schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 24
values | aliases
stringlengths 2
20
| summary
stringlengths 9
130
⌀ | details
stringlengths 34
11.7k
| severity
stringlengths 2
92
| affected
stringlengths 73
3.22k
| references
stringlengths 64
21.2k
| database_specific
stringlengths 131
202
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-qh62-ch95-63wh | 2020-06-16T20:41:56Z | 2020-03-13T20:05:10Z | 2020-06-16T20:25:44Z | [] | python-gnupg allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended | **Withdrawn:** Duplicate of GHSA-2fch-jvg5-crf6 | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6690'}, {'type': 'WEB', 'url': 'https://bitbucket.org/vinay.sajip/python-gnupg/commits/1a5196800604c05f9e347110b4ecca538ba68cdc'}, {'type': 'WEB', 'url': 'https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/python-gnupg/#history'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jan/41'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3964-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106756'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:04:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4pc3-96mx-wwc8 | 2023-09-06T13:48:23Z | 2020-03-05T22:09:14Z | null | ['CVE-2016-10045'] | Remote code execution in PHPMailer | ### Impact
The `isMail` transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the `mail` command and consequently execute arbitrary code by leveraging improper interaction between the `escapeshellarg` function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
This issue really emphasises that it's worth avoiding the built-in PHP `mail()` function entirely.
### Patches
Fixed in 5.2.20
### Workarounds
Send via SMTP to localhost instead of calling the `mail()` function.
### References
https://nvd.nist.gov/vuln/detail/CVE-2016-10045
See also https://nvd.nist.gov/vuln/detail/CVE-2016-10033
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.20'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4pc3-96mx-wwc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10045'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10045.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities'}, {'type': 'WEB', 'url': 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40969/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40986/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42221/'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2016/12/28/1'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2016/Dec/81'}, {'type': 'WEB', 'url': 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/539967/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95130'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037533'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:06:01Z', 'nvd_published_at': '2016-12-30T19:59:00Z'} |
1.4.0 | GHSA-4x5h-cr29-fhp6 | 2021-08-19T19:50:50Z | 2020-03-05T22:09:10Z | null | ['CVE-2017-5223'] | Local file disclosure in PHPMailer | An issue was discovered in PHPMailer before 5.2.22. PHPMailer's `msgHTML` method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to `/`, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.
### Impact
Arbitrary local files can be attached to email messages.
### Patches
Fixed in 5.2.22
### Workarounds
Validate input before using user-supplied file paths.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-5223
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.22'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4x5h-cr29-fhp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5223'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-5223.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.22'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43056/'}, {'type': 'WEB', 'url': 'http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95328'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:07:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pcqq-5962-hvcw | 2020-03-10T16:48:58Z | 2020-03-10T18:02:49Z | null | [] | Denial of Service in uap-core when processing crafted User-Agent strings | ### Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
### Patches
Please update `uap-ruby` to >= v2.6.0
### For more information
https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p
Reported in `uap-core` by Ben Caller @bcaller | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'user_agent_parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T16:48:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m6xf-fq7q-8743 | 2022-10-07T13:07:17Z | 2020-03-24T15:06:32Z | null | ['CVE-2020-6816'] | mutation XSS via whitelisted math or svg and raw tag in Bleach | ### Impact
A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with all of:
* the `svg` or `math` in the allowed/whitelisted tags
* an RCDATA tag (see below) in the allowed/whitelisted tags
* the keyword argument `strip=False`
### Patches
Users are encouraged to upgrade to bleach v3.1.2 or greater.
### Workarounds
* modify `bleach.clean` calls to use `strip=True`, or not whitelist `math` or `svg` tags and one or more of the following tags:
```
script
noscript
style
noframes
xmp
noembed
iframe
```
* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.
### References
* https://bugzilla.mozilla.org/show_bug.cgi?id=1621692
* https://cure53.de/fp170.pdf
* https://nvd.nist.gov/vuln/detail/CVE-2020-6816
* https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
### Credits
* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)
* Email us at [security@mozilla.org](mailto:security@mozilla.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-m6xf-fq7q-8743'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6816'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4277'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/releases/tag/v3.1.2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EDQU2SZLZMSSACCBUBJ6NOSRNNBDYFW5/'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-23T22:25:38Z', 'nvd_published_at': '2020-03-24T22:15:00Z'} |
1.4.0 | GHSA-694p-xrhg-x3wm | 2021-10-06T21:44:23Z | 2020-03-30T20:54:55Z | null | ['CVE-2020-7611'] | CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request Header Injection') | ### Vulnerability
Micronaut's HTTP client is vulnerable to "HTTP Request Header Injection" due to not validating request headers passed to the client.
Example of vulnerable code:
```java
@Controller("/hello")
public class HelloController {
@Inject
@Client("/")
RxHttpClient client;
@Get("/external-exploit")
@Produces(MediaType.TEXT_PLAIN)
public String externalExploit(@QueryValue("header-value") String headerValue) {
return client.toBlocking().retrieve(
HttpRequest.GET("/hello")
.header("Test", headerValue)
);
}
}
```
In the above case a query value received from a user is passed as a header value to the client. Since the client doesn't validate the header value the request headers and body have the potential to be manipulated.
For example, a user that supplies the following payload, can force the client to make multiple attacker-controlled HTTP requests.
```java
List<String> headerData = List.of(
"Connection: Keep-Alive", // This keeps the connection open so another request can be stuffed in.
"",
"",
"POST /hello/super-secret HTTP/1.1",
"Host: 127.0.0.1",
"Content-Length: 31",
"",
"{\"new\":\"json\",\"content\":\"here\"}",
"",
""
);
String headerValue = "H\r\n" + String.join("\r\n", headerData);;
URI theURI =
UriBuilder
.of("/hello/external-exploit")
.queryParam("header-value", headerValue) // Automatically URL encodes data
.build();
HttpRequest<String> request = HttpRequest.GET(theURI);
String body = client.toBlocking().retrieve(request);
```
Note that using `@HeaderValue` instead of `@QueryValue` is not vulnerable since Micronaut's HTTP server does validate the headers passed to the server, so the exploit can only be triggered by using user data that is not an HTTP header (query values, form data etc.).
### Impact
The attacker is able to control the entirety of the HTTP body for their custom requests.
