schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-55xv-f85c-248q | 2022-01-04T19:52:06Z | 2021-12-17T19:59:02Z | null | ['CVE-2021-43838'] | Regular Expression Denial of Service (ReDoS) in jsx-slack | jsx-slack v4.5.1 and earlier versions are vulnerable to a regular expression denial-of-service (ReDoS) attack.
### Impact
If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources.
```javascript
/** @jsxImportSource jsx-slack */
import { Section } from 'jsx-slack'
console.log(
<Section>
<blockquote>
{[...Array(40)].map((_, i) => (
<p>{i + 1}</p>
))}
</blockquote>
</Section>
)
```
### Patches
_See also: https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6_
jsx-slack v4.5.2 has updated regular expressions to prevent catastrophic backtracking.
jsx-slack v4.5.1 also had patched a workaround. It has no problems to contents with ASCII characters, but _still vulnerable to contents with multibyte characters_. (https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d)
### References
- https://nvd.nist.gov/vuln/detail/CVE-2021-43838
- https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d
### Credits
Thanks to @hieki for finding out this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsx-slack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43838'}, {'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d'}, {'type': 'PACKAGE', 'url': 'https://github.com/yhatt/jsx-slack/'}] | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:33:23Z', 'nvd_published_at': '2021-12-17T19:15:00Z'} |
1.4.0 | GHSA-wx5j-54mm-rqqq | 2023-08-04T20:07:19Z | 2021-12-09T19:09:17Z | null | ['CVE-2021-43797'] | HTTP request smuggling in netty | ### Impact
Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling.
Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.71.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43797'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/11891'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220107-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:17:28Z', 'nvd_published_at': '2021-12-09T19:15:00Z'} |
1.4.0 | GHSA-3xph-cp8f-2229 | 2021-12-13T13:10:41Z | 2021-12-10T20:31:32Z | null | ['CVE-2021-3815'] | Prototype Pollution in @fabiocaccamo/utils.js | utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@fabiocaccamo/utils.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815'}, {'type': 'WEB', 'url': 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'}, {'type': 'PACKAGE', 'url': 'https://github.com/fabiocaccamo/utils.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:05:12Z', 'nvd_published_at': '2021-12-08T17:15:00Z'} |
1.4.0 | GHSA-hm82-qr45-h7mw | 2023-09-08T22:51:04Z | 2021-12-10T17:22:58Z | null | ['CVE-2020-28269'] | Prototype Pollution in field | Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'field'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28269'}, {'type': 'WEB', 'url': 'https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269,'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:23:15Z', 'nvd_published_at': '2020-11-12T18:15:00Z'} |
1.4.0 | GHSA-9vwf-54m9-gc4f | 2022-08-11T19:17:54Z | 2021-12-16T14:32:39Z | null | ['CVE-2021-4089'] | snipe-it is vulnerable to Improper Access Control | snipe-it prior to version 5.3.4 is vulnerable to Improper Access Control. Regular users with `DENY` set to all models permissions can still view model information via the /models/{id}/clone endpoint due to no authorize('view') permission being set. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862'}] | {'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:21:35Z', 'nvd_published_at': '2021-12-10T20:15:00Z'} |
1.4.0 | GHSA-668q-qrv7-99fm | 2021-12-17T19:25:11Z | 2021-12-17T20:00:50Z | null | ['CVE-2021-42550'] | Deserialization of Untrusted Data in logback | In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ch.qos.logback:logback-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42550'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf'}, {'type': 'WEB', 'url': 'https://github.com/cn-panda/logbackRceDemo'}, {'type': 'PACKAGE', 'url': 'https://github.com/qos-ch/logback'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html'}, {'type': 'WEB', 'url': 'https://jira.qos.ch/browse/LOGBACK-1591'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0001/'}, {'type': 'WEB', 'url': 'http://logback.qos.ch/news.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/11'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:25:11Z', 'nvd_published_at': '2021-12-16T19:15:00Z'} |
1.4.0 | GHSA-mx43-r985-5h4m | 2021-12-09T19:40:01Z | 2021-12-20T18:12:47Z | null | ['CVE-2020-12283'] | Open redirect vulnerability in Sourcegraph | ### Impact
An open redirect vulnerability that allows users to be targeted for phishing attacks has been found in Sourcegraph instances configured with OAuth, OpenID, or SAML authentication enabled. Users targeted by these phishing attacks could have their authentication tokens silently harvested by an attacker.
### Resolution
Sourcegraph v3.14.4 and v3.15.1 have been released which resolve the vulnerability. ([associated change](https://github.com/sourcegraph/sourcegraph/pull/10167))
### Workarounds
Disabling OAuth, OpenID and/or SAML sign-in options until upgraded to the patched versions will secure Sourcegraph / workaround the issue.
### Timeline
- Apr 23, 8 AM PST: GitHub Security Lab reported the issue to Sourcegraph.
- Apr 23, 11 PM PST: A Sourcegraph engineer proposed a resolution for the vulnerability. https://github.com/sourcegraph/sourcegraph/pull/10167
- Apr 24, 3 AM PST: The proposed resolution was reviewed, approved, and merged.
- Apr 28, 2 PM PST: Patch releases for 3.14.4 and 3.15.1 were published.
