schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
nullclasses 24
values | aliases
stringlengths 2
20
| summary
stringlengths 9
130
⌀ | details
stringlengths 34
11.7k
| severity
stringlengths 2
92
| affected
stringlengths 73
3.22k
| references
stringlengths 64
21.2k
| database_specific
stringlengths 131
202
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-xq5j-gw7f-jgj8 | 2023-08-08T15:14:47Z | 2020-07-07T16:34:10Z | null | ['CVE-2020-8167'] | CSRF Vulnerability in rails-ujs | There is a vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains.
Versions Affected: rails <= 6.0.3
Not affected: Applications which don't use rails-ujs.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
This is a regression of CVE-2015-1840.
In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to a cross-origin URL, and the CSRF token will be sent.
Workarounds
-----------
To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters.
For example, code like this:
link_to params
to code like this:
link_to filtered_params
def filtered_params
# Filter just the parameters that you trust
end | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8167'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/189878'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8167.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/x9DixQDG9a0'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4766'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T15:51:37Z', 'nvd_published_at': '2020-06-19T18:15:00Z'} |
1.4.0 | GHSA-ff7x-qrg7-qggm | 2022-08-11T14:58:19Z | 2020-07-29T20:56:59Z | null | ['CVE-2020-8116'] | dot-prop Prototype Pollution vulnerability | Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'dot-prop'}, 'ecosystem_specific': {'affected_functions': ['dot-prop.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dot-prop'}, 'ecosystem_specific': {'affected_functions': ['dot-prop.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8116'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/issues/63'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/commit/3039c8c07f6fdaa8b595ec869ae0895686a7a0f2'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/commit/c914124f418f55edea27928e89c94d931babe587'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/719856'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ff7x-qrg7-qggm'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/dot-prop'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/tree/v4'}] | {'cwe_ids': ['CWE-1321', 'CWE-425', 'CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T20:51:37Z', 'nvd_published_at': '2020-02-04T20:15:00Z'} |
1.4.0 | GHSA-976r-qfjj-c24w | 2021-09-22T21:16:56Z | 2020-07-27T16:57:33Z | null | ['CVE-2020-11981'] | Command injection via Celery broker in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['airflow.www_rbac.views.Airflow.index']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11981'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/afa4b11fddfdbadb048f742cf66d5c21c675a5c8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220427031325/https://issues.apache.org/jira/browse/AIRFLOW-6351'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-34gh-3cwv-wvp2 | 2021-09-23T17:29:15Z | 2020-07-29T18:07:11Z | null | ['CVE-2020-7683'] | Directory traversal in rollup-plugin-server | This affects all versions of package rollup-plugin-server. There is no path sanitization in readFile operation performed inside the readFileFromContentBase function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rollup-plugin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7683'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:45:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpqv-x9hm-35j9 | 2021-09-23T18:13:50Z | 2020-07-31T17:39:22Z | null | ['CVE-2020-16095'] | Potential XSS vulnerability in Kitodo.Presentation | ### Impact
Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected.
It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, although there is currently no known way to exploit this in Kitodo.Presentation.
### Patches
An updated version of Kitodo.Presentation is available on [GitHub](https://github.com/kitodo/kitodo-presentation/releases/tag/v3.1.2), [Packagist](https://packagist.org/packages/kitodo/presentation#v3.1.2) and in the [TYPO3 Extension Repository](https://extensions.typo3.org/extension/dlf/). Users are advised to update as soon as possible.
The issue was also fixed in release 2.3.1 of the 2.x branch, although it is generally not recommended to run this branch since it depends on an outdated TYPO3 version.
### References
TYPO3 Security Advisory [TYPO3-EXT-SA-2020-015](https://typo3.org/security/advisory/typo3-ext-sa-2020-015)
jQuery Security Advisory [GHSA-gxr4-xjj5-5px2](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2)
Open Bug Bounty Report [OBB-1219978](https://www.openbugbounty.org/reports/1219978/)
### Contact
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/kitodo/kitodo-presentation/issues/new/choose)
* Email us at [security@kitodo.org](mailto:security@kitodo.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kitodo/presentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16095'}, {'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'}, {'type': 'PACKAGE', 'url': 'https://github.com/kitodo/kitodo-presentation'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-015'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T15:07:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xp63-6vf5-xf3v | 2021-01-07T23:47:13Z | 2020-07-20T17:20:20Z | null | ['CVE-2020-15123'] | Command injection in codecov (npm package) | ### Impact
The `upload` method has a command injection vulnerability. Clients of the `codecov-node` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
A similar CVE was issued: [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), but the fix was incomplete. It only blocked `&`, and command injection is still possible using backticks instead to bypass the sanitizer.
We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `codecov-node` project [here](https://lgtm.com/query/7714424068617023832/).
### Patches
This has been patched in version 3.7.1
### Workarounds
None, however, the attack surface is low in this case. Particularly in the standard use of codecov, where the module is used directly in a build pipeline, not built against as a library in another application that may supply malicious input and perform command injection.
### References
* [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh)
### For more information
If you have any questions or comments about this advisory:
* Contact us via our [Security Email](mailto:security@codecov.io) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/security/advisories/GHSA-xp63-6vf5-xf3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15123'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/pull/180'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh'}, {'type': 'WEB', 'url': 'https://lgtm.com/query/7714424068617023832'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-20T17:19:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gprm-xqrc-c2j3 | 2021-09-22T21:56:35Z | 2020-07-27T22:51:44Z | null | ['CVE-2020-1956'] | Command Injection in Kylin | Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1956'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092'}, {'type': 'WEB', 'url': 'https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/14/1'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h4g-27m8-qjrg | 2021-09-22T20:28:29Z | 2020-07-07T19:24:47Z | null | ['CVE-2020-15779'] | Path Traversal in socket.io-file | All versions of `socket.io-file` are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The `socket.io-file::createFile` message contains a `name` option that is passed directly to `path.join()`. It is possible to upload files to arbitrary folders on the server by sending relative paths on the `name` value, such as `../../test.js`. The `uploadDir` and `rename` options can be used to define the file upload path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'socket.io-file'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15779'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9h4g-27m8-qjrg'}, {'type': 'PACKAGE', 'url': 'https://github.com/rico345100/socket.io-file'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1519'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/socket.io-file'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T19:23:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jcq3-cprp-m333 | 2021-09-22T18:47:45Z | 2020-07-01T17:12:20Z | null | ['CVE-2019-2692'] | Privilege escalation in mysql-connector-jav | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-2692'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190423-0002/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107925'}] | {'cwe_ids': ['CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:11:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3q49-h8f9-9fr9 | 2023-05-16T16:03:45Z | 2020-07-31T17:39:42Z | null | ['CVE-2020-15134'] | Missing TLS certificate verification | Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of its client. Those libraries both use the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `https:` or `wss:` connection made using these libraries is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to.
The first request a Faye client makes is always sent via normal HTTP, but later messages may be sent via WebSocket. Therefore it is vulnerable to the same problem that these underlying libraries are, and we needed both libraries to support TLS verification before Faye could claim to do the same. Your client would still be insecure if its initial HTTPS request was verified, but later WebSocket connections were not.
This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, em-http-request published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for
the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into faye-websocket.
After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in Faye, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that all clients have TLS verification turned on by default. A client that is not carrying out verification is either:
- talking to the expected server, and will not break under this change
- being attacked, and would benefit from being alerted to this fact
- deliberately talking to a server that would be rejected by verification
The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be "working by accident", rather than functionality that was actively supported, and it should be properly and explicitly supported instead.
