https://github.com/PowerShell/Announcements)
will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions.
### What if the update breaks my script or module?
You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core.
This should be treated as a temporary measure.
Therefore, the script or module should be updated to work with the patched version of PowerShell Core.
### Acknowledgments
Paul Ryman of VMware Sydney Engineering Team
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information.
### External Links
[CVE-2019-1301](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301)
### Revisions
V1.0 (September 12, 2019): Advisory published.
*Version 1.0*
*Last Updated 2019-09-12* | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-62gw-3rmj-wmp2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1301'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-62gw-3rmj-wmp2'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5w65-6875-rhq8 | 2020-08-31T18:34:32Z | 2019-09-11T23:01:57Z | null | [] | Undefined Behavior in sailsjs-cacheman | All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sailsjs-cacheman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gayanhewa/sailsjs-cacheman/pull/10'}, {'type': 'WEB', 'url': 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/752'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T23:31:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r74q-gxcg-73hx | 2023-08-28T10:44:04Z | 2019-09-30T19:41:15Z | null | ['CVE-2019-16676'] | Improper Input Validation in simple_form | ## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call
### Impact
For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example:
```erb
<%= simple_form_for @user do |f| %>
<%= f.label @user_supplied_string %>
...
<% end %>
```
The string provided in the variable `@user_supplied_string` would be invoked as a method call inside the `@user` object (unless the string contains any of the following: `password`, `time_zone`, `country`, `email`, `phone` and `url`).
By manipulation that input, an attacker could do any of the following:
- Code execution (call actions like `#destroy`)
- Denial of Service (by executing a computation intensive method)
- Information Disclosure (check the presence of methods, leak user information)
### Patches
The problem was fixed in version `5.0`. Although it's a major version, there should be no issues with upgrading for `4.x`. The reason it was released in a major version is that the configuration `SimpleForm.file_methods` was deprecated in order to fix the problem.
### Workarounds
The issue only happens with pages that build forms based on user-provided input. If your application doesn't do that, you're not affected.
A workaround is to explicitly pass which type you want for an input since the issue lies on Simple Form's automatically discovery of input types. This can be done using the `as` option, like the following:
```erb
<%= form.input :avatar, as: :file %>
```
### References
[TDB]
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/plataformatec/simple_form](https://github.com/plataformatec/simple_form)
* Email us at [opensource@plataformatec.com.br](mailto:opensource@plataformatec.com.br) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'simple_form'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16676'}, {'type': 'WEB', 'url': 'https://github.com/heartcombo/simple_form/commit/8c91bd76a5052ddf3e3ab9fd8333f9aa7b2e2dd6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r74q-gxcg-73hx'}, {'type': 'PACKAGE', 'url': 'https://github.com/heartcombo/simple_form'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/simple_form/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/simple_form/CVE-2019-16676.yml'}, {'type': 'WEB', 'url': 'http://blog.plataformatec.com.br/2019/09/incorrect-access-control-in-simple-form-cve-2019-16676/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2j5x-56p6-hj6x | 2023-09-12T19:30:43Z | 2019-09-04T10:02:14Z | null | ['CVE-2019-5480'] | Path Traversal in statichttpserver | All versions of `statichttpserver` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'statichttpserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5480'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570035'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1143'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T09:51:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2xwv-3cc9-fp7c | 2020-08-31T18:49:15Z | 2019-09-11T23:07:57Z | null | ['CVE-2019-5483'] | Sensitive Data Exposure in seneca | Versions of `seneca` prior to 3.9.0 are vulnerable to Sensitive Data Exposure. When a process using the package crashes all environment variables are printed. This may leak sensitive data such as access keys, especially given scenarios when log-monitoring systems store the error output.
## Recommendation
Upgrade to version 3.9.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'seneca'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5483'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/526258'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/501.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1155'}] | {'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:45:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cxw4-9qv9-vx5h | 2022-01-18T23:06:09Z | 2019-09-30T19:42:28Z | null | [] | High severity vulnerability that affects PeterO.Cbor | ### Impact
The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.
The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.
### Patches
This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.
### Workarounds
Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.