- Apr 29, 10 PM PST: Mitre publicly disclosed [CVE-2020-12283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12283).
- Apr 30, 11 AM PST: Sourcegraph issued a GitHub security advisory and notified all affected users.
### References
- [Mitre: CVE-2020-12283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12283)
- [GitHub Security Lab: GHSL-2020-085](https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph)
- [detectify's blog post on open redirect vulnerabilities
](https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/)
### For more information
If you have any questions or comments about this advisory, please contact us at [support@sourcegraph.com](mailto:support@sourcegraph.com) and include `CVE-2020-12283` in the title. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sourcegraph/sourcegraph/cmd/frontend/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/sourcegraph/sourcegraph/cmd/frontend/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.15.0'}, {'fixed': '3.15.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-mx43-r985-5h4m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12283'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/pull/10167'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64'}, {'type': 'PACKAGE', 'url': 'https://github.com/sourcegraph/sourcegraph'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/compare/v3.15.0...v3.15.1'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:06:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-84px-q68r-2fc9 | 2021-12-15T22:27:38Z | 2021-12-15T22:55:16Z | null | ['CVE-2021-43835'] | Privilege escalation in the Sulu Admin panel | ### Impact
Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction.
### Patches
The versions have been patched in 2.2.18, 2.3.8 and 2.4.0.
### Workarounds
Patching the ProfileController of affected sulu versions yourself by overwriting it.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues)
* Email us at [security@sulu.io](mailto:security@sulu.io)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.17'}}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.7'}}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-RC1'}, {'fixed': '2.4.0'}]}], 'versions': ['2.4.0-RC1']}] | [{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T22:27:38Z', 'nvd_published_at': '2021-12-15T20:15:00Z'} |
1.4.0 | GHSA-hwvm-vfw8-93mw | 2021-12-16T18:40:26Z | 2021-12-16T18:53:32Z | null | [] | Vulnerable dependency in XTDB connector | ### Impact
The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the connector we understand to be any URI used to configure connectivity to S3. Note therefore that if you do not use or configure S3 as a backing store in your use of the connector, you should not be exposed to any vulnerability from this component.
### Patches
The problem has been addressed in version 4.5.13 of the httpclient library, which is included as a replacement dependency version for the build of the XTDB connector from release 3.5 onwards. Therefore, using release 3.5 (or newer) of the connector will include the fixes to address this CVE.
### Workarounds
We have not investigated specific workarounds, but per the description of the issue it seems likely that ensuring the proper URIs are used for any S3 connectivity used by the connector (and ensuring there are appropriate controls around modifying such URIs in the connector's configuration) would be the first point of investigation.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-13956 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.odpi.egeria:egeria-connector-xtdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}, {'type': 'WEB', 'url': 'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'}, {'type': 'PACKAGE', 'url': 'https://github.com/odpi/egeria-connector-xtdb'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:40:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-68wm-pfjf-wqp6 | 2023-01-18T16:44:31Z | 2021-12-20T16:57:16Z | null | ['CVE-2021-32637'] | Authentication bypassed with malformed request URI on nginx | ### Impact
This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, but all of the ones we officially support except nginx do not allow malformed URI paths.
### Patches
The problem is rectified entirely in v4.29.3. As this patch is relatively straightforward we can back port this to any version upon request. Alternatively we are supplying a git patch to 4.25.1 which should be relatively straightforward to apply to any version, the git patches for specific versions can be found below.
<details><summary>Patch for 4.25.1:</summary><p>
```patch
From ca22f3d2c44ca7bef043ffbeeb06d6659c1d550f Mon Sep 17 00:00:00 2001
From: James Elliott <james-d-elliott@users.noreply.github.com>
Date: Wed, 19 May 2021 12:10:13 +1000
Subject: [PATCH] fix(handlers): verify returns 200 on malformed request
This is a git patch for commit at tag v4.25.1 to address a potential method to bypass authentication in proxies that forward malformed information to Authelia in the forward auth process. Instead of returning a 200 this ensures that Authelia returns a 401 when this occurs.
---
internal/handlers/handler_verify.go | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/internal/handlers/handler_verify.go b/internal/handlers/handler_verify.go
index 65c064ce..4dd9702d 100644
--- a/internal/handlers/handler_verify.go
+++ b/internal/handlers/handler_verify.go
@@ -396,7 +396,9 @@ func VerifyGet(cfg schema.AuthenticationBackendConfiguration) middlewares.Reques
targetURL, err := getOriginalURL(ctx)
if err != nil {
- ctx.Error(fmt.Errorf("Unable to parse target URL: %s", err), operationFailedMessage)
+ ctx.Logger.Error(fmt.Errorf("Unable to parse target URL: %s", err))
+ ctx.ReplyUnauthorized()
+
return
}
--
2.31.1
```
</p></details>
### Workarounds
The most relevant workaround is upgrading. **If you need assistance with an upgrade please contact us on [Matrix](https://riot.im/app/#/room/#authelia:matrix.org) or [Discord](https://discord.authelia.com).** Please just let us know you're needing help upgrading to above 4.29.2.
You can add an block which fails requests that contains a malformed URI in the internal location block. We have crafted one that should work in most instances, it basically checks no chars that are required to be URL-encoded for either the path or the query are in the URI. Basically this regex checks that the characters between the square braces are the only characters in the $request_uri header, if they exist, it returns a HTTP 401 status code. The characters in the regex match are tested to not cause a parsing error that would result in a failure, however they are not exhaustive since query strings seem to not always conform to the RFC.