We are releasing Faye v1.4.0, which enables verification by default and provides a way to opt out of it:
```rb
client = Faye::Client.new('https://example.com/', tls: { verify_peer: false })
```
Unfortunately we can't offer an equivalent of the `:root_cert_file` option that has been added to faye-websocket, because em-http-request does not support it. If you need to talk to servers whose certificates are not recognised by your default root certificates, then you need to add its certificate (or another one that can verify it) to your system's root set.
The same functionality is now supported in the Node.js version, with a `tls` option whose values will be passed to the `https` and `tls` modules as appropriate when making connections. For example, you can provide your own CA certificate:
```js
var client = new faye.Client('https://example.com/', {
tls: {
ca: fs.readFileSync('path/to/certificate.pem')
}
});
```
For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue.
[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
[2]: https://rubygems.org/gems/eventmachine
[3]: https://github.com/eventmachine/eventmachine/issues/275
[4]: https://github.com/eventmachine/eventmachine/pull/378
[5]: https://github.com/eventmachine/eventmachine/issues/814
[6]: https://rubygems.org/gems/em-http-request
[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
[8]: https://github.com/igrigorik/em-http-request/pull/340
[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
[10]: https://rubygems.org/gems/faye-websocket
[11]: https://faye.jcoglan.com/
[12]: https://github.com/faye/faye/issues/524
[13]: https://github.com/faye/faye-websocket-ruby/pull/129
[14]: https://github.com/SpComb
[15]: https://github.com/DanielMorsing | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/faye/faye/security/advisories/GHSA-3q49-h8f9-9fr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15134'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/275'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/814'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye/issues/524'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/pull/378'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye-websocket-ruby/pull/129'}, {'type': 'WEB', 'url': 'https://github.com/igrigorik/em-http-request/pull/340'}, {'type': 'WEB', 'url': 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/faye'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faye/CVE-2020-15134.yml'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:38:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2jpm-827p-j44g | 2021-01-07T23:47:19Z | 2020-07-09T18:28:07Z | null | ['CVE-2020-15092'] | Stored XSS in TimelineJS3 | ### Impact
TimelineJS renders some user data as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file.
Most TimelineJS users configure their timeline with a Google Sheets document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if they grant public write access to the document.
Some TimelineJS users configure their timeline with a JSON document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if write access to the system hosting that document is otherwise compromised.
Although the vulnerability has a [CVSS v3.1 base score of 7.2](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), this vulnerability has a severity of Moderate due to the likeliness of exploitation.
### Patches
Version 3.7.0 of TimelineJS addresses this in two ways.
1. For content which is intended to support limited HTML markup for styling and linking, that content is "sanitized" before being added to the DOM.
1. For content intended for simple text display, all markup is stripped.
Very few users of TimelineJS actually install the TimelineJS code on their server. Most users publish a timeline using a URL hosted on systems we control. The fix for this issue is published to our system such that **those users will automatically begin using the new code**. The only exception would be users who have deliberately edited the embed URL to "pin" their timeline to an earlier version of the code.
Some users of TimelineJS use it as a part of a [wordpress plugin](https://wordpress.org/plugins/knight-lab-timelinejs/). Version 3.7.0.0 of that plugin and newer integrate the updated code. Users are encouraged to update the plugin rather than manually update the embedded version of TimelineJS.
### Workarounds
To exploit this vulnerability, the attacker must have write access to the data source for the Timeline or the server which embeds the timeline.
Thus, the only workaround is appropriate attention to securing write access to the Google Sheet or JSON file which serves as the data source.
### References
For more about the release of TimelineJS which addresses this vulnerability, see the [Knight Lab website](https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html).
A technical write-up of this vulnerability is available [here](https://zanderwork.com/blog/cve-2020-15092/).
### Acknowledgements
This vulnerability was discovered by Zander Work ([@captainGeech42](https://twitter.com/captainGeech42)) of Oregon State University.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](https://github.com/NUKnightLab/TimelineJS3/issues)
* File a support request in our [helpdesk system](https://knightlab.zendesk.com/hc/en-us/requests/new) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@knight-lab/timelinejs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NUKnightLab/TimelineJS3/security/advisories/GHSA-2jpm-827p-j44g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15092'}, {'type': 'WEB', 'url': 'https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html'}, {'type': 'WEB', 'url': 'https://knightlab.northwestern.edu/posts/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-09T18:27:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mm44-wc5p-wqhq | 2022-01-18T23:05:18Z | 2020-07-07T16:45:24Z | null | [] | Denial of service due to reference expansion in versions earlier than 4.0 | ### Impact
The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.
The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.
### Patches
This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.
### Workarounds
Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.
In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows:
CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false"));
In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:
if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) {
cbor.EncodeToBytes();
}
Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called "limited memory stream", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.
LimitedMemoryStream stream = new LimitedMemoryStream(100000); // Limit to 100000 bytes
cbor.WriteTo(stream);
return stream.ToBytes();
To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).
### References
See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).
### For more information
If you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
| [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.upokecenter:cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-mm44-wc5p-wqhq'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR-Java'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:45:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q4p3-qw5c-mhpc | 2021-09-22T21:22:13Z | 2020-07-27T16:57:25Z | null | ['CVE-2020-11983'] | Multiple stored XSS in RBAC Admin screens in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11983'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4h44-w6fm-548g | 2021-11-19T15:44:20Z | 2020-07-29T16:15:12Z | null | ['CVE-2020-15086'] | Potential Remote Code Execution in TYPO3 with mediace extension | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
The overall severity of this vulnerability is critical (9.1) based on mentioned attack chains and the fact it does not require any privileges.
### Solution
In case the extension is not used and required at all, it is suggested to uninstall and remove it from the system completely. Otherwise, an updated version 7.6.5 is available from the TYPO3 extension manager, Packagist and the TYPO3 extension repository:
* https://extensions.typo3.org/extension/download/mediace/7.6.5/zip/
* https://packagist.org/packages/friendsoftypo3/mediace#7.6.5
As a precautionary measure it is advised to change `encryptionKey` and database credentials in `typo3conf/LocalConfiguration.php`.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-EXT-SA-2020-014](https://typo3.org/security/advisory/typo3-ext-sa-2020-014) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'friendsoftypo3/mediace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.6.2'}, {'fixed': '7.6.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15086'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/pull/31'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75'}, {'type': 'PACKAGE', 'url': 'https://github.com/FriendsOfTYPO3/mediace'}] | {'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-325', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:09:56Z', 'nvd_published_at': '2020-07-29T17:15:00Z'} |
1.4.0 | GHSA-93f3-23rq-pjfp | 2022-08-10T23:59:40Z | 2020-07-07T18:56:16Z | null | ['CVE-2020-15095'] | npm CLI exposing sensitive information through logs | Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.14.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15095'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-07'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html'}] | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T18:30:59Z', 'nvd_published_at': '2020-07-07T19:15:00Z'} |
1.4.0 | GHSA-m93v-9qjc-3g79 | 2021-01-07T23:48:11Z | 2020-07-07T00:01:07Z | null | ['CVE-2020-4076'] | Context isolation bypass via leaked cross-context objects in Electron | ### Impact
Apps using `contextIsolation` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
### Non-Impacted Versions
* `9.0.0-beta.*`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4076'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}] | {'cwe_ids': ['CWE-501'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-43fq-w8qq-v88h | 2023-02-28T15:12:44Z | 2020-07-27T21:52:36Z | null | ['CVE-2020-11538'] | Out-of-bounds read in Pillow | In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4504'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756bc512ab3f2ad15ac45665b303d'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574574'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:35:11Z', 'nvd_published_at': '2020-06-25T19:15:00Z'} |
1.4.0 | GHSA-w534-q4xf-h5v2 | 2021-01-07T23:47:26Z | 2020-07-07T16:32:49Z | null | ['CVE-2020-15231'] | XSS in Mapfish Print relating to JSONP support | ### Impact
A user can use the JSONP support to do a Cross-site scripting.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e
* https://cwe.mitre.org/data/definitions/79.html
### For more information
If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-servlet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-standalone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15231'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:31:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-43jj-2rwc-2m3f | 2021-09-22T21:03:46Z | 2020-07-15T17:38:04Z | null | ['CVE-2019-14273'] | Broken access control on files | In SilverStripe assets 4.0, there is broken access control on files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14273'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'PACKAGE', 'url': 'https://github.com/FriendsOfPHP/security-advisories'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2019-14273.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-14273'}] | {'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-15T17:33:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jphg-qwrw-7w9g | 2023-01-25T22:49:03Z | 2020-07-27T18:08:21Z | null | ['CVE-2020-10663'] | Unsafe object creation in json RubyGem | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10663'}, {'type': 'PACKAGE', 'url': 'https://github.com/flori/json'}, {'type': 'WEB', 'url': 'https://github.com/flori/json/blob/master/CHANGES.md#2019-12-11-230'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2020-10663.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210129-0003/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT211931'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4721'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Dec/32'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T18:07:46Z', 'nvd_published_at': '2020-04-28T21:15:00Z'} |
1.4.0 | GHSA-7xcx-6wjh-7xp2 | 2021-09-22T21:03:04Z | 2020-07-13T21:34:59Z | null | [] | Command Injection in standard-version | # GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-111`
The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [standard-version](https://github.com/conventional-changelog/standard-version).