In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows:
CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false"));
In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:
if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) {
cbor.EncodeToBytes();
}
Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called "limited memory stream", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.
using(var stream = new LimitedMemoryStream(100000)) { // Limit to 100000 bytes
cbor.WriteTo(stream);
return stream.ToBytes();
}
To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).
### References
See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
| [] | [{'package': {'ecosystem': 'NuGet', 'name': 'PeterO.Cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-cxw4-9qv9-vx5h'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-549f-73hh-mj38 | 2023-06-01T19:46:39Z | 2019-09-16T22:24:02Z | null | ['CVE-2019-5485'] | Command Injection in gitlabhook | All versions of `gitlabhook` are vulnerable to Command Injection. The package does not validate input the body of POST request and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'gitlabhook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5485'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/685447'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154598/NPMJS-gitlabhook-0.0.17-Remote-Command-Execution.html'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-16T22:23:36Z', 'nvd_published_at': '2019-09-13T18:15:00Z'} |
1.4.0 | GHSA-fgmr-vx7c-5wj6 | 2021-07-27T21:51:14Z | 2019-09-26T21:30:34Z | null | ['CVE-2019-10071'] | Timing attack on HMAC signature comparison in Apache Tapestry | The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison should be done with a constant time algorithm instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4'}, {'fixed': '5.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10071'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e8f42c88da7be3c60aafe3f6a85eb00b4f8b444de26b38d36233a43@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7a437dad5af7309aba4d01bfc2463b3ac34e6aafaa565381d3a36460@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E'}] | {'cwe_ids': ['CWE-203', 'CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-23T22:30:40Z', 'nvd_published_at': '2019-09-16T18:15:00Z'} |
1.4.0 | GHSA-5m2v-hc64-56h6 | 2023-08-29T15:33:31Z | 2019-09-30T16:05:32Z | null | ['CVE-2019-16892'] | Rubyzip denial of service | In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16892'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/pull/403'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:4047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4201'}, {'type': 'WEB', 'url': 'https://github.com/jdleesmiller/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2019-16892.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2019-16892.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubyzip/rubyzip'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J45KSFPP6DFVWLC7Z73L7SX735CKZYO6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWWPORMSBHZTMP4PGF4DQD22TTKBQMMC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X255K6ZBAQC462PQN2ND5HOTTQEJ2G2X/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-30T16:04:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xf27-jqwv-gf3r | 2023-09-11T18:33:46Z | 2019-09-11T23:03:57Z | null | ['CVE-2019-5479'] | Unintended Require in larvitbase-api | Versions of `larvitbase-api` prior to 0.5.4 are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running.
## Recommendation
Upgrade to version 0.5.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'larvitbase-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5479'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/566056'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1120'}] | {'cwe_ids': ['CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T14:29:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mwp6-j9wf-968c | 2021-10-11T21:10:33Z | 2019-09-13T21:33:25Z | 2020-06-26T16:40:47Z | [] | Critical severity vulnerability that affects generator-jhipster | Account takeover and privilege escalation is possible in applications generated by generator-jhipster before 6.3.0. This is due to a vulnerability in the generated java classes: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Generated applications must be manually patched, following instructions in the release notes: https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j3rh-8vwq-wh84'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwp6-j9wf-968c'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhipster/generator-jhipster'}] | {'cwe_ids': ['CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v6cj-r88p-92rm | 2021-09-20T15:40:54Z | 2019-09-30T19:31:59Z | null | [] | Buffer Overflow in centra | ## Denial of Service
### Impact
Affected Centra versions will, when not in stream mode, buffer responses to requests into memory with no size limit. This issue affects anyone requesting content from untrusted sources.
### Patches
Version 2.4.0 resolves the issue by limiting the size of buffered response body.
### Workarounds
Attempting workarounds isn't recommended. Updating is preferred.