As such, this vulnerability enables attackers to perform a variant of [Server Side Request Forgery](https://cwe.mitre.org/data/definitions/918.html).
### Patches
The problem has been patched in the `micronaut-http-client` versions 1.2.11 and 1.3.2 and above.
### Workarounds
Do not pass user data directly received from HTTP request parameters as headers in the HTTP client.
### References
Fix commits
- https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1
- https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d
- https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [micronaut-core](https://github.com/micronaut-projects/micronaut-core)
* Email us at [info@micronaut.io](mailto:info@micronaut.io)
### Credit
Originally reported by @JLLeitschuh
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-694p-xrhg-x3wm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7611'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add'}, {'type': 'PACKAGE', 'url': 'https://github.com/micronaut-projects/micronaut-core'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342'}] | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T20:54:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qfc5-mcwq-26q8 | 2021-08-19T22:13:44Z | 2020-03-12T17:02:50Z | null | ['CVE-2019-18874'] | Double Free in psutil | psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'psutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.6.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18874'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/psutil/pull/1616'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/psutil/commit/7d512c8e4442a896d56505be3e78f1156f443465'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/psutil/blob/master/HISTORY.rst#566'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/11/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLETTJYZL2SMBUI4Q2NGBMGPDPP54SRG/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4204-1/'}] | {'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-12T17:02:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-33vf-4xgg-9r58 | 2023-05-16T16:16:20Z | 2020-03-03T23:33:16Z | null | ['CVE-2020-5249'] | HTTP Response Splitting (Early Hints) in Puma | ### Impact
If an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting).
While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v), which fixed this vulnerability but only for regular responses.
### Patches
This has been fixed in 4.3.3 and 3.12.4.
### Workarounds
Users can not allow untrusted/user input in the Early Hints response header.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [puma](https://github.com/puma/puma)
* Email us a project maintainer. [Email addresses are listed in our Code of Conduct](https://github.com/puma/puma/blob/master/CODE_OF_CONDUCT.md#enforcement). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-33vf-4xgg-9r58'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5249'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2020-5249.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting'}] | {'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-02T15:03:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g6j2-ch25-5mmv | 2021-01-08T20:24:58Z | 2020-03-25T16:52:49Z | null | ['CVE-2020-5261'] | Missing Token Replay Detection in Saml2 Authentication services for ASP.NET | ### Impact
Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented.
Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use.
### Patches
The 2.5.0 version is patched.
### Workarounds
There are no workarounds with existing versions. Fixing the issue requires code updates.
### References
https://en.wikipedia.org/wiki/Replay_attack
### For more information
If you have any questions or comments about this advisory:
* Comment on #711.
* Email us at [security@sustainsys.com](mailto:security@susatinsys.com) if you think that there are further security issues. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5261'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/issues/711'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}] | {'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-25T01:16:34Z', 'nvd_published_at': '2020-03-25T02:15:00Z'} |
1.4.0 | GHSA-738m-f33v-qc2r | 2020-03-05T21:57:18Z | 2020-03-05T22:09:19Z | null | ['CVE-2015-8476'] | SMTP Injection in PHPMailer | ### Impact
Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
### Patches
Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0).
### Workarounds
Manually strip line breaks from email addresses before passing them to PHPMailer.
### References
https://nvd.nist.gov/vuln/detail/CVE-2015-8476
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8476'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3416'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/12/04/5'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/12/05/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/78619'}] | {'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T21:57:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vg44-fw64-cpjx | 2021-08-23T14:40:05Z | 2020-03-24T15:08:59Z | null | [] | Incorrect Account Used for Signing | ### Impact
Anybody using this library to sign with a BIP44 account other than the first account may be affected. If a user is signing with the first account (i.e. the account at index `0`), or with the legacy MEW/MyCrypto HD path, they are not affected.
The vulnerability impacts cases where the user signs a personal message or transaction without first adding the account. This includes cases where the user has already added the account in a previous session (i.e. they added the account, reset the application, then signed something). The serialization/deserialization process does restore a previously added account, but it doesn't restore the index instructing the keyring to use that account for signing. As a result, after serializing then deserializing the keyring state, the account at index `0` is always used for signing even if it isn't the current account.
### Patches
This has been patched ([#14](https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14)) in version >=0.2.1 of [`eth-ledger-bridge-keyring`](https://www.npmjs.com/package/eth-ledger-bridge-keyring), and in version >=0.2.2 of [`@metamask/eth-ledger-bridge-keyring`](https://www.npmjs.com/package/@metamask/eth-ledger-bridge-keyring). Users are encouraged to migrate to the new package name.
### Workarounds
To work around this problem without updating, you should remove then re-add the account before use. As long as the account was added during the lifetime of that process, signing with that account should work correctly.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [MetaMask/eth-ledger-bridge-keyring on GitHub](https://github.com/MetaMask/eth-ledger-bridge-keyring)
* Email the MetaMask team at [hello@metamask.io](mailto:hello@metamask.io) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'eth-ledger-bridge-keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@metamask/eth-ledger-bridge-keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/MetaMask/eth-ledger-bridge-keyring/security/advisories/GHSA-vg44-fw64-cpjx'}, {'type': 'WEB', 'url': 'https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/MetaMask/eth-ledger-bridge-keyring/commit/f32e529d13a53e55f558d903534d631846dc26ce'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vg44-fw64-cpjx'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ETHLEDGERBRIDGEKEYRING-561121'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1497'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1498'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-23T23:11:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2p5p-m353-833w | 2021-01-08T20:25:54Z | 2020-03-13T21:05:44Z | null | ['CVE-2020-5257'] | Sort order SQL injection in Administrate | In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard,
the direction parameter was not validated before being interpolated into the SQL query.
This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections.
Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication.