## Summary
The `standardVersion` function has a command injection vulnerability. Clients of the `standard-version` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
## Product
Standard Version
## Tested Version
Commit [2f04ac8](https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9/)
## Details
### Issue 1: Command injection in `standardVersion`
The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in:
```
npm install standard-version
git init
echo "foo" > foo.txt # the git repo has to be non-empty
git add foo.txt
git commit -am "initial commit"
```
Now create a file with the following contents:
```
var fs = require("fs");
// setting up a bit of environment
fs.writeFileSync("package.json", '{"name": "foo", "version": "1.0.0"}');
const standardVersion = require('standard-version')
standardVersion({
noVerify: true,
infile: 'foo.txt',
releaseCommitMessageFormat: "bla `touch exploit`"
})
```
and run it:
```
node test.js
```
Notice that a file named `exploit` has been created.
This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples:
[CVE-2020-7646](https://github.com/advisories/GHSA-m8xj-5v73-3hh8),
[CVE-2020-7614](https://github.com/advisories/GHSA-426h-24vj-qwxf),
[CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh),
[CVE-2019-10778](https://github.com/advisories/GHSA-4gp3-p7ph-x2jr),
[CVE-2019-10776](https://github.com/advisories/GHSA-84cm-v6jp-gjmr),
[CVE-2018-16462](https://github.com/advisories/GHSA-9jm3-5835-537m),
[CVE-2018-16461](https://github.com/advisories/GHSA-7g2w-6r25-2j7p),
[CVE-2018-16460](https://github.com/advisories/GHSA-cfhg-9x44-78h2),
[CVE-2018-13797](https://github.com/advisories/GHSA-pp57-mqmh-44h7),
[CVE-2018-3786](https://github.com/advisories/GHSA-c9j3-wqph-5xx9),
[CVE-2018-3772](https://github.com/advisories/GHSA-wjr4-2jgw-hmv8),
[CVE-2018-3746](https://github.com/advisories/GHSA-3pxp-6963-46r9),
[CVE-2017-16100](https://github.com/advisories/GHSA-jcw8-r9xm-32c6),
[CVE-2017-16042](https://github.com/advisories/GHSA-qh2h-chj9-jffq).
We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `standard-version` project [here](https://lgtm.com/query/237522640229151035/).
#### Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
#### Remediation
We recommend not using an API that can interpret a string as a shell command. For example, use [`child_process.execFile`](https://nodejs.org/api/child_process.html#child_process_child_process_execfile_file_args_options_callback) instead of [`child_process.exec`](https://nodejs.org/api/child_process.html#child_process_child_process_exec_command_options_callback).
## Credit
This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
## Contact
You can contact the GHSL team at `securitylab@github.com`, please include `GHSL-2020-111` in any communication regarding this issue.
## Disclosure Policy
This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/disclosures#policy). | [] | [{'package': {'ecosystem': 'npm', 'name': 'standard-version'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2'}, {'type': 'PACKAGE', 'url': 'https://github.com/conventional-changelog/standard-version'}, {'type': 'WEB', 'url': 'https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9'}] | {'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-13T21:33:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8m73-w2r2-6xxj | 2023-03-03T00:01:57Z | 2020-07-29T17:29:51Z | null | ['CVE-2020-7685'] | Insecure defaults in UmbracoForms | This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types, depending on their security needs and policies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoForms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7685'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765'}] | {'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:28:16Z', 'nvd_published_at': '2020-07-28T17:15:00Z'} |
1.4.0 | GHSA-v7m9-9497-p9gr | 2021-11-19T15:44:01Z | 2020-07-22T23:07:16Z | null | ['CVE-2020-15110'] | Possible pod name collisions in jupyterhub-kubespawner | ### Impact
_What kind of vulnerability is it? Who is impacted?_
JupyterHub deployments using:
- KubeSpawner <= 0.11.1 (e.g. zero-to-jupyterhub 0.9.0) and
- enabled named_servers (not default), and
- an Authenticator that allows:
- usernames with hyphens or other characters that require escape (e.g. `user-hyphen` or `user@email`), and
- usernames which may match other usernames up to but not including the escaped character (e.g. `user` in the above cases)
In this circumstance, certain usernames will be able to craft particular server names which will grant them access to the default server of other users who have matching usernames.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Patch will be released in kubespawner 0.12 and zero-to-jupyterhub 0.9.1
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
#### KubeSpawner
Specify configuration:
for KubeSpawner
```python
from traitlets import default
from kubespawner import KubeSpawner
class PatchedKubeSpawner(KubeSpawner):
@default("pod_name_template")
def _default_pod_name_template(self):
if self.name:
return "jupyter-{username}-{servername}"
else:
return "jupyter-{username}"
@default("pvc_name_template")
def _default_pvc_name_template(self):
if self.name:
return "claim-{username}-{servername}"
else:
return "claim-{username}"
c.JupyterHub.spawner_class = PatchedKubeSpawner
```
**Note for KubeSpawner:** this configuration will behave differently before and after the upgrade, so will need to be removed when upgrading. Only apply this configuration while still using KubeSpawner ≤ 0.11.1 and remove it after upgrade to ensure consistent pod and pvc naming.
Changing the name template means pvcs for named servers will have different names. This will result in orphaned PVCs for named servers across Hub upgrade! This may appear as data loss for users, depending on configuration, but the orphaned PVCs will still be around and data can be migrated manually (or new PVCs created manually to reference existing PVs) before deleting the old PVCs and/or PVs.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [kubespawner](https://github.com/jupyterhub/kubespawner)
* Email us at [security@ipython.org](mailto:security@ipython.org)
Credit: Jining Huang | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub-kubespawner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/jupyterhub/kubespawner/security/advisories/GHSA-v7m9-9497-p9gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15110'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/kubespawner'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-17T20:49:37Z', 'nvd_published_at': '2020-07-17T21:15:00Z'} |
1.4.0 | GHSA-7hmh-8gwv-mfvq | 2021-09-22T21:57:07Z | 2020-07-27T22:51:47Z | null | ['CVE-2020-1937'] | SQL Injection in Kylin | Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25f3f54be143a80a8%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-552148'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:42Z', 'nvd_published_at': '2020-02-24T21:15:00Z'} |
1.4.0 | GHSA-3pc2-fm7p-q2vg | 2021-03-04T18:26:09Z | 2020-07-02T16:55:11Z | null | ['CVE-2020-4061'] | Cross-site Scripting in October | ### Impact
Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack.