<details><summary>authelia.conf:</summary><p>
```nginx
location /authelia {
internal;
# **IMPORTANT**
# This block rejects requests with a 401 which contain characters that are unable to be parsed.
# It is necessary for security prior to v4.29.3 due to the fact we returned an invalid code in the event of a parser error.
# You may comment this section if you're using Authelia v4.29.3 or above. We strongly recommend upgrading.
# RFC3986: http://tools.ietf.org/html/rfc3986
# Commentary on RFC regarding Query Strings: https://www.456bereastreet.com/archive/201008/what_characters_are_allowed_unencoded_in_query_strings/
if ($request_uri ~ [^a-zA-Z0-9_+-=\!@$%&*?~.:#'\;\(\)\[\]]) {
return 401;
}
# Include the remainder of the block here.
}
````
</p></details>
### Discovery
This issue was discovered by:
Siemens Energy
Cybersecurity Red Team
- Silas Francisco
- Ricardo Pesqueira
### Identifying active exploitation of the vulnerability
The following regex should match log entries that are an indication of the vulnerability being exploited:
```regex
level=error msg="Unable to parse target URL: Unable to parse URL (extracted from X-Original-URL header)?.*?: parse.*?net/url:.*github\.com/authelia/authelia/internal/handlers/handler_verify\.go
```
Example log entry ***with*** X-Original-URL configured:
```log
time="2021-05-21T16:31:15+10:00" level=error msg="Unable to parse target URL: Unable to parse URL extracted from X-Original-URL header: parse \"https://example.com/": net/url: invalid control character in URL" method=GET path=/api/verify remote_ip=192.168.1.10 stack="github.com/authelia/authelia/internal/middlewares/authelia_context.go:65 (*AutheliaCtx).Error\ngithub.com/authelia/authelia/internal/handlers/handler_verify.go:431 VerifyGet.func1\ngithub.com/authelia/authelia/internal/middlewares/authelia_context.go:50 AutheliaMiddleware.func1.1\ngithub.com/fasthttp/router@v1.3.12/router.go:414 (*Router).Handler\ngithub.com/authelia/authelia/internal/middlewares/log_request.go:14 LogRequestMiddleware.func1\ngithub.com/valyala/fasthttp@v1.24.0/server.go:2219 (*Server).serveConn\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:223 (*workerPool).workerFunc\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:195 (*workerPool).getCh.func1\nruntime/asm_amd64.s:1371 goexit"
```
Example log entry ***without*** X-Original-URL configured:
```log
time="2021-05-21T16:30:17+10:00" level=error msg="Unable to parse target URL: Unable to parse URL https://example.com/: parse \"https://example.com/": net/url: invalid control character in URL" method=GET path=/api/verify remote_ip=192.168.1.10 stack="github.com/authelia/authelia/internal/middlewares/authelia_context.go:65 (*AutheliaCtx).Error\ngithub.com/authelia/authelia/internal/handlers/handler_verify.go:431 VerifyGet.func1\ngithub.com/authelia/authelia/internal/middlewares/authelia_context.go:50 AutheliaMiddleware.func1.1\ngithub.com/fasthttp/router@v1.3.12/router.go:414 (*Router).Handler\ngithub.com/authelia/authelia/internal/middlewares/log_request.go:14 LogRequestMiddleware.func1\ngithub.com/valyala/fasthttp@v1.24.0/server.go:2219 (*Server).serveConn\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:223 (*workerPool).workerFunc\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:195 (*workerPool).getCh.func1\nruntime/asm_amd64.s:1371 goexit"
```
### For more information
If you have any questions or comments about this advisory:
* Open a [Discussion](https://github.com/authelia/authelia/discussions)
* Email us at [security@authelia.com](mailto:security@authelia.com)
### Edit / Adjustment
This CVE has been edited adjusting the score to more accurately reflect the guidance in the [official CVSS 3.1 guide](https://www.first.org/cvss/specification-document). Under close evaluation the score we originally assigned to this CVE is inappropriate in two clearly identifiable criteria:
- Complexity (Low -> High): This attack requires the administrator be using NGINX's auth_request module. This means the attack cannot be exploited at will but rather requires a pre-condition separate to the vulnerable system, and requires the attacker have gathered knowledge about the system for this likely to be exploited.
- Availability (High -> None): This attack does not alter availability directly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/authelia/authelia/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha1'}, {'fixed': '4.29.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.29.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32637'}, {'type': 'WEB', 'url': 'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda'}, {'type': 'PACKAGE', 'url': 'https://github.com/authelia/authelia'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:08:47Z', 'nvd_published_at': '2021-05-28T17:15:00Z'} |
1.4.0 | GHSA-f77h-m9w2-vvg2 | 2021-12-02T20:24:56Z | 2021-12-03T20:38:57Z | null | ['CVE-2021-4017'] | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4017'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:24:56Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-mf4f-j588-5xm8 | 2021-12-14T15:29:17Z | 2021-12-14T21:07:14Z | null | [] | Apache Log4j Remote Code Execution | ### Impact
Opencast uses an Apache Log4j2 version which, combined with older JDK versions, can be used for remote code execution attacks which have been found to be actively exploited.