This is patched in wersion 0.13.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'administrate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2p5p-m353-833w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/administrate/CVE-2020-5257.yml'}] | {'cwe_ids': ['CWE-943'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T21:05:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xf8c-3cgx-fcwm | 2021-04-23T20:26:37Z | 2020-03-12T16:54:06Z | null | ['CVE-2019-10138'] | Improper Access Control in novajoin | A flaw was discovered in the python-novajoin plugin, all versions up to, excluding 1.1.1, for Red Hat OpenStack Platform. The novajoin API lacked sufficient access control, allowing any keystone authenticated user to generate FreeIPA tokens. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'novajoin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10138'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10138'}, {'type': 'WEB', 'url': 'https://review.opendev.org/#/c/631240/'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-12T16:53:49Z', 'nvd_published_at': '2019-07-30T17:15:00Z'} |
1.4.0 | GHSA-wh37-37xw-54hr | 2022-03-23T20:33:22Z | 2020-03-10T18:02:31Z | null | ['CVE-2014-8650'] | Improper Authentication in requests-kerberos | python-requests-Kerberos through 0.5 does not handle mutual authentication | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'requests-kerberos'}, 'ecosystem_specific': {'affected_functions': ['requests_kerberos.HTTPKerberosAuth.handle_response']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests-kerberos/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests-kerberos/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650'}, {'type': 'PACKAGE', 'url': 'https://github.com/mkomitee/requests-kerberos'}, {'type': 'WEB', 'url': 'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2014-8650'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/11/07/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70909'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-06T20:11:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7q25-qrjw-6fg2 | 2022-03-11T23:01:36Z | 2020-03-24T15:07:56Z | null | ['CVE-2020-5252'] | Malicious package may avoid detection in python auditing | # Python Auditing Vulnerability
Demonstrates how a malicious package can insert a load-time poison pill to avoid detection by tools like Safety.
Tools that are designed to find vulnerable packages can not ever run in the same python environment that they are trying to protect.
## Usage
Install `safety`, `insecure-package`, and this package with pip in the same python environment. Order doesn&#39;t matter.
1. pip install safety
2. pip install insecure-package
3. pip install dist/malicious-0.1-py3-none-any.whl
Run the check
4. `safety check`
You should see both `Running my modified safety.check` and that `insecure-package` is not listed in the results!
## How it Works
Everything in Python is mutable. The trick is getting some code to run at interpreter load time in order to do some patching.
1. When you install this package, the `setup.py` settings installs a `malicious.pth` file to your `site-packages` directory.
2. The `malicious.pth` file gets loaded anytime Python starts, which in turn imports our `malicious` package.
3. The `malicious/__init__.py` patches the safety library with a custom function to avoid detection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'safety'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pyupio/safety/security/advisories/GHSA-7q25-qrjw-6fg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5252'}, {'type': 'WEB', 'url': 'https://github.com/akoumjian/python-safety-vuln'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyupio/safety'}, {'type': 'WEB', 'url': 'https://mulch.dev/blog/CVE-2020-5252-python-safety-vuln/'}, {'type': 'WEB', 'url': 'https://pyup.io/posts/patched-vulnerability/'}] | {'cwe_ids': ['CWE-807'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-23T23:07:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4w82-r329-3q67 | 2023-06-08T19:02:11Z | 2020-03-04T20:52:14Z | null | ['CVE-2020-8840'] | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2620'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T20:56:51Z', 'nvd_published_at': '2020-02-10T21:56:00Z'} |
1.4.0 | GHSA-g9rq-x4fj-f5hx | 2021-01-08T21:18:55Z | 2020-03-13T20:21:27Z | null | ['CVE-2020-5256'] | Remote Code Execution Through Image Uploads in BookStack | ### Impact
A user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. They would then have the permissions of the PHP process.
This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application.
### Patches
The issue was addressed in a series of patches: v0.25.3, v0.25.4 and v0.25.5.
Users should upgrade to at least v0.25.5 to avoid this patch but ideally the latest BookStack version as previous versions are un-supported.
### Workarounds
Depending on BookStack version, you could use the [local_secure](https://www.bookstackapp.com/docs/admin/upload-config/#local-secure) image storage option, or use s3 or a similar compatible service.
Preventing direct execution of any `php` files, apart from the `public/index.php` file, though web-server configuration would also prevent this.
### References
[BookStack Beta v0.25.3](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3)
[BookStack Beta v0.25.4](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4)
[BookStack Beta v0.25.5](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues).
* Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2).
* Follow the [BookStack Security advise](https://github.com/BookStackApp/BookStack#-security) to contact someone privately. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.25.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-g9rq-x4fj-f5hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5256'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5'}] | {'cwe_ids': ['CWE-95'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:20:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g4m9-5hpf-hx72 | 2021-01-14T17:48:29Z | 2020-03-30T20:09:44Z | null | ['CVE-2020-5275'] | Firewall configured with unanimous strategy was not actually unanimous in Symfony | Description
-----------
On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access.
As of Symfony 4.4.0, a bug was introduced that prevents the check of attributes as soon as `accessDecisionManager` decide to grant access on one attribute.
Resolution
----------
The `accessDecisionManager` is now called with all attributes at once, allowing the unanimous strategy being applied on each attribute.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf) for the 4.4 branch.
Credits
-------
I would like to thank Antonio J. García Lagar for reporting & Robin Chalas for fixing the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-g4m9-5hpf-hx72'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5275'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T19:45:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hg79-j56m-fxgv | 2021-10-01T20:15:16Z | 2020-09-04T15:26:04Z | null | [] | Cross-Site Scripting in react | Versions of `react` prior to 0.14.0 are vulnerable to Cross-Site Scripting (XSS). The package's `createElement` function fails to properly validate its input object, allowing attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 0.14.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '0.14.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/facebook/react'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2015/10/07/react-v0.14.html#notable-enhancements'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2019/10/22/react-release-channels.html#experimental-channel'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react:20150318'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1347'}, {'type': 'WEB', 'url': 'http://danlec.com/blog/xss-via-a-spoofed-react-element'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c4hh-fg8x-6h9p | 2021-09-29T21:04:32Z | 2020-09-03T21:57:29Z | null | [] | Malicious Package in buffer-xnr | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffer-xnr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1247'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6343-m2qr-66gf | 2021-09-30T17:14:57Z | 2020-09-03T23:10:41Z | null | [] | Malicious Package in js-sja3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-sja3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1291'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h26f-j4mv-84g7 | 2021-10-01T14:00:36Z | 2020-09-02T18:39:43Z | null | [] | Malicious Package in asycn | All versions of `asycn` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'asycn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/846'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-725f-3pw7-rq6x | 2021-09-29T20:46:52Z | 2020-09-03T21:09:47Z | null | [] | Malicious Package in 8.9.4 | Versions 1.0.2, 1.0.3, 1.0.4 and 1.0.5 of `8.9.4` contain malicious code as a preinstall script. The package reads the system's SSH keys but does not upload it to a remote server.