### Patches
Issue has been patched in Build 467 (v1.0.467).
### Workarounds
Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installation manually if unable to upgrade to Build 467.
### References
- https://research.securitum.com/the-curious-case-of-copy-paste/
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Low given that by the nature of the attack it can only impact users that do it to themselves by copying and pasting from malicious websites.
### Acknowledgements
Thanks to [Michał Bentkowski of Securitum](https://research.securitum.com/authors/michal-bentkowski/) for finding the original issue in Froala and @tomaszstrojny for reporting the issue to the October CMS team. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.467'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4061'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'}, {'type': 'WEB', 'url': 'https://research.securitum.com/the-curious-case-of-copy-paste/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-02T16:54:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3x94-fv5h-5q2c | 2021-10-08T20:36:13Z | 2020-07-29T16:15:32Z | null | ['CVE-2020-15099'] | Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 CMS | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5)
> * CWE-20, CWE-200
### Problem
In case an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal _encryptionKey_ was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch _typo3conf/LocalConfiguration.php_ which again contains the _encryptionKey_ as well as credentials of the database management system being used.
In case a database server is directly accessible either via internet or in a shared hosting network, this allows to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions.
### Solution
Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3x94-fv5h-5q2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15099'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/TYPO3.CMS'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-007'}] | {'cwe_ids': ['CWE-20', 'CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:14:57Z', 'nvd_published_at': '2020-07-29T17:15:00Z'} |
1.4.0 | GHSA-rvmq-4x66-q7j3 | 2023-09-01T10:09:33Z | 2020-07-27T16:57:33Z | null | ['CVE-2020-11978'] | Remote code execution in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11978'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:54:51Z', 'nvd_published_at': '2020-07-17T00:15:00Z'} |
1.4.0 | GHSA-f97h-2pfx-f59f | 2023-02-01T09:16:37Z | 2020-07-29T18:07:20Z | null | ['CVE-2020-7695'] | HTTP response splitting in uvicorn | Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'uvicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7695'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/uvicorn'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:37:41Z', 'nvd_published_at': '2020-07-27T12:15:00Z'} |
1.4.0 | GHSA-5jpf-pj32-xx53 | 2021-01-07T23:44:25Z | 2020-07-29T16:26:22Z | null | ['CVE-2020-15125'] | Authorization header is not sanitized in an error object in auth0 | ### Overview
Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using `auth0` npm package
- You are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentials
### How to fix that?
Upgrade to version `2.27.1`
### Will this update impact my users?
The fix provided in patch will not affect your users.
### Credit
http://github.com/osdiab | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15125'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/pull/507'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/tree/v2.27.1'}] | {'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:25:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-236h-rqv8-8q73 | 2021-01-07T23:46:50Z | 2020-07-22T23:06:47Z | null | ['CVE-2020-15126'] | GraphQL: Security breach on Viewer query | ### Impact
An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object.
### Patches
This vulnerability has been patched in Parse Server 4.3.0.
### Workarounds
No
### References
See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15126'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-22T23:06:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vr98-27qj-3c8q | 2023-09-05T23:31:52Z | 2020-07-29T18:07:35Z | null | ['CVE-2020-7686'] | Directory traversal in rollup-plugin-server | This affects all versions of package rollup-plugin-dev-server. There is no path sanitization in `readFile` operation inside the `readFileFromContentBase` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rollup-plugin-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7686'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:46:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5x3v-2gxr-59m2 | 2021-04-07T19:55:55Z | 2020-07-01T17:26:15Z | null | ['CVE-2019-17572'] | Directory traversal in Apache RocketMQ | In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.rocketmq:rocketmq-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572'}, {'type': 'WEB', 'url': 'https://github.com/apache/rocketmq/issues/1637'}, {'type': 'WEB', 'url': 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2020/q2/112'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:26:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gm9x-q798-hmr4 | 2021-09-23T17:26:33Z | 2020-07-29T14:53:40Z | null | [] | Command Injection in git-tags-remote | All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled.
The following proof-of-concept creates a file in `/tmp`:
```
const gitTagsRemote = require('git-tags-remote');
gitTagsRemote.get('https://github.com/sh0ji/git-tags-remote.git; echo "Injection Success" > /tmp/command-injection.test')
.then(tags => console.log(tags));
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-tags-remote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sh0ji/git-tags-remote/issues/58'}, {'type': 'WEB', 'url': 'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sh0ji/git-tags-remote'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1517'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T14:52:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h9jc-284h-533g | 2021-01-07T23:48:28Z | 2020-07-07T00:01:10Z | null | ['CVE-2020-4077'] | Context isolation bypass via contextBridge in Electron | ### Impact
Apps using both `contextIsolation` and `contextBridge` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}] | {'cwe_ids': ['CWE-501'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f9mq-jph6-9mhm | 2021-01-07T23:48:36Z | 2020-07-07T00:01:13Z | null | ['CVE-2020-4075'] | Arbitrary file read via window-open IPC in Electron | ### Impact
The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open.
### Workarounds
Ensure you are calling `event.preventDefault()` on all [`new-window`](https://electronjs.org/docs/api/web-contents#event-new-window) events where the `url` or `options` is not something you expect.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4075'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}] | {'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:54:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vj42-xq3r-hr3r | 2023-09-05T09:11:44Z | 2020-07-27T21:52:39Z | null | ['CVE-2020-10994'] | Out-of-bounds reads in Pillow | In `libImaging/Jpeg2KDecode.c` in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10994'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4505'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574575'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:51:26Z', 'nvd_published_at': '2020-06-25T19:15:00Z'} |
1.4.0 | GHSA-vh7m-p724-62c2 | 2021-09-23T17:39:58Z | 2020-07-29T20:40:35Z | null | ['CVE-2020-13822'] | Signature Malleabillity in elliptic | The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'elliptic'}, 'ecosystem_specific': {'affected_functions': ['elliptic.ec']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13822'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/issues/226'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/commit/856fe4d99fe7b6200556e6400b3bf585b1721bec'}, {'type': 'PACKAGE', 'url': 'https://github.com/indutny/elliptic'}, {'type': 'WEB', 'url': 'https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/elliptic'}, {'type': 'WEB', 'url': 'https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T20:39:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f7f4-hqp2-7prc | 2021-09-22T21:11:20Z | 2020-07-24T20:10:21Z | null | ['CVE-2018-21036'] | Improper Input Validation in sails-hook-sockets | Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sails-hook-sockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21036'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e'}, {'type': 'PACKAGE', 'url': 'https://github.com/balderdashy/sails-hook-sockets'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/19/1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-24T17:27:33Z', 'nvd_published_at': '2020-07-21T14:15:00Z'} |
1.4.0 | GHSA-7phr-5m9x-rw9q | 2021-09-22T21:15:28Z | 2020-07-27T16:02:57Z | null | ['CVE-2020-7687'] | Directory traversal in fast-http | This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7687'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:00:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cc2p-4jhr-xhhx | 2021-01-07T23:43:05Z | 2020-07-30T14:58:42Z | null | ['CVE-2020-15130'] | False-positive validity for NFT1 genesis transactions in SLPJS | ### Impact
In the npm package named "slpjs", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification.
### Patches
npm package "slpjs" has been patched and is published and tagged as version 0.27.4.
### Workarounds
Upgrade to slpjs 0.27.4.