Apache Log4j2 <=2.14.1 JNDI features is not sufficiently protected. An attacker who can control log messages or log message parameters can execute arbitrary code when message lookup substitution is enabled.
### Who is affected
- Opencast before 9.10 or 10.6 are affected
- Log4j version: all 2.x versions before 2.15.0 are affected
### Patches
The issue has been fixed in Opencast 9.10 and 10.6.
### Workarounds
The vulnerability can be mitigated by setting system property `log4j2.formatMsgNoLookups` to `true`.
### References
- [Opencast pull request mitigating the vulnerability](https://github.com/opencast/opencast/pull/3253)
- [CVE-2021-44228 Detail](https://nvd.nist.gov/vuln/detail/CVE-2021-44228)
- [Analysis and Remediation Guidance to the Log4j Zero-Day RCE (CVE-2021-44228) Vulnerability](https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228)
- [VE-2021-44228 – Log4j 2 Vulnerability Analysis](https://www.randori.com/blog/cve-2021-44228/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
### Note about dependencies
This issue affects many Java applications. Please also verify these are not vulnerable. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0'}, {'fixed': '10.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-mf4f-j588-5xm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/pull/3253'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/9.x/admin/#changelog/#opencast-910'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:22:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2mqv-4j3r-vjvp | 2021-12-16T18:42:05Z | 2021-12-16T18:52:21Z | null | ['CVE-2021-43812'] | Open redirect in @auth0/nextjs-auth0 | ### Overview
Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability.
### Am I affected?
You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`.
### How to fix that?
Upgrade to version `>=1.6.2`
### Will this update impact my users?
The fix provided in the patch will not affect your users.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@auth0/nextjs-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812'}, {'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/nextjs-auth0'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:42:05Z', 'nvd_published_at': '2021-12-16T19:15:00Z'} |
1.4.0 | GHSA-fp5r-v3w9-4333 | 2022-02-08T20:28:50Z | 2021-12-14T19:49:31Z | null | ['CVE-2021-4104'] | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'last_affected': '1.2.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104'}, {'type': 'WEB', 'url': 'https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4104'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202209-02'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211223-0007/'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/18/3'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:47:27Z', 'nvd_published_at': '2021-12-14T12:15:00Z'} |
1.4.0 | GHSA-76qm-4f93-fg6f | 2022-09-21T22:30:52Z | 2021-12-09T19:30:29Z | null | ['CVE-2015-9545'] | Improper Input Validation in xdLocalStorage | An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9545'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:14:14Z', 'nvd_published_at': '2020-04-07T18:15:00Z'} |
1.4.0 | GHSA-6vvh-5794-vpmj | 2022-01-04T18:57:26Z | 2021-12-17T20:40:58Z | null | ['CVE-2020-35216'] | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages. | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35216'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1woXwR3vciv7ltFan6LyK5vsWXmaUi8ArZonhk80Gr5U/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}] | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T15:12:52Z', 'nvd_published_at': '2021-12-16T20:15:00Z'} |
1.4.0 | GHSA-2v5j-q74q-r53f | 2021-12-03T15:19:07Z | 2021-12-03T20:42:26Z | null | ['CVE-2021-3994'] | django-helpdesk is vulnerable to Cross-site Scripting | django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-helpdesk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3994'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-helpdesk/django-helpdesk'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:21:25Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-7rpj-hg47-cx62 | 2023-03-21T16:18:09Z | 2021-12-16T14:29:57Z | null | ['CVE-2021-23463'] | Improper Restriction of XML External Entity Reference in com.h2database:h2. | H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.198'}, {'fixed': '2.0.202'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/issues/3195'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3199'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3199#issuecomment-1002830390'}, {'type': 'WEB', 'url': 'https://github.com/boris-unckel/h2database/commit/f9ad6aef2bfa59eba2b4d3e7c4c32d2cce8e8b05'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/h2database/h2database/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0010/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:17:37Z', 'nvd_published_at': '2021-12-10T20:15:00Z'} |
1.4.0 | GHSA-r3gr-cxrf-hg25 | 2022-02-08T22:01:01Z | 2021-12-09T19:15:11Z | null | ['CVE-2020-35491'] | Serialization gadgets exploit in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35491'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2986'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502', 'CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:05:38Z', 'nvd_published_at': '2020-12-17T19:15:00Z'} |
1.4.0 | GHSA-fj7f-vq84-fh43 | 2021-12-14T15:31:09Z | 2021-12-08T19:51:36Z | null | ['CVE-2021-43809'] | Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile. | In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false.
To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the
commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables.
Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.
### Exploitation
To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL
will be used to construct a Git clone command but will be interpreted as the [upload-pack](https://git-scm.com/docs/git-clone#Documentation/git-clone.txt--ultupload-packgt) argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside.
### Impact
This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the `Gemfile` (although they would need the weird URL with a leading dash to not raise any flags).
This kind of attack vector [has been used in the past](https://www.cnbc.com/2021/01/26/north-korean-hackers-targeting-security-researchers-on-twitter.html) to target security researchers by sending them projects to collaborate on.
### Patches
Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue.
### Workarounds
Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code.