## Recommendation
Remove the package from your environment. There is no evidence of further compromise at the moment. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '8.9.4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1201'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jf55-rgpx-p6rx | 2023-07-27T20:31:34Z | 2020-09-03T19:12:22Z | null | [] | Malicious Package in iie-viz | Version 1.0.4 of `iie-viz` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.0.3 | [] | [{'package': {'ecosystem': 'npm', 'name': 'iie-viz'}, 'versions': ['1.0.4']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1103'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:47:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g8rg-7rpr-cwr2 | 2021-08-02T14:33:59Z | 2020-09-02T18:03:26Z | null | ['CVE-2020-25026'] | Information Disclosure in TYPO3 extension sf_event_mgt | A missing access check in the backend module allows an authenticated backend user to export participant data for events which the user does not have access to, resulting in Information Disclosure.
Another missing access check in the backend module allows an authenticated backend user to send emails to event participants for events which the user does not have access to, resulting in Broken Access Control.
External reference: [https://typo3.org/security/advisory/typo3-ext-sa-2020-017](https://typo3.org/security/advisory/typo3-ext-sa-2020-017) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'derhansen/sf_event_mgt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'derhansen/sf_event_mgt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-g8rg-7rpr-cwr2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25026'}, {'type': 'WEB', 'url': 'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/derhansen/sf_event_mgt'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-017'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-02T18:03:13Z', 'nvd_published_at': '2020-09-02T17:15:00Z'} |
1.4.0 | GHSA-pxq7-4ppw-qp7f | 2023-09-07T00:04:57Z | 2020-09-01T18:19:36Z | null | ['CVE-2017-16135'] | Directory Traversal in serverzyy | Affected versions of `serverzyy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'serverzyy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16135'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverzyy'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/431'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rwmv-c7v8-v9vf | 2021-10-01T20:40:15Z | 2020-09-04T16:36:45Z | null | [] | Malicious Package in bitcoimd-rpc | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bitcoimd-rpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1363'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9pr3-7449-977r | 2020-08-31T18:36:31Z | 2020-09-02T18:21:26Z | null | [] | Cross-Site Scripting in express-cart | All versions of `harp` are vulnerable to Cross-Site Scripting. In the admin page it is possible to inject arbitrary JavaScript as a new product option, allowing attackers to execute arbitrary code. This is limited to the admin page and does not affect other pages.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/395944'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/808'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:36:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-224h-p7p5-rh85 | 2021-09-23T21:43:28Z | 2020-09-01T17:32:26Z | null | [] | Directory Traversal in wenluhong1 | Affected versions of `wenluhong1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'wenluhong1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wenluhong1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:wenluhong1:20170509'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/409'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:22:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6m6m-j2hm-pxrg | 2021-09-30T19:33:36Z | 2020-09-03T17:37:05Z | null | [] | Malicious Package in cicada-render | All versions of `cicada-render` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cicada-render'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1051'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x9j7-x98r-r4w2 | 2021-08-26T15:19:30Z | 2020-09-25T18:28:51Z | null | ['CVE-2020-15210'] | Segmentation fault in tensorflow-lite | ### Impact
If a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption.
### Patches
We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### Workarounds
A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that no operator reuses tensors as both inputs and outputs. Care should be taken to check all types of inputs (i.e., constant or variable tensors as well as optional tensors).
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered from a variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15210'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-20', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:15:49Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-46m8-42hm-wvvw | 2021-09-23T21:33:00Z | 2020-09-01T15:34:16Z | null | ['CVE-2016-1000231'] | Cross-Site Scripting in emojione | Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions.
## Recommendation
Update to version 1.3.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'emojione'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000231'}, {'type': 'WEB', 'url': 'https://github.com/Ranks/emojione/issues/61'}, {'type': 'WEB', 'url': 'https://github.com/joypixels/emojione/commit/613079b16c00e47fb3c44744a67ed88a9295afb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ranks/emojione/'}, {'type': 'WEB', 'url': 'https://github.com/joypixels/emojione/commits/v1.3.1/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3wh2-2pp3-2823 | 2023-07-27T00:02:26Z | 2020-09-01T20:35:18Z | null | [] | Malicious Package in simple-alipay | Version 1.0.1 of `simple-alipay` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.1 of this module is found installed you will want to replace it with a version before or after 1.0.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.0.0 | [] | [{'package': {'ecosystem': 'npm', 'name': 'simple-alipay'}, 'versions': ['1.0.1']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/637'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v35c-49j6-q8hq | 2021-10-04T21:19:09Z | 2020-09-15T20:30:34Z | null | ['CVE-2016-9879'] | Security Constraint Bypass in Spring Security | Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed.
Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), getServletPath() and getPathInfo() [1].
Users of other Servlet containers based on Apache Tomcat may or may not be affected depending on whether or not the handling of path parameters has been modified.
Users of IBM WebSphere Application Server 8.5.x are known to be affected.
Users of other containers that implement the Servlet specification may be affected.
[1] https://issues.apache.org/bugzilla/show_bug.cgi?id=25015
## Affected Pivotal Products and Versions
Severity is high unless otherwise noted.
- Spring Security 3.2.0 - 3.2.9
- Spring Security 4.0.x - 4.1.3
- Spring Security 4.2.0
- Older unsupported versions are also affected
## Mitigation
Adopting one of the following mitigations will protect against this vulnerability.
- Use a Servlet container known not to include path parameters in the return values for getServletPath() and getPathInfo()
- Upgrading to Spring Security 3.2.10, 4.1.4 or 4.2.1 will reject the request with a RequestRejectedException if the presence of an encoded "/" is detected. Note: If you wish to disable this feature it can be disabled by setting the DefaultHttpFirewall.allowUrlEncodedSlash = true. However, disabling this feature will mean applications are vulnerable (in containers that return path parameters in getServletPath() or getPathInfo()).