### References
* Package location: https://www.npmjs.com/package/slpjs
* SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements
* Git commit hash fixing this issue: https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c
* Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7
### For more information
If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slpjs/issues) repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'}] | {'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T14:44:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w7q9-p3jq-fmhm | 2023-09-08T22:35:55Z | 2020-07-27T15:46:57Z | null | ['CVE-2020-8175'] | Uncontrolled resource consumption in jpeg-js | Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jpeg-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175'}, {'type': 'WEB', 'url': 'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/842462'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T15:46:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jmqm-f2gx-4fjv | 2021-09-22T19:00:07Z | 2020-07-07T18:59:10Z | null | [] | Sensitive information exposure through logs in npm-registry-fetch | Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm-registry-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'npm-registry-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '8.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/pull/29'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/npm-registry-fetch'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T18:26:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vhr6-pvjm-9qwf | 2021-01-07T23:48:04Z | 2020-07-10T20:55:00Z | null | ['CVE-2020-15105'] | User passwords are stored in clear text in the Django session | ### Impact
django-two-factor-auth versions 1.11 and before store the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password, and then leaves before entering their two-factor authentication code.
The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' password are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' password are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis).
### Patches
Upgrade to version 1.12 to resolve this issue.
After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas.
In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used.
### Workarounds
Switching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading.
### References
For an explanation of why storing cleartext password is a substantial vulnerability: [Hashing Passwords: One-Way Road to Security](https://auth0.com/blog/hashing-passwords-one-way-road-to-security/).
For documentation on configuring the Django session storage engine: [Django session documentation](https://docs.djangoproject.com/en/3.0/topics/http/sessions/).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the repo](https://github.com/Bouke/django-two-factor-auth) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-two-factor-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/security/advisories/GHSA-vhr6-pvjm-9qwf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15105'}, {'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'}, {'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/blob/master/CHANGELOG.md#112---2020-07-08'}] | {'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-10T20:52:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-67j9-c52g-w2q9 | 2021-01-07T23:46:05Z | 2020-07-27T17:47:52Z | null | ['CVE-2020-15120'] | Authorization Bypass in I hate money | ### Impact
An authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code.
With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated.
### Patches
```diff
ihatemoney/models.py | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/ihatemoney/models.py b/ihatemoney/models.py
index fe7b519..5691c75 100644
--- a/ihatemoney/models.py
+++ b/ihatemoney/models.py
@@ -380,7 +380,7 @@ class Person(db.Model):
def get_by_name(self, name, project):
return (
Person.query.filter(Person.name == name)
- .filter(Project.id == project.id)
+ .filter(Person.project_id == project.id)
.one()
)
@@ -389,7 +389,7 @@ class Person(db.Model):
project = g.project
return (
Person.query.filter(Person.id == id)
- .filter(Project.id == project.id)
+ .filter(Person.project_id == project.id)
.one()
)
```
### Workarounds
To limit the impact, it is possible to disable public project creation by setting `ALLOW_PUBLIC_PROJECT_CREATION = False` in the configuration (see [documentation](https://ihatemoney.readthedocs.io/en/latest/configuration.html)). Existing users will still be able to exploit the flaw, but this will prevent an external attacker from creating a new project.
### For more information
`Person.query.get()` and `Person.query.get_by_name()` were mistakenly running a database join on the Project table without constraining the result.
As a result, `Person.query.get(42, "projectfoo")` would return the Person with id=42, even if it is not associated to the project "projectfoo". The only condition is that "projectfoo" must exist.
This flaw can be exploited in several places:
1) API: PUT requests to `/api/projects/<project>/members/<personID>` will succeed even though `<personID>` is not a member of `<project>`.
This allows an authenticated attacker to alter the state of a member (name, weight, activated) in any project. In addition, the altered member will no longer be associated with its original project but will be associated to the attacker project instead, breaking many features of IHateMoney. For instance, bills referencing the altered member will no longer be visible in the original project.
This causes an additional information disclosure and loss of integrity on bills: the attacker will now be able to see, edit and delete bills belonging to the altered member, because IHateMoney now believes that these bills are associated to the attacker project through the altered member.
For instance, assume that `Person(id=42)` is a member of project "targetProject", and that the attacker has access to another project "attackerProject" with the private code "attackerPassword". The attacker can modify `Person(id=42)` with this command:
$ curl -X PUT -d "name=Pwn3d&activated=1" --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42
The attacker can now see, edit and delete bills paid by `Person(id=42)` by simply browsing to http://$SERVER/attackerProject/
2) Editing a member through the web interface at `/<project>/members/<personID>/edit` will succeed even though `<personID>` is not a member of `<project>`.
This is very similar to the PUT exploit. Reusing the same example, the attacker needs to login to its "attackerProject" project with the private code "attackerPassword". It can then alter the state of `Person(id=42)` by accessing the edit form at the following URL:
http://$SERVER/attackerProject/members/42/edit
Again, as a result of the alteration, the altered member will become associated to the project "attackerProject", resulting in the same information disclosure and loss of integrity on bills.
3) API: DELETE requests to `/api/projects/<project>/members/<personID>` will similarly allow to delete the member `<personID>` even if it belongs to a different project than `<project>`.
$ curl -X DELETE --basic -u attackerProject:attackerPassword http://$SERVER/api/projects/attackerProject/members/42
The impact is less serious than with PUT, because DELETE only deactivates a member (it does not really delete it).
All these exploits require authentication: an attacker needs to know a valid project name and its associated "private code". Once this requirement is fullfilled, the attacker can exploit this flaw to alter the state of members in any other project, without needing to know the target project name or its private code.
`Person.query.get_by_name()` suffers from the same issue as `Person.query.get()`. It has an additional issue: if multiple Person objects with the same name exist (this is possible if they are associated to different projects), `get_by_name()` will crash with `MultipleResultsFound` because of the call to `one()`.
However, since `Person.query.get_by_name()` is currently not used anywhere in IHateMoney, the bug affecting this function has no impact and is not exploitable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ihatemoney'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15120'}, {'type': 'WEB', 'url': 'https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T17:47:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m5vr-3m74-jwxp | 2021-11-19T15:43:34Z | 2020-07-29T16:15:19Z | null | ['CVE-2020-15098'] | Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
The overall severity of this vulnerability is **high (8.2)** based on mentioned attack chains and the requirement of having a valid backend user session (authenticated).