### References
https://cwe.mitre.org/data/definitions/88.html | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.33'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/pull/5142'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2021-43809.yml'}] | {'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:33:42Z', 'nvd_published_at': '2021-12-08T19:15:00Z'} |
1.4.0 | GHSA-g7mq-rfj2-25wq | 2023-09-11T16:19:43Z | 2021-12-10T17:26:33Z | null | ['CVE-2021-23390'] | Code Injection in total4 | The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the `U.set()` and `U.get()` functions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'total4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.43'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23390'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/commit/8a72d8c20f38bbcac031a76a51238aa528f68821'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/blob/master/utils.js%23L5430-L5455'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:43:28Z', 'nvd_published_at': '2021-07-12T16:15:00Z'} |
1.4.0 | GHSA-9gph-22xh-8x98 | 2023-09-14T16:07:39Z | 2021-12-09T19:15:54Z | null | ['CVE-2020-36179'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36179'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:47Z', 'nvd_published_at': '2021-01-07T00:15:00Z'} |
1.4.0 | GHSA-xr38-w74q-r8jv | 2021-12-06T23:56:39Z | 2021-12-06T23:57:59Z | null | ['CVE-2021-43781'] | Permissions not properly checked in Invenio-Drafts-Resources | ### Impact
Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public.
### Details
The service's ``publish()`` method contains the following permission check:
```python
def publish(..):
self.require_permission(identity, "publish")
```
However, the record should have been passed into the permission check so that the need generators have access to e.g. the record owner.
```python
def publish(..):
self.require_permission(identity, "publish", record=record)
```
The bug is activated in Invenio-RDM-Records which has a need generator called ``RecordOwners()``, which when no record is passed in defaults to allow any authenticated user:
```python
class RecordOwners(Generator):
def needs(self, record=None, **kwargs):
if record is None:
return [authenticated_user]
# ...
```
### Patches
The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6+, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively.
You can verify the version installed of Invenio-Drafts-Resources via PIP:
```console
cd ~/src/my-site
pipenv run pip freeze | grep invenio-drafts-resources
```
### References
- [Security policy](https://invenio.readthedocs.io/en/latest/community/security-policy.html)
### For more information
If you have any questions or comments about this advisory:
* Chat with us on Discord: https://discord.gg/8qatqBC
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'invenio-drafts-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-app-rdm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-rdm-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.32.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-drafts-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-rdm-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.0'}, {'fixed': '0.33.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43781'}, {'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'}] | {'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:15:02Z', 'nvd_published_at': '2021-12-06T18:15:00Z'} |
1.4.0 | GHSA-p6xc-xr62-6r2g | 2022-08-11T21:38:34Z | 2021-12-18T18:00:07Z | null | ['CVE-2021-45105'] | Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.
# Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.12.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45105'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211218-0001/'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5024'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1541/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/19/1'}] | {'cwe_ids': ['CWE-20', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-18T17:59:37Z', 'nvd_published_at': '2021-12-18T12:15:00Z'} |
1.4.0 | GHSA-945q-ch46-pchg | 2022-06-22T18:29:35Z | 2021-12-01T00:00:40Z | null | ['CVE-2021-22095'] | Deserialization of Untrusted Data in Spring AMQP | In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22095'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22097'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:29:35Z', 'nvd_published_at': '2021-11-30T19:15:00Z'} |
1.4.0 | GHSA-8c4j-34r4-xr8g | 2023-09-14T16:13:00Z | 2021-12-09T19:16:18Z | null | ['CVE-2020-36180'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36180'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:36:46Z', 'nvd_published_at': '2021-01-07T00:15:00Z'} |
1.4.0 | GHSA-pmfr-63c2-jr5c | 2023-01-20T22:02:58Z | 2021-12-20T18:24:30Z | null | ['CVE-2020-13845'] | Execution Control List (ECL) Is Insecure in Singularity | ### Impact
The Singularity Execution Control List (ECL) allows system administrators to set up a policy that defines rules about what signature(s) must be (or must not be) present on a SIF container image for it to be permitted to run.
In Singularity 3.x versions below 3.6.0, the following issues allow the ECL to be bypassed by a malicious user:
* Image integrity is not validated when an ECL policy is enforced.
* The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature. Thus, it is trivial to craft an arbitrary payload which will be permitted to run, even if the attacker does not have access to the private key associated with the fingerprint(s) configured in the ECL.
### Patches
These issues are addressed in Singularity 3.6.0.
All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0.
Version 3.6.0 includes a `legacyinsecure` option that can be set to `legacyinsecure = true` in `ecl.toml` to allow the ECL to perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. The option should be used only to temporarily ease the transition to containers signed with the new 3.6.0 signature format.
### Workarounds
This issue affects any installation of Singularity configured to use the Execution Control List (ECL) functionality. There is no workaround if ECL is required.
### For more information
General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:
* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)
Any sensitive security concerns should be directed to: security@sylabs.io
See our Security Policy here: https://sylabs.io/security-policy | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13845'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html'}] | {'cwe_ids': ['CWE-347', 'CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:13:13Z', 'nvd_published_at': '2020-07-14T18:15:00Z'} |
1.4.0 | GHSA-ph98-v78f-jqrm | 2021-12-14T15:25:41Z | 2021-12-14T21:08:13Z | null | ['CVE-2021-43822'] | SQL injection in jackalope/jackalope-doctrine-dbal | ### Impact
Users can provoke SQL injections if they can specify a node name or query.