## Credit
The issue was identified by Shumpei Asahara & Yuji Ito from NTT DATA Corporation and responsibly reported to Pivotal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9879'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-9879'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95142'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-15T20:29:50Z', 'nvd_published_at': '2017-01-06T22:59:00Z'} |
1.4.0 | GHSA-65j7-66p7-9xgf | 2021-09-30T21:59:50Z | 2020-09-02T21:51:55Z | null | [] | Malicious Package in font-scrubber | Version 1.2.2 of `font-scrubber` contains malicious code as a postinstall script. The package attempts to upload sensitive files from the system to a remote server. The files include configuration files, command history logs, SSH keys and /etc/passwd.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'font-scrubber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/919'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v8g7-9qv2-j865 | 2021-10-01T20:42:19Z | 2020-09-04T16:38:55Z | null | [] | Malicious Package in bitcoin-osp | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bitcoin-osp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1365'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rjhc-w3fj-j6x9 | 2021-09-30T18:35:42Z | 2020-09-03T17:32:45Z | null | [] | Malicious Package in alipayjsapi | All versions of `alipayjsapi` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'alipayjsapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1048'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:45:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9hqj-38j2-5jgm | 2020-08-31T18:33:35Z | 2020-09-01T21:19:23Z | null | [] | Command Injection in ascii-art | Versions of `ascii-art` before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the `ascii-art preview` command.
Example Proof of concept:
`ascii-art preview 'doom"; touch /tmp/malicious; echo "'`
Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like `execFile`.
## Recommendation
Update to version 1.4.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ascii-art'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.2'}}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/390631'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/471.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/727'}] | {'cwe_ids': ['CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hrpp-f84w-xhfg | 2021-10-04T19:13:23Z | 2020-09-04T16:55:06Z | null | [] | Outdated Static Dependency in vue-moment | Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability.
## Recommendation
Upgrade to version 4.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'vue-moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e'}, {'type': 'PACKAGE', 'url': 'https://github.com/brockpetrie/vue-moment'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1425'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/532'}] | {'cwe_ids': ['CWE-1104'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mfcp-34xw-p57x | 2021-09-29T20:12:42Z | 2020-09-03T21:20:52Z | null | [] | Authentication Bypass in saml2-js | Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely.
## Recommendation
Upgrade to version 2.0.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'saml2-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Clever/saml2/pull/190'}, {'type': 'WEB', 'url': 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Clever/saml2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1222'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jchg-g94r-64qg | 2021-09-30T20:20:03Z | 2020-09-03T19:50:10Z | null | [] | Malicious Package in mogobd | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mogobd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1132'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rwcq-qpm6-7867 | 2021-10-01T21:04:25Z | 2020-09-03T17:04:32Z | null | [] | Malicious Package in riped160 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'riped160'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1403'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fwcw-5qw2-87mp | 2022-08-03T21:39:33Z | 2020-09-01T15:55:56Z | null | ['CVE-2016-1000235'] | fuelux vulnerable to Cross-Site Scripting in Pillbox feature | Affected versions of `fuelux` contain a cross-site scripting vulnerability in the Pillbox feature. By supplying a script as a value for a new pillbox, it is possible to cause arbitrary script execution.
## Recommendation
Update to version 3.15.7 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'fuelux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000235'}, {'type': 'WEB', 'url': 'https://github.com/ExactTarget/fuelux/issues/1841'}, {'type': 'WEB', 'url': 'https://github.com/ExactTarget/fuelux/pull/1856'}, {'type': 'PACKAGE', 'url': 'https://github.com/ExactTarget/fuelux'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/133'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:11:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q4cq-539c-3mmm | 2023-09-12T19:35:27Z | 2020-09-01T16:48:14Z | null | ['CVE-2017-16103'] | Directory Traversal in serveryztyzt | Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serveryztyzt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16103'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/354'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:20:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8fv7-vm2p-5495 | 2023-09-11T16:37:05Z | 2020-09-01T17:23:53Z | null | ['CVE-2017-16123'] | Directory Traversal in welcomyzt | `welcomyzt` is a simple file server.
`welcomyzt` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing `../` in the url.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```http
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'welcomyzt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16123'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/388'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:21:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9px9-f7jw-fwhj | 2020-08-31T19:01:15Z | 2020-09-03T15:49:37Z | null | [] | Command Injection in priest-runner | All versions of `priest-runner` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to a `spawn` call, which may allow attackers to execute arbitrary code in the system. The `PriestController.prototype.createChild ` function is vulnerable since the `spawn` parameters come from a POST request body.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'priest-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1492'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:01:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gjc9-932x-c59p | 2023-07-25T20:40:16Z | 2020-09-03T00:34:33Z | null | [] | Malicious Package in leaflet-gpx | Version 1.0.1 of `leaflet-gpx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
Users may consider a downgrade to version 1.0.0 | [] | [{'package': {'ecosystem': 'npm', 'name': 'leaflet-gpx'}, 'versions': ['1.0.1']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/937'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qvc5-cfrr-384v | 2020-09-23T15:01:47Z | 2020-09-23T17:20:28Z | null | [] | RCE in Third Party Library in Shopware | ### Impact
RCE in Third Party Library
### Patches
We recommend to update to the current version 6.3.1.1. You can get the update to 6.3.1.1 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### References
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020 | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.1.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qvc5-cfrr-384v'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-09-2020'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-09-23T15:01:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hx5x-49mm-vmhw | 2021-09-27T22:39:39Z | 2020-09-03T02:36:43Z | null | [] | SQL Injection in sails-mysql | Versions of `sails-mysql` prior to 0.10.8 are vulnerable to SQL Injection. The `sort` keyword is not properly sanitized and may allow attackers to inject SQL statements and execute arbitrary SQL queries
## Recommendation
Upgrade to version 0.10.8 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sails-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/issues/6679'}, {'type': 'PACKAGE', 'url': 'https://github.com/balderdashy/sails'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAILSMYSQL-174916'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/950'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2hqf-qqmq-pgpp | 2021-10-01T13:30:38Z | 2020-09-02T15:48:16Z | null | [] | Malicious Package in commander-js | All versions of `commander-js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads an arbitrary file and executes its contents as a post-install script.