### For more information
If you have any questions or comments about this advisory, open an issue in [ethanent/centra](https://github.com/ethanent/centra).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'centra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ethanent/centra/security/advisories/GHSA-v6cj-r88p-92rm'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v6cj-r88p-92rm'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethanent/centra'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CENTRA-536073'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2p82-v77v-mppr | 2023-06-09T20:03:44Z | 2019-09-11T23:05:57Z | null | ['CVE-2019-16060'] | Airbrake keys not being filtered | The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'airbrake-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.3'}, {'fixed': '4.2.4'}]}], 'versions': ['4.2.3']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16060'}, {'type': 'WEB', 'url': 'https://github.com/airbrake/airbrake-ruby/issues/468'}, {'type': 'WEB', 'url': 'https://github.com/airbrake/airbrake-ruby/pull/469/commits/d29925e7838031bf7dea7016b22de52532503796'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/airbrake-ruby/CVE-2019-16060.yml'}] | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:39:04Z', 'nvd_published_at': '2019-09-06T19:15:00Z'} |
1.4.0 | GHSA-63qc-p2x4-9fgf | 2021-04-27T19:46:40Z | 2019-09-17T22:47:11Z | null | ['CVE-2019-11777'] | Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library | In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.paho:org.eclipse.paho.client.mqttv3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11777'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=549934'}] | {'cwe_ids': ['CWE-346', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-13T21:47:04Z', 'nvd_published_at': '2019-09-11T18:15:00Z'} |
1.4.0 | GHSA-536q-8gxx-m782 | 2020-08-31T18:42:32Z | 2019-09-11T23:02:57Z | null | ['CVE-2010-2273'] | Cross-Site Scripting in dojo | Versions of `dojo` prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the `_testCommon.js` and `runner.html` test files, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.4.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}], 'versions': ['1.13.0']}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2273'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/pull/307'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4'}, {'type': 'WEB', 'url': 'https://bugs.dojotoolkit.org/ticket/10773'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/972'}, {'type': 'WEB', 'url': 'http://bugs.dojotoolkit.org/ticket/10773'}, {'type': 'WEB', 'url': 'http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/38964'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/40007'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21431472'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994'}, {'type': 'WEB', 'url': 'http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2010/1281'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T04:12:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3v43-877x-qgmq | 2021-08-31T21:29:59Z | 2019-09-17T22:47:47Z | null | ['CVE-2019-10010'] | Moderate severity vulnerability that affects league/commonmark | ## CVE-2019-10010
### Impact
In `league/commonmark` 0.18.2 and below, malicious users can insert double-encoded HTML entities into their Markdown like this:
```md
[XSS](javascript&colon;alert%28'XSS'%29)
```
This library would (correctly) unescape the `&` entity to `&` during the parsing step. However, **the renderer step would fail to properly re-escape the resulting `:` string**, thus producing the following malicious HTML output:
```html
<p><a href="javascript:alert('XSS')">XSS</a></p>
```
Browsers would interpret `:` as a `:` character and allow the JS to be executed when the link is clicked.
This vulnerability was present in the upstream library this project was forked from and therefore exists in all prior versions of `league/commonmark`.
### Solution
The new [0.18.3](https://github.com/thephpleague/commonmark/releases/tag/0.18.3) release mirrors [the fix made upstream](https://github.com/commonmark/commonmark.js/commit/c89b35c5fc99bdf1d2181f7f0c9fcb8a1abc27c8) - we no longer attempt to preserve entities when rendering HTML attributes like `href`, `src`, `title`, etc.
The `$preserveEntities` parameter of `Xml::escape()` is therefore no longer used internally, so it has been deprecated and marked for removal in the next major release (0.19.0).
### Credits
- Mohit Fawaz for identifying the issue
- Sebastiaan Knijnenburg and Ross Tuck for responsibly disclosing/relaying the issue
- John MacFarlane for investigating it and implementing the upstream fix we mirrored here
### References
- https://nvd.nist.gov/vuln/detail/CVE-2019-10010
- https://github.com/thephpleague/commonmark/releases/tag/0.18.3
- https://github.com/thephpleague/commonmark/issues/353
- https://github.com/FriendsOfPHP/security-advisories/blob/master/league/commonmark/CVE-2019-10010.yaml | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'league/commonmark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/security/advisories/GHSA-3v43-877x-qgmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10010'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/issues/353'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v43-877x-qgmq'}, {'type': 'PACKAGE', 'url': 'https://github.com/thephpleague/commonmark/'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/releases/tag/0.18.3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9mrq-cjgh-32g2 | 2021-12-03T14:38:19Z | 2019-09-13T13:22:33Z | null | [] | Low severity vulnerability that affects smartbanner.js | ## rel noopener vulnerability
### Impact
Clicking on smartbanner _View_ link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile 3rd parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner.