### Patches
Upgrade to version 1.7.4
If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`.
### Workarounds
Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection.
If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected.
### References
No further references.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jackalope/jackalope-doctrine-dbal repo](https://github.com/jackalope/jackalope-doctrine-dbal/issues)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'jackalope/jackalope-doctrine-dbal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43822'}, {'type': 'WEB', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}, {'type': 'PACKAGE', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:25:41Z', 'nvd_published_at': '2021-12-13T20:15:00Z'} |
1.4.0 | GHSA-v4cr-m5f8-gxw8 | 2021-12-15T15:20:43Z | 2021-12-16T14:14:56Z | null | ['CVE-2021-4092'] | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF) | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:08:25Z', 'nvd_published_at': '2021-12-11T14:15:00Z'} |
1.4.0 | GHSA-pfmw-vj74-ph8g | 2022-08-10T23:48:33Z | 2021-12-02T17:48:30Z | null | ['CVE-2021-43998'] | HashiCorp Vault Incorrect Permission Assignment for Critical Resource | HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43998'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-30-vaults-templated-acl-policies-matched-first-created-alias-per-entity-and-auth-backend/32132'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}] | {'cwe_ids': ['CWE-732'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T18:25:18Z', 'nvd_published_at': '2021-11-30T15:15:00Z'} |
1.4.0 | GHSA-j7px-6hwj-hpjg | 2021-05-24T21:05:58Z | 2021-12-20T17:59:10Z | null | ['CVE-2020-11053'] | Open Redirect in OAuth2 Proxy | ### Impact
As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access.
This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.
However, by crafting a redirect URL with HTML encoded whitespace characters (eg. `%0a`, `%0b`,`%09`,`%0d`) the validation could be bypassed and allow a redirect to any URL provided.
### Patches
@rootxharsh and @iamnoooob provided this patch as potential solution:
```
From 4b941f56eda310b5c4dc8080b7635a6bfabccad4 Mon Sep 17 00:00:00 2001
From: Harsh Jaiswal <harsh@pop-os.localdomain>
Date: Fri, 1 May 2020 20:38:31 +0530
Subject: [PATCH] Fixes redirect issue
---
oauthproxy.go | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/oauthproxy.go b/oauthproxy.go
index 1e9bb7c..f8beb4d 100644
--- a/oauthproxy.go
+++ b/oauthproxy.go
@@ -577,8 +577,9 @@ func validOptionalPort(port string) bool {
// IsValidRedirect checks whether the redirect URL is whitelisted
func (p *OAuthProxy) IsValidRedirect(redirect string) bool {
+ matched, _ := regexp.MatchString(`^/\s+/|\\`, redirect)
switch {
- case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !strings.HasPrefix(redirect, "/\\"):
+ case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !matched:
return true
case strings.HasPrefix(redirect, "http://") || strings.HasPrefix(redirect, "https://"):
redirectURL, err := url.Parse(redirect)
--
2.17.1
```
This issue was also reported to us separately by @mik317 several hours later
The fix was implemented in [#xxx]() and released as version 5.1.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-j7px-6hwj-hpjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11053'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43'}] | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:05:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f9xh-2qgp-cq57 | 2023-09-14T16:03:37Z | 2021-12-09T19:16:42Z | null | ['CVE-2020-36188'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36188'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2996'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/33d96c13fe18a2dad01b19ce195548c9acea9da4'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:25:02Z', 'nvd_published_at': '2021-01-06T23:15:00Z'} |
1.4.0 | GHSA-2hfj-cxw7-g45p | 2022-01-04T18:54:05Z | 2021-12-14T21:48:16Z | null | ['CVE-2021-39183'] | Unsafe inline XSS in pasting DOM element into chat | ### Impact
Inline scripts are executed when Javascript is parsed via a paste action.
1. Open https://watch.owncast.online/
2. Copy and then paste `<img src=null onerror=alert('hello')>` into the
chat field.