## Recommendation
This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'commander-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/763'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wch2-46wj-6x5j | 2021-10-01T20:38:52Z | 2020-09-04T15:37:15Z | null | [] | Malicious Package in bip30 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bip30'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1358'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:56:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-49c6-3wr4-8jr4 | 2021-10-01T20:07:48Z | 2020-09-04T15:05:26Z | null | [] | Malicious Package in malicious-npm-package | All versions of `malicious-npm-package` contain malicious code. The malware targets Windows systems. It runs a powershell command that downloads an executable file from a remote server and runs it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'malicious-npm-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1323'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mg69-6j3m-jvgw | 2021-10-04T20:55:27Z | 2020-09-03T15:45:08Z | null | [] | HTML Injection in marky-markdown | All versions of `marky-markdown` are vulnerable to HTML Injection. The package fails to sanitize `style` attributes in `img` tags of the markdown input. This may allow attackers to affect the size of images in the rendered HTML.
## Recommendation
This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'marky-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/npm/marky-markdown'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MARKYMARKDOWN-548871'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1470'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5wq6-v5cw-jvfr | 2021-09-30T17:12:55Z | 2020-09-03T23:03:36Z | null | [] | Malicious Package in js-shas | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-shas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1285'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8549-p68h-m9mc | 2021-09-29T20:57:14Z | 2020-09-03T21:46:21Z | null | [] | Malicious Package in buffdr-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffdr-xor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1237'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h6m3-cx24-9626 | 2021-10-01T14:15:57Z | 2020-09-03T23:11:45Z | null | [] | Malicious Package in js-sla3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-sla3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1292'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:54:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pm9v-325f-5g74 | 2021-09-30T21:26:49Z | 2020-09-02T21:30:11Z | null | [] | Malicious Package in saync | All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'saync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/896'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5w4r-wwc3-6qcp | 2023-07-27T20:33:34Z | 2020-09-11T21:23:29Z | null | [] | Malicious Package in precode.js | Version 1.1.1 of `precode.js` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 1.1.0 | [] | [{'package': {'ecosystem': 'npm', 'name': 'precode.js'}, 'versions': ['1.1.1']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/941'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4r97-78gf-q24v | 2020-08-31T19:00:12Z | 2020-09-04T17:53:27Z | null | [] | Prototype Pollution in klona | Versions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 1.1.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'klona'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/778414'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1463'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c82c-8pjw-6829 | 2021-09-24T14:41:28Z | 2020-09-01T19:41:45Z | null | [] | Malicious Package in @impala/bmap | Version 1.0.3 of `@impala/bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/'}] | [{'package': {'ecosystem': 'npm', 'name': '@impala/bmap'}, 'versions': ['1.0.3']}] | [{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c82c-8pjw-6829'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMPALABMAP-451019'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/613'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:29:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jcmh-9fvm-j39w | 2021-09-30T20:13:39Z | 2020-09-03T19:42:23Z | null | [] | Malicious Package in body-parse-xml | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'body-parse-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1125'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:48:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vvfh-mvjv-w38q | 2021-10-01T20:17:42Z | 2020-09-04T15:28:19Z | null | [] | Malicious Package in babel-loadre | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'babel-loadre'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1349'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xcgx-27q5-7634 | 2021-10-01T20:59:32Z | 2020-09-03T19:41:05Z | null | [] | Malicious Package in commanedr | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'commanedr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1388'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g53w-52xc-2j85 | 2021-10-04T19:11:02Z | 2020-09-04T16:52:57Z | null | ['CVE-2013-7035'] | Cross-Site Scripting in react | Affected versions of `react` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize input used to create keys. This may allow attackers to execute arbitrary JavaScript if a key is generated from user input.
## Recommendation
If you are using `react` 0.5.x, upgrade to version 0.5.2 or later.
If you are using `react` 0.4.x, upgrade to version 0.4.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7035'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react/commit/393a889aaceb761f058b09a701f889fa8f8b4e64'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react/commit/94a9a3e752fe089ab23f3a90c26d20d46d62ab10'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/react'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2013/12/18/react-v0.5.2-v0.4.2.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react:20131217'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-63xm-rx5p-xvqr | 2021-08-26T15:11:21Z | 2020-09-25T18:28:29Z | null | ['CVE-2020-15195'] | Heap buffer overflow in Tensorflow | ### Impact
The implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L263-L269
It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow.
### Patches
We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15195'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'}] | {'cwe_ids': ['CWE-119', 'CWE-122', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T17:15:00Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-77g4-36jp-5v3m | 2020-08-31T18:09:58Z | 2020-09-01T15:22:12Z | null | ['CVE-2016-10519'] | Remote Memory Disclosure in bittorrent-dht | Versions of `bittorrent-dht` prior to 5.1.3 are affected by a remote memory disclosure vulnerability. This vulnerability allows an attacker to send a specific series of of messages to a listening peer and get it to reveal internal memory.
There are two mitigating factors here, that slightly reduce the impact of this vulnerability:
1. Any modern kernel will zero out new memory pages before handing them off to a process. This means that only memory previously used and deallocated by the node process can be leaked.
1. Node.js manages Buffers by creating a few large internal SlowBuffers, and slicing them up into smaller Buffers which are made accessible in JS. They are not stored on V8's heap, because garbage collection would interfere. The result is that only memory that has been previously allocated as a Buffer can be leaked.
## Recommendation
Update to version 5.1.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bittorrent-dht'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10519'}, {'type': 'WEB', 'url': 'https://github.com/feross/bittorrent-dht/issues/87'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/68'}] | {'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7hvm-29rf-2gf2 | 2021-01-14T15:57:55Z | 2020-09-01T16:08:58Z | null | ['CVE-2016-10647'] | Downloads Resources over HTTP in node-air-sdk | Affected versions of `node-air-sdk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-air-sdk`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-air-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10647'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/250'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:16:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-92xj-mqp7-vmcj | 2022-12-03T04:06:21Z | 2020-09-14T21:42:09Z | null | ['CVE-2020-7720'] | Prototype Pollution in node-forge | The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: version 0.10.0 is a breaking change removing the vulnerable functions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.util.setPath']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7720'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/6a1e3ef74f6eb345bcff1b82184201d1e28b6756'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-14T21:41:51Z', 'nvd_published_at': '2020-09-01T10:15:00Z'} |
1.4.0 | GHSA-9rwj-8mh9-4876 | 2021-09-30T21:23:53Z | 2020-09-02T21:19:37Z | null | [] | Malicious Package in carloprojectdiscord | All versions of `carloprojectdiscord` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'carloprojectdiscord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/874'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:39:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-48hw-37g6-3gw4 | 2023-07-27T20:35:38Z | 2020-09-03T02:35:41Z | null | [] | Malicious Package in mx-nested-menu | Version 0.1.30 of `mx-nested-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
Users may consider downgrading to version 0.1.29 | [] | [{'package': {'ecosystem': 'npm', 'name': 'mx-nested-menu'}, 'versions': ['0.1.30']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/947'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q643-w9jp-q2qg | 2020-08-31T19:00:05Z | 2020-09-04T17:34:59Z | null | [] | Hardcoded Initialization Vector in parsel | All versions of `parsel` have a default hardcoded initialization vector. In cases where the IV is not provided, the package defaults to a hardcoded IV which renders the cipher vulnerable to chosen plaintext attacks.