### Solution
Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2020-008](https://typo3.org/security/advisory/typo3-core-sa-2020-008) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-m5vr-3m74-jwxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5091'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15098'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/TYPO3.CMS'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2016-013'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-008'}] | {'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-325', 'CWE-327', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:14:21Z', 'nvd_published_at': '2020-07-29T17:15:00Z'} |
1.4.0 | GHSA-9qcf-c26r-x5rf | 2021-10-21T21:18:39Z | 2020-07-01T17:55:03Z | null | ['CVE-2019-13990'] | XML external entity injection in Terracotta Quartz Scheduler | initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.quartz-scheduler:quartz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/issues/467'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/pull/501'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'}, {'type': 'PACKAGE', 'url': 'https://github.com/quartz-scheduler/quartz'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0002/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:54:54Z', 'nvd_published_at': '2019-07-26T19:15:00Z'} |
1.4.0 | GHSA-57gr-jvqr-3hwm | 2021-09-23T17:35:16Z | 2020-07-29T18:07:38Z | null | ['CVE-2020-15513'] | Incorrect access control in typo3_forum | The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mittwald/typo3_forum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15513'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-010'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:53:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9vfj-5g7h-4p24 | 2021-06-15T18:10:24Z | 2020-07-29T18:08:48Z | null | ['CVE-2020-11994'] | Server side template injection in Apache Camel | Server-Side Template Injection and arbitrary file disclosure on Camel templating components | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-robotframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11994'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a406dc5a158fe6fab6ee85f6e082a8473c0c346b37db8cc7a4619e6%40%3Cdev.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECAMEL-575542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T18:06:56Z', 'nvd_published_at': '2020-07-08T16:15:00Z'} |
1.4.0 | GHSA-8843-m7mw-mxqm | 2023-09-05T09:17:03Z | 2020-07-27T21:52:41Z | null | ['CVE-2020-10379'] | Buffer overflow in Pillow | In Pillow before 7.1.0, there are two Buffer Overflows in `libImaging/TiffDecode.c`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10379'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574577'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}] | {'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:51:48Z', 'nvd_published_at': '2020-06-25T19:15:00Z'} |
1.4.0 | GHSA-cqhg-xjhh-p8hf | 2023-09-05T09:19:22Z | 2020-07-27T21:52:43Z | null | ['CVE-2020-10177'] | Out-of-bounds reads in Pillow | Pillow before 7.1.0 has multiple out-of-bounds reads in `libImaging/FliDecode.c`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10177'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4503'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00012.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574573'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:52:00Z', 'nvd_published_at': '2020-06-25T19:15:00Z'} |
1.4.0 | GHSA-5f9h-9pjv-v6j7 | 2022-05-26T20:45:56Z | 2020-07-06T21:31:02Z | null | ['CVE-2020-8161'] | Directory traversal in Rack::Directory app bundled with Rack | A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8161'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8161.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4561-1/'}] | {'cwe_ids': ['CWE-22', 'CWE-548'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T21:30:32Z', 'nvd_published_at': '2020-07-02T19:15:00Z'} |
1.4.0 | GHSA-vc9j-fhvv-8vrf | 2023-09-12T18:20:33Z | 2020-07-27T19:55:52Z | null | ['CVE-2020-14000'] | Remote Code Execution in scratch-vm | MIT Lifelong Kindergarten Scratch scratch-vm before `0.2.0-prerelease.20200714185213` loads extension URLs from untrusted project.json files with certain `_` characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is `getExtensionIdForOpcode` in serialization/sb3.js. The use of `_` is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented.
**NOTE**: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'scratch-vm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0-prerelease.20200714185213'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0-prerelease.20200709173451'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-vm/pull/2476'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'}, {'type': 'PACKAGE', 'url': 'https://github.com/LLK/scratch-vm'}, {'type': 'WEB', 'url': 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T19:53:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qwfw-gxx2-mmv2 | 2021-09-22T21:50:54Z | 2020-07-27T22:51:37Z | null | ['CVE-2020-13925'] | Command Injection in Kylin | Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13925'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584373'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:49:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q7j5-9j77-g4gq | 2021-07-29T20:50:40Z | 2020-07-29T18:07:41Z | null | ['CVE-2020-15515'] | Remote code execution in turn extension for TYPO3 | The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'marcwillmann/turn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15515'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-011'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T18:00:39Z', 'nvd_published_at': '2020-07-07T16:15:00Z'} |
1.4.0 | GHSA-vjv6-gq77-3mjw | 2023-06-27T20:27:43Z | 2020-07-07T16:32:45Z | null | ['CVE-2020-15232'] | XXE attack in Mapfish Print | ### Impact
A user can do to an XML External Entity (XXE) attack with the provided SDL style.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://cwe.mitre.org/data/definitions/611.html
* https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e
### For more information
If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-servlet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-standalone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.24'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/mapfish/mapfish-print'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:32:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hg7c-66ff-9q8g | 2020-07-31T16:18:53Z | 2020-07-31T16:18:53Z | null | [] | Sandbox bypass in constantinople | constantinople before 3.1.1 affected by a sandbox bypass. | [] | [{'package': {'ecosystem': 'npm', 'name': 'constantinople'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hg7c-66ff-9q8g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/568'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:01:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wvh7-5p38-2qfc | 2021-09-22T21:05:43Z | 2020-07-23T18:20:10Z | null | [] | Storing Password in Local Storage | The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, "We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext."
Example Code:
```js
async () => {
const user = Parse.User.current()
if (user) {
user.setPassword('newpass')
await user.save()
}
}
```
After running the above code, the new password will be stored in localStorage as a property named "password".
Proposed Solution:
Before saving anything to localStorage, Parse should strip out any properties named "password" that are attempting to be stored with a Parse.User type object.
Configuration:
Parse SDK: 2.9.1
Parse Server: 3.9.0 | [] | [{'package': {'ecosystem': 'npm', 'name': 'parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/Parse-SDK-JS'}] | {'cwe_ids': ['CWE-256'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-23T18:18:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j38c-25fj-mr84 | 2021-09-22T21:23:36Z | 2020-07-27T16:57:34Z | null | ['CVE-2020-9485'] | Stored XSS in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerability was discovered in the Chart pages of the the "classic" UI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9485'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:57:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2473-9hgq-j7xw | 2021-01-07T23:47:06Z | 2020-07-20T17:50:30Z | null | ['CVE-2020-15118'] | Cross-Site Scripting in Wagtail | ### Impact
When a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as `form.as_p` ([as directed in the documentation](https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage)), any HTML tags used within a form field's help text will be rendered unescaped in the page. Allowing HTML within help text is [an intentional design decision](https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text) by Django; however, as a matter of policy Wagtail does not allow editors to insert arbitrary HTML by default, as this could potentially be used to carry out cross-site scripting attacks, including privilege escalation. This functionality should therefore not have been made available to editor-level users.
The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.7.4 (for the LTS 2.7 branch) and Wagtail 2.9.3 (for the current 2.9 branch). In these versions, help text will be escaped to prevent the inclusion of HTML tags. Site owners who wish to re-enable the use of HTML within help text (and are willing to accept the risk of this being exploited by editors) may set `WAGTAILFORMS_HELP_TEXT_ALLOW_HTML = True` in their configuration settings.
### Workarounds
Site owners who are unable to upgrade to the new versions can secure their form page templates by [rendering forms field-by-field as per Django's documentation](https://docs.djangoproject.com/en/3.0/topics/forms/#looping-over-the-form-s-fields), but omitting the `|safe` filter when outputting the help text.
### Acknowledgements
Many thanks to Timothy Bautista for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-2473-9hgq-j7xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15118'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text'}, {'type': 'WEB', 'url': 'https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/blob/master/docs/releases/2.9.3.rst'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-20T17:47:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wwgf-3xp7-cxj4 | 2021-09-22T20:22:02Z | 2020-07-07T16:33:45Z | null | [] | Potentially sensitive data exposure in Symfony Web Socket Bundle | ### Impact
Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (depending on the version of the bundle) the callback defined on a topic route is misconfigured, a `Gos\Bundle\WebSocketBundle\Topic\TopicInterface` implementation is not found for the callback, a topic which also implements `Gos\Bundle\WebSocketBundle\Topic\SecuredTopicInterface` rejects the connection, or an Exception is unhandled. This can result in an unintended broadcast to the websocket server potentially with data that should be considered sensitive.
### Patches
In 1.10.4, 2.6.1, and 3.3.0, `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()` has been changed to no longer broadcast an event's data if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` fails.
### Workarounds
Upgrade to 1.10.4, 2.6.1, and 3.3.0
Note, the 1.x branch is considered end of support as of July 1, 2020.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repository](https://github.com/GeniusesOfSymfony/WebSocketBundle) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}, {'type': 'PACKAGE', 'url': 'https://github.com/GeniusesOfSymfony/WebSocketBundle'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:21:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6jmr-jfh7-xg3h | 2021-01-08T21:00:17Z | 2020-07-30T14:58:53Z | null | ['CVE-2020-15131'] | False-positive validity for NFT1 genesis transactions | ### Impact
In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification.
### Patches
npm package "slp-validate" has been patched and is published and tagged as version 1.2.2.