3. An alert should pop up.
### Patches
```
⋮ 13 │ // Content security policy
⋮ 14 │ csp := []string{
⋮ 15 │ "script-src 'self' 'sha256-2HPCfJIJHnY0NrRDPTOdC7AOSJIcQyNxzUuut3TsYRY='",
⋮ 16 │ "worker-src 'self' blob:", // No single quotes around blob:
⋮ 17 │ }
```
Will be patched in 0.0.9 by blocking `unsafe-inline` Content Security Policy and specifying the `script-src`. The `worker-src` is required to be set to `blob` for the video player.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [owncast/owncast](https://github.com/owncast/owncast/issues)
* Email us at [gabek@real-ity.com](mailto:gabek@real-ity.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/owncast/owncast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39183'}, {'type': 'PACKAGE', 'url': 'https://github.com/owncast/owncast'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T20:16:10Z', 'nvd_published_at': '2021-12-14T20:15:00Z'} |
1.4.0 | GHSA-rxch-gp62-574w | 2022-01-04T19:01:10Z | 2021-12-16T14:13:27Z | null | ['CVE-2021-4108'] | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4108'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:11:10Z', 'nvd_published_at': '2021-12-14T20:15:00Z'} |
1.4.0 | GHSA-q54r-r9pr-w7qv | 2023-09-13T19:55:33Z | 2021-12-01T18:27:44Z | null | ['CVE-2021-25987'] | Hexo Vulnerable to XSS | Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'hexo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25987'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/issues/4838'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/pull/4750'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}, {'type': 'PACKAGE', 'url': 'https://github.com/hexojs/hexo'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T16:15:32Z', 'nvd_published_at': '2021-11-30T14:15:00Z'} |
1.4.0 | GHSA-5xjx-4xcm-hpcm | 2022-07-05T18:01:53Z | 2021-12-10T18:53:42Z | null | ['CVE-2021-23403'] | Prototype Pollution in ts-nodash | `ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'ts-nodash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403'}, {'type': 'WEB', 'url': 'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5'}, {'type': 'PACKAGE', 'url': 'https://github.com/BadOPCode/NoDash'}, {'type': 'WEB', 'url': 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T14:35:53Z', 'nvd_published_at': '2021-07-02T17:15:00Z'} |
1.4.0 | GHSA-hcxx-mp6g-6gr9 | 2021-12-14T15:51:41Z | 2021-12-14T21:43:48Z | null | ['CVE-2018-16153'] | Opencast publishes global system account credentials | The issue was mostly mitigated before, drastically reducing the risk. See references below for more information.
### Impact
Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials, regardless of the target being part of the Opencast cluster or not.
Previous mitigations already prevented clear text authentications for such requests (e.g. HTTP Basic authentication), but with enough malicious intent, even hashed credentials can be broken.
### Patches
Opencast 10.6 will now send authentication requests only against servers which are part of the Opencast cluster, preventing external services from getting any form of authentication attempt in the first place.
### Workarounds
No workaround available.
### References
- [Patch fixing the issue](https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51)
- [Original security notice](https://groups.google.com/a/opencast.org/g/security-notices/c/XRZzRiqp-NE)
- [Original security mitigation](https://github.com/opencast/opencast/commit/fe8c3d3a60dc5869b468957270dbad5f8c30ead6)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
- Email us at [security@opencast.org](mailto:security@opencast.org)
| [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}] | {'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:51:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qrmm-w75w-3wpx | 2022-05-26T20:08:34Z | 2021-12-09T19:08:38Z | null | [] | Server side request forgery in SwaggerUI | SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered.
However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances.
An example scenario abusing this functionality could take the following form:
- `https://example.com/api-docs` hosts a version of SwaggerUI with `?url=` query parameter enabled.
- Users will trust the domain `https://example.com` and the contents of the OpenAPI definition.
- A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at `https://evildomain`.
- Users mistakenly click a phishing URL like `https://example.com/api-docs?url=https://evildomain/fakeapi.yaml` and enters sensitive data via the "Try-it-out" feature.
We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is *not* possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism.
### Resolution
We've made the decision to [disable query parameters (#4872)](https://github.com/swagger-api/swagger-ui/issues/4872) by default starting with SwaggerUI version `4.1.3`. Please update to this version when it becomes available (**ETA: 2021 December**). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites.
### Workaround
If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code:
```js
SwaggerUI({
// ...other configuration options,
plugins: [function UrlParamDisablePlugin() {
return {
statePlugins: {
spec: {
wrapActions: {
// Remove the ?url parameter from loading an external OpenAPI definition.
updateUrl: (oriAction) => (payload) => {
const url = new URL(window.location.href)
if (url.searchParams.has('url')) {
url.searchParams.delete('url')
window.location.replace(url.toString())
}
return oriAction(payload)
}
}
}
}
}
}],
})
```
### Future UX work
Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the "Execute" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community.
## Reflected XSS attack
**Warning** in versions < 3.38.0, it is possible to combine the URL options (as mentioned above) with a vulnerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than 3.38.0, we suggest you upgrade or implement the workaround as mentioned above.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'swagger-ui-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'swagger-ui-react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Swashbuckle.AspNetCore.SwaggerUI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/4872'}, {'type': 'WEB', 'url': 'https://github.com/domaindrivendev/Swashbuckle.AspNetCore/commit/401c7cb81e5efe835ceb8aae23e82057d57c7d29'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:49:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m9hp-7r99-94h5 | 2021-05-21T20:49:36Z | 2021-12-20T17:53:53Z | null | ['CVE-2020-26290'] | Critical security issues in XML encoding in github.com/dexidp/dex | ### Impact
The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector:
Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
`encoding/xml` instabilities:
- [Element namespace prefix instability (CVE-2020-29511)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md)
- [Attribute namespace prefix instability (CVE-2020-29509)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md)
- [Directive comment instability (CVE-2020-29510)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md)
### Patches
Immediately update to [Dex v2.27.0](https://github.com/dexidp/dex/releases/tag/v2.27.0).