### Patches
`rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability.
### Workarounds
If you can not upgrade to `v1.14.1`:
1. Ensure _View_ link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams
2. If _View_ link is going to a 3rd party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links.
Following combination of smartbanner meta tags can be used to achieve the above:
```html
<meta name="smartbanner:enabled-platforms" content="none">
<meta name="smartbanner:include-user-agent-regex" content="Mobile.*Safari">
```
### References
* [About rel=noopener](https://mathiasbynens.github.io/rel-noopener/)
* [Safari 12.1 Release Notes](https://developer.apple.com/documentation/safari_release_notes/safari_12_1_release_notes#3130296)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [smartbanner.js](https://github.com/ain/smartbanner.js/issues/new)
| [] | [{'package': {'ecosystem': 'npm', 'name': 'smartbanner.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mrq-cjgh-32g2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ain/smartbanner.js/'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p6mr-pxg4-68hx | 2023-03-01T01:53:44Z | 2019-09-17T23:21:34Z | null | ['CVE-2019-5484'] | Symlink Arbitrary File Overwrite in bower | Versions of `bower` prior to 1.8.8 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `bower` does not verify that extracted symbolic links do not resolve to targets outside of the extraction root directory.
## Recommendation
Update to version 1.8.8 or later | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bower'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5484'}, {'type': 'WEB', 'url': 'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/473811'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/487.json'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/776'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-17T23:21:00Z', 'nvd_published_at': '2019-09-13T18:15:00Z'} |
1.4.0 | GHSA-6m4r-cgm3-6q7q | 2021-08-17T22:30:43Z | 2019-09-23T18:32:54Z | null | ['CVE-2019-15478'] | Cross-Site Scripting in status-board | All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderJsDashboard()` function concatenates the `safeDashboard` variable to the HTTP response message with insufficient sanitization. If this variable is controlled by user input it may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'status-board'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.82'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15478'}, {'type': 'WEB', 'url': 'https://github.com/jameswlane/status-board/pull/949'}, {'type': 'WEB', 'url': 'https://github.com/jameswlane/status-board/pull/949/files'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460293'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1151'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:15:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mc84-xr9p-938r | 2021-09-15T18:50:22Z | 2019-09-23T18:31:05Z | null | [] | High severity vulnerability that affects generator-jhipster | ## Generated code uses repository configuration that downloads over HTTP instead of HTTPS
### Impact
Gradle users were using the http://repo.spring.io/plugins-release repositories in plain HTTP, and not HTTPS, so a man-in-the-middle attack was possible at build time.
### Patches
Maven users should at least upgrade to 6.3.0 while Gradle users should update to 6.3.1.
If you are not able to upgrade make sure not to use a Maven repository via `http` in your build file.
### Workarounds
Replace all custom repository definitions in `build.gradle` or `pom.xml` with their `https` version.
e.g.