### Workarounds
Upgrade to slp-validate 1.2.2.
### References
* Package location: https://www.npmjs.com/package/slp-validate
* SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements
* Git commit hash fixing this issue: https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c
* Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7
### For more information
If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slp-validate.js/issues) repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15131'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c'}] | {'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T14:54:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9g2w-5f3v-mfmm | 2021-09-22T21:19:02Z | 2020-07-27T16:57:33Z | null | ['CVE-2020-11982'] | Insecure default config of Celery worker in Apache Airflow | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11982'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6vrv-94jv-crrg | 2021-01-07T23:48:19Z | 2020-07-07T00:01:05Z | null | ['CVE-2020-15096'] | Context isolation bypass via Promise in Electron | ### Impact
Apps using `contextIsolation` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
* `6.1.11`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15096'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}] | {'cwe_ids': ['CWE-501'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p6mc-m468-83gw | 2022-02-08T22:04:28Z | 2020-07-15T19:15:48Z | null | ['CVE-2020-8203'] | Prototype Pollution in lodash | Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.
This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['lodash.baseSet']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['lodash.baseSet']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/4744'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/4874'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/712065'}, {'type': 'PACKAGE', 'url': 'https://github.com/lodash/lodash'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200724-0006/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1523'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-1321', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-15T19:14:58Z', 'nvd_published_at': '2020-07-15T17:15:00Z'} |
1.4.0 | GHSA-2v5c-755p-p4gv | 2023-05-16T16:01:20Z | 2020-07-31T17:40:04Z | null | ['CVE-2020-15133'] | Missing TLS certificate verification in faye-websocket | The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `wss:` connection made using this library is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to.
This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, [em-http-request][6] published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into [faye-websocket for Ruby][10], such that we use the `OpenSSL` module to perform two checks:
- The chain of certificates presented by the server is valid and ultimately trusted by your root certificate set -- either your system default root certificates, or a set provided at runtime
- The final certificate presented by the server is valid for the hostname used in the request URI; if the connection is made via a proxy we use the hostname from the request, not the proxy's hostname
After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in faye-websocket, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that
all clients have TLS verification turned on by default. A client that is not carrying out verification is either:
- talking to the expected server, and will not break under this change
- being attacked, and would benefit from being alerted to this fact
- deliberately talking to a server that would be rejected by verification
The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be "working by accident", rather than functionality that was actively supported, and it should be properly and explicitly supported instead. To that end, we have added two new options to the `Faye::WebSocket::Client` constructor: `tls.root_cert_file`, and `tls.verify_peer`.
The `:root_cert_file` option lets you provide a different set of root certificates in situations where you don't want to use your system's default root certificates to verify the remote host. It should be a path or an array of paths identifying the certificates to use instead of the defaults.
```rb
client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
root_cert_file: 'path/to/certificate.pem'
})
```
The `:verify_peer` option lets you turn verification off entirely. This should be a last resort and we recommend using the `:root_cert_file` option if possible.
```rb
client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
verify_peer: false
})
```
To get the new behaviour, please upgrade to v0.11.0 of the [Rubygems package][10]. There are, unfortunately, no workarounds for this issue, as you cannot enable `:verify_peer` in EventMachine unless the calling library contains an implementation of `ssl_verify_peer` that actually checks the server's certificates.
For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue.
[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
[2]: https://rubygems.org/gems/eventmachine
[3]: https://github.com/eventmachine/eventmachine/issues/275
[4]: https://github.com/eventmachine/eventmachine/pull/378
[5]: https://github.com/eventmachine/eventmachine/issues/814
[6]: https://rubygems.org/gems/em-http-request
[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
[8]: https://github.com/igrigorik/em-http-request/pull/340
[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
[10]: https://rubygems.org/gems/faye-websocket
[12]: https://github.com/faye/faye/issues/524
[13]: https://github.com/faye/faye-websocket-ruby/pull/129
[14]: https://github.com/SpComb
[15]: https://github.com/DanielMorsing | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'faye-websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/faye/faye-websocket-ruby/security/advisories/GHSA-2v5c-755p-p4gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15133'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/275'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/814'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye/issues/524'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/pull/378'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye-websocket-ruby/pull/129'}, {'type': 'WEB', 'url': 'https://github.com/igrigorik/em-http-request/pull/340'}, {'type': 'WEB', 'url': 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/faye-websocket-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faye-websocket/CVE-2020-15133.yml'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer'}, {'type': 'WEB', 'url': 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:39:00Z', 'nvd_published_at': '2020-07-31T18:15:00Z'} |
1.4.0 | GHSA-hx5g-8hq2-8x4w | 2021-09-22T21:51:23Z | 2020-07-27T22:51:40Z | null | ['CVE-2020-13926'] | SQL Injection in Kylin | Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13926'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r63d5663169e866d44ff9250796193337cff7d9cf61cc3839e86163fd%40%3Cuser.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584374'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-33c7-2mpw-hg34 | 2021-07-29T21:17:18Z | 2020-07-29T18:07:16Z | null | ['CVE-2020-7694'] | Log injection in uvicorn | This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-encoded escape sequences, the logging component will log the URL after it's been processed with urllib.parse.unquote, therefore converting any percent-encoded characters into their single-character equivalent, which can have special meaning in terminal emulators. By requesting URLs with crafted paths, attackers can: * Pollute uvicorn's access logs, therefore jeopardising the integrity of such files. * Use ANSI sequence codes to attempt to interact with the terminal emulator that's displaying the logs (either in real time or from a file). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'uvicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7694'}, {'type': 'WEB', 'url': 'https://github.com/encode/uvicorn'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560'}] | {'cwe_ids': ['CWE-116', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:37:27Z', 'nvd_published_at': '2020-07-27T12:15:00Z'} |
1.4.0 | GHSA-cr3x-7m39-c6jq | 2023-07-05T20:22:39Z | 2020-07-07T16:34:27Z | null | ['CVE-2020-8163'] | Remote code execution via user-provided local names in ActionView | The is a code injection vulnerability in versions of Rails prior to 5.0.1 that would allow an attacker who controlled the `locals` argument of a `render` call to perform a RCE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.11.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8163'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/304805'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8163.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/hWuKcHyoKh0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T15:44:56Z', 'nvd_published_at': '2020-07-02T19:15:00Z'} |
1.4.0 | GHSA-v2wc-pfq2-5cm6 | 2021-01-08T20:22:25Z | 2020-04-14T23:09:29Z | null | ['CVE-2020-11001'] | Possible XSS attack in Wagtail | ### Impact
A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch).
### Workarounds
Site owners who are unable to upgrade to the new versions can disable the revision comparison view by adding the following URL route to the top of their project's `urls.py` configuration:
from django.views.generic.base import RedirectView
urlpatterns = [
url(r'^admin/pages/(\d+)/revisions/compare/', RedirectView.as_view(url='/admin/')),
# ...
]
### Acknowledgements
Many thanks to Vlad Gerasimenko for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}] | [{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11001'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.8.1'}] | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T23:02:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q8xg-8xwf-m598 | 2021-09-16T20:39:54Z | 2020-04-16T03:14:59Z | null | ['CVE-2020-10800'] | Machine-In-The-Middle in lix | All versions of `lix` are vulnerable to Machine-In-The-Middle. The package accepts downloads with `http` and follows `location` header redirects for package downloads. This allows for an attacker in a privileged network position to intercept a lix package installation and redirect the download to a malicious source.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '15.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10800'}, {'type': 'PACKAGE', 'url': 'https://github.com/lix-pm/lix.client'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1306'}] | {'cwe_ids': ['CWE-544', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:10:39Z', 'nvd_published_at': '2020-03-21T15:15:00Z'} |
1.4.0 | GHSA-prfq-f66g-43mp | 2021-01-08T20:23:16Z | 2020-04-10T18:19:10Z | null | ['CVE-2020-5263'] | Information disclosure through error object in auth0.js | ## Overview
Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered.