## Recommendation
The package is deprecated and will not be updated. Consider using an alternative package. | [] | [{'package': {'ecosystem': 'npm', 'name': 'parsel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1460'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T19:00:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g37j-v5gh-g25c | 2021-09-30T17:14:07Z | 2020-09-03T23:06:48Z | null | [] | Malicious Package in js-shi3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-shi3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1288'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hgr5-82rc-p936 | 2020-08-31T18:34:23Z | 2020-09-01T21:24:41Z | null | [] | Cross-Site Scripting in md-data-table | All versions of `md-data-table` are vulnerable to cross-site scripting (XSS). This vulnerability is exploitable if an attacker has control over data that is rendered by `mdt-row`
## Recommendation
As there is no fix for this vulnerability at this time we recommend either selecting another package to perform this functionality or properly sanitizing all user data prior to rendering with `md-data-table` | [] | [{'package': {'ecosystem': 'npm', 'name': 'md-data-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/748'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:34:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vf5m-q45w-8mh9 | 2021-09-30T17:01:14Z | 2020-09-03T23:00:25Z | null | [] | Malicious Package in js-qha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-qha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1282'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-36r8-9qq7-mh43 | 2021-10-04T19:09:44Z | 2020-09-03T17:02:40Z | null | [] | Malicious Package in we3b | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'we3b'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1415'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hwhq-3hrj-v6v5 | 2023-09-08T18:49:03Z | 2020-09-01T19:00:54Z | null | ['CVE-2017-16081'] | cross-env.js is malware | The `cross-env.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [] | [{'package': {'ecosystem': 'npm', 'name': 'cross-env.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16081'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/520'}] | {'cwe_ids': ['CWE-506'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:26:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7w7c-867m-4mqc | 2021-10-01T21:04:09Z | 2020-09-03T17:04:55Z | null | [] | Malicious Package in rceat | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rceat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1402'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:58:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2vqq-jgxx-fxjc | 2021-09-30T22:07:26Z | 2020-09-11T21:24:33Z | null | [] | Malicious Package in motiv.scss | Version 0.4.20 of `motiv.scss` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'motiv.scss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.20'}, {'fixed': '0.4.21'}]}], 'versions': ['0.4.20']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/939'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f72h-wf57-7xwh | 2021-09-29T21:04:48Z | 2020-09-03T21:58:34Z | null | [] | Malicious Package in buffer-xo2 | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buffer-xo2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1248'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:52:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2v2-7rcg-2ch7 | 2021-01-14T15:58:08Z | 2020-09-01T15:17:48Z | null | ['CVE-2015-9239'] | Regular Expression Denial of Service in ansi2html | The `ansi2html` package is affected by a regular expression denial of service vulnerability when certain types of user input is passed in.
## Proof of concept
```
var ansi2html = require('ansi2html')
var start = process.hrtime();
ansi2html("[1111111111111111111111;0000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;00000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;000000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;0000000000000000000000000000");
console.log(process.hrtime(start));
```
Results of the above
```
00:29:53-adam_baldwin~/tmp$ node test
[ 0, 119615367 ]
[ 0, 149934565 ]
[ 0, 233325677 ]
[ 3, 46582479 ]
```
## Recommendation
At the time of this writing, February 2018, all versions of `ansi2html` remain vulnerable, and the package has not been updated for 4 years.
In order to use this package safely, it is necessary to avoid passing user input to the package, or to limit the size of the input string to a size with a parse time you find acceptable. Unfortunately, the match time grows at quite a small character count, so it is unlikely for it to both allow strings of a useful size while protecting against the denial of service attack.
In the case that user input of significant length must be parsed by ansi2html, the best mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.][available on npm](https://www.npmjs.com/search?q=ansi+html) | [] | [{'package': {'ecosystem': 'npm', 'name': 'ansi2html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9239'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/51'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:09:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f5cv-xrv9-r8w7 | 2021-09-24T20:58:36Z | 2020-09-01T21:17:16Z | null | [] | NoSQL injection in express-cart | Versions of `express-cart` before 1.1.8 are vulnerable to NoSQL injection.
The vulnerability is caused by the lack of user input sanitization in the login handlers. In both cases, the customer login and the admin login, parameters from the JSON body are sent directly into the MongoDB query which allows to insert operators.
These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection. In this case, the `$regex` operator is used to guess each character of the token from the start.
## Recommendation
Update to version 1.1.8 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.7'}}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/397445'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/security-wg'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/472.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/724'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:33:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cv3v-7846-6pxm | 2021-09-29T19:59:01Z | 2020-09-03T21:15:19Z | null | [] | Unauthorized File Access in node-git-server | Versions of `node-git-server` prior to 0.6.1 are vulnerable to Unauthorized File Access. It is possible to access any git repository by using absolute paths, which may allow attackers to access private repositories.