```xml
<repository>
<id>oss.sonatype.org-snapshot</id>
<url>https://oss.sonatype.org/content/repositories/snapshots</url> // <-- must be httpS
<releases>
<enabled>false</enabled>
</releases>
<snapshots>
<enabled>true</enabled>
</snapshots>
</repository>
```
```gradle
maven { url "https://repo.spring.io/plugins-release" } // <-- must be httpS
```
### References
* https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/jhipster/generator-jhipster/issues](https://github.com/jhipster/generator-jhipster/issues)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mc84-xr9p-938r'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc84-xr9p-938r'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhipster/generator-jhipster/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-536074'}] | {'cwe_ids': ['CWE-494', 'CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8864-rhmw-5m6f | 2022-08-03T15:33:55Z | 2019-09-23T18:32:42Z | null | ['CVE-2019-15479'] | Status Board vulnerable to Cross-Site Scripting before v1.1.82 | Versions of `status-board` prior to 1.1.82 are vulnerable to Cross-Site Scripting. The `renderDashboard()` function concatenates the `safeDashboard` variable to the printed error message with insufficient sanitization. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.1.82 to receive a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'status-board'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.82'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15479'}, {'type': 'WEB', 'url': 'https://github.com/jameswlane/status-board/pull/948'}, {'type': 'WEB', 'url': 'https://github.com/status-board/status-board/commit/19106617865406aa6f8edec036dcb1db427d5f71'}, {'type': 'PACKAGE', 'url': 'https://github.com/jameswlane/status-board'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460295'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:16:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4fgq-gq9g-3rw7 | 2021-04-01T20:57:58Z | 2019-09-23T18:32:16Z | null | ['CVE-2019-10201'] | Improper Verification of Cryptographic Signature in keycloak | It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10201'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10201'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:26:01Z', 'nvd_published_at': '2019-08-14T17:15:00Z'} |
1.4.0 | GHSA-vf23-f26f-mjj9 | 2022-09-17T00:16:53Z | 2019-09-23T18:32:02Z | null | ['CVE-2019-14537'] | Access of Resource Using Incompatible Type ('Type Confusion') in yourls/yourls | ## Type juggling vulnerability in the API
### Impact
YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass.
### Patches
https://github.com/YOURLS/YOURLS/releases/tag/1.7.4
https://github.com/YOURLS/YOURLS/pull/2542
### References
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14537
* https://github.com/Wocanilo/CVE-2019-14537
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [YOURLS repository](https://github.com/YOURLS/YOURLS) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/security/advisories/GHSA-vf23-f26f-mjj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14537'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/pull/2542'}, {'type': 'WEB', 'url': 'https://github.com/Wocanilo/CVE-2019-14537'}, {'type': 'PACKAGE', 'url': 'https://github.com/YOURLS/YOURLS'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/releases'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vf23-f26f-mjj9'}, {'type': 'WEB', 'url': 'https://security-garage.com/index.php/cves/cve-2019-14537-api-authentication-bypass-via-type-juggling'}] | {'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gjh4-fcv3-whpq | 2021-08-17T22:20:20Z | 2019-09-04T10:02:50Z | null | ['CVE-2019-15782'] | Cross-Site Scripting in webtorrent | Versions of `webtorrent` prior to 0.107.6 are vulnerable to Cross-Site Scripting. `webtorrent` servers started with `torrent.createServer()` lists a torrent's title and files in the index page without sanitization. This allows attackers to execute arbitrary JavaScript in the victim's browser through files with names containing the malicious payload. The issue is mitigated due to the fact that the server only allows fetching data pieces from the torrent.
## Recommendation
Upgrade to version 0.107.6 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'webtorrent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.107.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15782'}, {'type': 'WEB', 'url': 'https://github.com/webtorrent/webtorrent/pull/1714'}, {'type': 'WEB', 'url': 'https://github.com/webtorrent/webtorrent/commit/7e829b5d52c32d2e6d8f5fbcf0f8f418fffde083'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/681617'}, {'type': 'WEB', 'url': 'https://github.com/webtorrent/webtorrent/compare/v0.107.5...v0.107.6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEBTORRENT-460351'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1158'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T09:58:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fxh6-w476-hgr4 | 2021-08-17T22:21:47Z | 2019-09-11T22:59:57Z | null | ['CVE-2018-1002206'] | Directory Traversal in SharpCompress | SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'SharpCompress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T22:22:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8jhx-9gf4-hhf5 | 2023-08-29T11:51:45Z | 2019-09-27T20:01:00Z | null | ['CVE-2019-16377'] | Consul gem insufficient authentication check - Multiple powers in one controller are not always checked correctly | With the consul ruby gem before 1.0.3, if a controller checks multiple powers using `:if` or `:except` conditions, these conditions are erroneously applied to all power checks in that controller. This can lead to skipped power checks and hence unauthenticated access to certain controller actions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'consul'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16377'}, {'type': 'WEB', 'url': 'https://github.com/makandra/consul/issues/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/makandra/consul'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/c26fbc13435b8be448ad59131428538049d165e4/gems/consul/CVE-2019-16377.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/consul/CVE-2019-16377.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/consul'}] | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T01:09:01Z', 'nvd_published_at': '2019-09-23T16:15:00Z'} |