If the error object is exposed or logged without modification, the application risks password exposure.
## Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using Auth0.js version between 8.0.0 and 9.13.1(inclusive).
- You store or display error objects without filtering.
## How to fix that?
Developers should upgrade auth0.js to version 9.13.2 or later where user inputted passwords are masked in errors. If upgrading is not possible, a temporary fix may include not storing the error object or displaying it publicly without modification.
## Will this update impact my users?
This fix patches the Auth0.js and may require changes in application code due to password no longer available in error object, but it will not impact your users, their current state, or any existing sessions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.13.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/auth0.js/security/advisories/GHSA-prfq-f66g-43mp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5263'}, {'type': 'WEB', 'url': 'https://github.com/auth0/auth0.js/commit/355ca749b229fb93142f0b3978399b248d710828'}] | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-09T15:53:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jpcq-cgw6-v4j6 | 2022-02-08T22:06:24Z | 2020-04-29T22:19:14Z | null | ['CVE-2020-11023'] | Potential XSS vulnerability in jQuery | ### Impact
Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.
### Patches
This problem is patched in jQuery 3.5.0.
### Workarounds
To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method.
### References
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11023'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/releases/tag/3.5.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-11023.yml'}, {'type': 'WEB', 'url': 'https://jquery.com/upgrade-guide/3.5/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200511-0006/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-565440'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4693'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-02'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-10'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T21:04:50Z', 'nvd_published_at': '2020-04-29T21:15:00Z'} |
1.4.0 | GHSA-5p34-5m6p-p58g | 2021-08-25T20:57:31Z | 2020-04-23T21:08:40Z | null | ['CVE-2020-9546'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9546'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2631'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:26:40Z', 'nvd_published_at': '2020-03-02T04:15:00Z'} |
1.4.0 | GHSA-fv3h-8x5j-pvgq | 2023-09-01T10:18:10Z | 2020-04-22T20:59:50Z | null | ['CVE-2020-11888'] | XSS in python-markdown2 | python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11888'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/issues/348'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XOAIRJJCZNJUALXDHSIGH5PS2H63A3J/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQLRBGRVRRZK7P5SFL2MNGXFX37YHJAV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN6QSHRFZXRQAYZJQ4MOW5MKIXBYOMED/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00031.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00035.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T19:19:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5gm3-px64-rw72 | 2023-02-02T10:30:38Z | 2020-04-01T16:36:44Z | null | ['CVE-2019-19911'] | Uncontrolled Resource Consumption in Pillow | There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19911'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4631'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:30:58Z', 'nvd_published_at': '2020-01-05T22:15:00Z'} |
1.4.0 | GHSA-9q64-mpxx-87fg | 2020-12-15T16:51:18Z | 2020-04-01T16:35:08Z | null | [] | Open Redirect in ecstatic | Versions of `ecstatic` prior to 4.1.2, 3.3.2 or 2.2.2 are vulnerable to Open Redirect. The package fails to validate redirects, allowing attackers to craft requests that result in an `HTTP 301` redirect to any other domains.
## Recommendation
If using `ecstatic` 4.x, upgrade to 4.1.2 or later.
If using `ecstatic` 3.x, upgrade to 3.3.2 or later.
If using `ecstatic` 2.x, upgrade to 2.2.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10775'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/830'}] | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T15:37:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h4rc-386g-6m85 | 2021-08-23T15:31:59Z | 2020-04-23T20:19:02Z | null | ['CVE-2020-11620'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11620'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2682'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200511-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T21:17:03Z', 'nvd_published_at': '2020-04-07T23:15:00Z'} |
1.4.0 | GHSA-9475-xg6m-j7pw | 2021-01-08T20:21:35Z | 2020-04-22T20:59:37Z | null | ['CVE-2020-5268'] | Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET | ### Impact
Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved.
The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session.
### Patches
Version 1.0.2 and 2.7.0 are patched.
### Workarounds
Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP.
### For more information
If you have any questions or comments about this advisory:
* Comment on #103
* Email us at security@sustainsys.com if you think that there are further security issues. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/issues/712'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Sustainsys.Saml2/'}] | {'cwe_ids': ['CWE-303'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-21T18:41:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qpg4-4w7w-2mq5 | 2023-05-16T15:51:44Z | 2020-04-29T17:41:15Z | null | ['CVE-2020-11020'] | Authentication and extension bypass in Faye | On 20 April 2020 it was reported to me that the potential for authentication bypass exists in [Faye][1]'s extension system. This vulnerability has existed in the Node.js and Ruby versions of the server since version 0.5.0, when extensions were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and 1.2.5, which we are releasing today.
The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. For example, the Faye [extension docs][2] suggest that users implement access control for subscriptions by checking incoming messages for the `/meta/subscribe` channel, for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel === '/meta/subscribe') {
if (message.ext.authToken !== 'my super secret password') {
message.error = 'Invalid auth token';
}
}
callback(message);
}
});
```
A bug in the server's code for recognising the special `/meta/*` channels, which trigger connection and subscription events, means that a client can bypass this check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`:
```json
{
"channel": "/meta/subscribe/x",
"clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3",
"subscription": "/foo"
}
```
This message will not be checked by the above extension, as it checks the message's channel is exactly equal to `/meta/subscribe`. But it will still be processed as a subscription request by the server, so the client becomes subscribed to the channel `/foo` without supplying the necessary credentials.
The vulnerability is caused by the way the Faye server recognises meta channels. It will treat a message to any channel that's a prefix-match for one of the special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`, `/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for that channel. So, a message to `/meta/subscribe/x` is still processed as a subscription request, for example.
An authentication bypass for subscription requests is the most serious effect of this but all other meta channels are susceptible to similar manipulation.
This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5. These should be drop-in replacements for prior versions and you should upgrade immediately if you are running any prior version.
If you are unable to install one of these versions, you can make your extensions catch all messages the server would process by checking the channel _begins_ with the expected channel name, for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel.startsWith('/meta/subscribe')) {
// authentication logic
}
callback(message);
}
});
```
[1]: https://faye.jcoglan.com/
[2]: https://faye.jcoglan.com/node/extensions.html | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11020'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/faye'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faye/CVE-2020-11020.yml'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T17:40:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-758m-v56v-grj4 | 2021-08-25T20:58:08Z | 2020-04-23T21:36:03Z | null | ['CVE-2020-10969'] | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10969'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2642'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200403-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:28:10Z', 'nvd_published_at': '2020-03-26T13:15:00Z'} |
1.4.0 | GHSA-4g46-5grc-wq49 | 2020-08-31T18:59:46Z | 2020-04-01T16:36:31Z | null | ['CVE-2019-15603'] | Cross-Site Scripting in seeftl | All versions of `seeftl` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'seeftl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15603'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/665302'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1451'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:26:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-426h-24vj-qwxf | 2021-07-29T15:52:29Z | 2020-04-23T20:09:09Z | null | ['CVE-2020-7614'] | Command Injection in npm-programmatic | All versions of `npm-programmatic ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `install`, `uninstall` and `list` functions . This may allow attackers to execute arbitrary code in the system if the package name passed to the function is user-controlled.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm-programmatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7614'}, {'type': 'WEB', 'url': 'https://github.com/Manak/npm-programmatic/blob/master/index.js#L18'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1507'}] | {'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T20:02:33Z', 'nvd_published_at': '2020-04-07T14:15:00Z'} |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
Use the Edit dataset card button to edit it.
- Downloads last month
- 32