## Recommendation
Upgrade to version 0.6.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-git-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gabrielcsapo/node-git-server/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43'}, {'type': 'PACKAGE', 'url': 'https://github.com/gabrielcsapo/node-git-server'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEGITSERVER-474343'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1214'}] | {'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:51:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8xj3-7258-w4q2 | 2023-09-11T20:32:32Z | 2020-09-01T18:51:22Z | null | ['CVE-2017-16179'] | Directory Traversal in dasafio | Affected versions of `dasafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
**Example request:**
```http
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'dasafio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16179'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/460'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:23:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rvww-x6m4-4vc2 | 2021-09-30T22:00:23Z | 2020-09-11T21:12:39Z | null | [] | Malicious Package in blubird | Version 3.5.0 of `blubird` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'blubird'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/921'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:40:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-22q9-hqm5-mhmc | 2021-09-28T17:01:08Z | 2020-09-11T21:22:24Z | null | [] | Cross-Site Scripting in swagger-ui | Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to encode output in GET requests. The request is meant to respond with Content-Type `application/json` which does not trigger the vulnerability but if the web server changes the header to `text/html` it may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.2.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/1154'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/987'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:43:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-52c9-458g-whrf | 2021-09-30T17:00:43Z | 2020-09-03T22:58:17Z | null | [] | Malicious Package in js-3ha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-3ha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1280'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:53:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p2cq-cprg-frvm | 2021-08-26T15:20:06Z | 2020-09-25T18:28:56Z | null | ['CVE-2020-15214'] | Out of bounds write in tensorflow-lite | ### Impact
In TensorFlow Lite models using segment sum can trigger a write out bounds / segmentation fault if the segment ids are not sorted. Code assumes that the segment ids are in increasing order, using the last element of the tensor holding them to determine the dimensionality of output tensor:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/segment_sum.cc#L39-L44
This results in allocating insufficient memory for the output tensor and in a write outside the bounds of the output array:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.h#L2625-L2631
This usually results in a segmentation fault, but depending on runtime conditions it can provide for a write gadget to be used in future memory corruption-based exploits.
### Patches
We have patched the issue in 204945b and will release patch releases for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1.
### Workarounds
A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are sorted, although this only handles the case when the segment ids are stored statically in the model.
A similar validation could be done if the segment ids are generated at runtime between inference steps.
If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15214'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-09-25T18:25:05Z', 'nvd_published_at': '2020-09-25T19:15:00Z'} |
1.4.0 | GHSA-ff6g-gm92-rf32 | 2021-10-01T20:58:19Z | 2020-09-03T19:42:06Z | null | [] | Malicious Package in coinstirng | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'coinstirng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1383'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8rxg-9g6f-vq9p | 2021-09-24T16:18:50Z | 2020-09-01T19:46:01Z | null | [] | Malicious Package in another-date-range-picker | Version 4.1.48 of `another-date-range-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 4.1.48 of this module is found installed you will want to replace it with a version before or after 4.1.48. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/'}] | [{'package': {'ecosystem': 'npm', 'name': 'another-date-range-picker'}, 'versions': ['4.1.48']}] | [{'type': 'WEB', 'url': 'https://github.com/bi-a/mydaterangepicker'}, {'type': 'PACKAGE', 'url': 'https://github.com/kekeh/mydaterangepicker'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATERANGEPICKER-451011'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/617'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:30:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-56r9-v65c-34jm | 2023-07-13T21:05:58Z | 2020-09-03T02:33:37Z | null | [] | Malicious Package in radicjs | Version 0.2.1 of `radicjs` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. Users may downgrade to 0.2.0 | [] | [{'package': {'ecosystem': 'npm', 'name': 'radicjs'}, 'versions': ['0.2.1']}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/943'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:41:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-83pq-466j-fc6j | 2020-08-31T18:55:34Z | 2020-09-04T15:17:50Z | null | [] | Prototype Pollution in sahmat | All versions of `sahmat ` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sahmat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1336'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpw3-x4xq-6vxq | 2021-10-01T13:46:23Z | 2020-09-02T18:32:13Z | null | [] | Malicious Package in wepack-cli | All versions of `wepack-cli` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'wepack-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/839'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:37:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rmmc-8cqj-hfp3 | 2020-08-31T18:46:51Z | 2020-09-03T18:24:43Z | null | [] | Authentication Bypass in otpauth | Versions of `otpauth` prior to 3.2.8 are vulnerable to Authentication Bypass. The package's `totp.validate()` function may return positive values for single digit tokens even if they are invalid. This may allow attackers to bypass the OTP authentication by providing single digit tokens.
## Recommendation
Upgrade to version 3.2.8 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'otpauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.8'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1087'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:46:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7x92-2j68-h32c | 2020-08-31T18:27:38Z | 2020-09-01T19:03:02Z | null | [] | Directory Traversal in featurebook | Affected versions of `featurebook` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
The `featurebook` package is not intended to be run in production code nor to be exposed to an untrusted network.
## Proof of Concept
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No direct patch is currently available.
At this time, the best mitigation is to ensure that `featurebook` is not running in production or exposed to an untrusted network. | [] | [{'package': {'ecosystem': 'npm', 'name': 'featurebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/296305'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/556'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:27:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rrvm-gqq8-q2wx | 2021-09-29T20:45:41Z | 2020-09-03T21:05:26Z | null | [] | Malicious Package in require-port | Version 1.0.0 of `require-port` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'require-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1197'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xgp2-cc4r-7vf6 | 2020-08-31T18:50:28Z | 2020-09-03T20:44:21Z | null | [] | Denial of Service in http-live-simulator | Versions of `http-live-simulator` prior to 1.0.8 are vulnerable to Denial of Service. The package fails to catch an exception that causes the Node process to crash, effectively shutting down the server. This allows an attacker to send an HTTP request that crashes the server.
## Recommendation
Upgrade to version 1.0.8 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'http-live-simulator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/627376'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1189'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:50:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qccf-q7p4-3q3j | 2020-08-31T18:55:32Z | 2020-09-04T15:16:42Z | null | [] | Prototype Pollution in safe-object2 | All versions of `safe-object2` are vulnerable to prototype pollution. The `settter()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'safe-object2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1335'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3gpc-w23c-w59w | 2021-04-21T19:45:42Z | 2020-09-04T15:02:06Z | null | [] | Sandbox Breakout / Arbitrary Code Execution in pitboss-ng | All versions of `pitboss-ng` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [] | [{'package': {'ecosystem': 'npm', 'name': 'pitboss-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1319'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:55:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-255r-pghp-r5wh | 2021-10-01T21:02:17Z | 2020-09-03T17:05:34Z | null | [] | Malicious Package in hdeky | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'hdeky'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1398'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hj5w-xgw9-w4rj | 2021-10-01T20:58:49Z | 2020-09-03T19:41:44Z | null | [] | Malicious Package in coinstrng | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'coinstrng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1385'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:57:20Z', 'nvd_published_at': None} |