### Workarounds
There are no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex/connector/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.27.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/releases/tag/v2.27.0'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0050'}] | {'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:49:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-25mp-g6fv-mqxx | 2022-04-07T16:06:54Z | 2021-12-07T21:12:09Z | null | ['CVE-2021-43803'] | Unexpected server crash in Next.js. | Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package `next` hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.9'}, {'fixed': '11.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43803'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/32080'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v11.1.3'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/v12.0.5'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T19:17:55Z', 'nvd_published_at': '2021-12-10T00:15:00Z'} |
1.4.0 | GHSA-3w6p-8f82-gw8r | 2021-12-17T20:34:04Z | 2021-12-17T20:42:38Z | null | [] | Using JMSAppender in log4j configuration may lead to deserialization of untrusted data | ### Impact
ClickHouse JDBC Bridge uses [slf4j-log4j12 1.7.32](https://repo1.maven.org/maven2/org/slf4j/slf4j-log4j12/1.7.32/), which depends on [log4j 1.2.17](https://repo1.maven.org/maven2/log4j/log4j/1.2.17/). It allows a remote attacker to execute code on the server, if you changed default log4j configuration by adding JMSAppender and an insecure JMS broker.
### Patches
The patch version `2.0.7` removed log4j dependency by replacing `slf4j-log4j12` to `slf4j-jdk14`. Logging configuration is also changed from `log4j.properties` to `logging.properties`.
### Workarounds
1. Do NOT change log4j configuration to use JMSAppender along with insecure JMS broker
2. Alternatively, you can issue below command to remove `JMSAppender.class`:
```(bash)
# install zip command if you don't have
apt-get update && apt-get install -y zip
# remove the class
zip -d clickhouse-jdbc-bridge*.jar ru/yandex/clickhouse/jdbcbridge/internal/log4j/net/JMSAppender.class
```
### References
Please refer to [CVE-2021-4104](https://access.redhat.com/security/cve/CVE-2021-4104) to read more.
### For more information
If you have any questions or comments about this advisory, please feel free to open an issue in the repository.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ru.yandex.clickhouse:clickhouse-jdbc-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ClickHouse/clickhouse-jdbc-bridge/security/advisories/GHSA-3w6p-8f82-gw8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4104'}, {'type': 'PACKAGE', 'url': 'https://github.com/ClickHouse/clickhouse-jdbc-bridge'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T20:34:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5r5r-6hpj-8gg9 | 2022-02-08T21:39:40Z | 2021-12-09T19:15:24Z | null | ['CVE-2020-35728'] | Serialization gadget exploit in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35728'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2999'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210129-0007/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:24:20Z', 'nvd_published_at': '2020-12-27T05:15:00Z'} |
1.4.0 | GHSA-vm5j-vqr6-v7v8 | 2021-05-25T20:40:19Z | 2021-12-10T20:04:56Z | null | ['CVE-2020-7640'] | OS Command Injection in pixl-class | pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'pixl-class'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640'}, {'type': 'WEB', 'url': 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}, {'type': 'WEB', 'url': 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:40:19Z', 'nvd_published_at': '2020-04-27T22:15:00Z'} |
1.4.0 | GHSA-m4h3-7mc2-v295 | 2022-01-04T19:00:33Z | 2021-12-17T20:41:21Z | null | ['CVE-2020-35214'] | An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations. | An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35214'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:11:26Z', 'nvd_published_at': '2021-12-16T20:15:00Z'} |
1.4.0 | GHSA-5fh3-25xr-g85h | 2021-12-03T15:19:38Z | 2021-12-03T20:40:50Z | null | ['CVE-2021-4018'] | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4018'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/ff81e6d5366c2cfb15618793ad919ae4cbb3ac57'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it/'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:24:35Z', 'nvd_published_at': '2021-12-01T10:15:00Z'} |
1.4.0 | GHSA-7prf-vw4p-qr59 | 2021-06-22T15:45:35Z | 2021-12-10T19:03:07Z | null | ['CVE-2020-24939'] | Prototype pollution in supermixer | Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'supermixer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/959987'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:46:22Z', 'nvd_published_at': '2021-06-16T16:15:00Z'} |
1.4.0 | GHSA-cvm9-fjm9-3572 | 2023-09-14T16:06:24Z | 2021-12-09T19:16:10Z | null | ['CVE-2020-36181'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36181'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:23Z', 'nvd_published_at': '2021-01-06T23:15:00Z'} |
1.4.0 | GHSA-cxg7-84wp-8pcq | 2022-08-11T18:47:07Z | 2021-12-16T21:01:07Z | null | ['CVE-2021-4117'] | YetiForceCRM is vulnerable to Business Logic Errors in the weight of a product | YetiForceCRM is vulnerable to Business Logic Errors in the Weight of a Product since that value can be a negative number. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:39:07Z', 'nvd_published_at': '2021-12-15T15:15:00Z'} |
1.4.0 | GHSA-6gww-qpm6-mc2g | 2021-11-29T15:08:38Z | 2021-12-02T17:51:51Z | null | ['CVE-2021-23718'] | Server-Side Request Forgery in ssrf-agent | The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ssrf-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718'}, {'type': 'WEB', 'url': 'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'}, {'type': 'PACKAGE', 'url': 'https://github.com/welefen/ssrf-agent'}, {'type': 'WEB', 'url': 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211203-0005/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T19:15:40Z', 'nvd_published_at': '2021-11-22T17:15:00Z'} |
1.4.0 | GHSA-hjhp-hwfj-hwf3 | 2021-12-06T21:43:09Z | 2021-12-10T20:20:08Z | null | ['CVE-2021-4005'] | Cross Site Request Forgery in firefly-iii | firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4005'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:43:09Z', 'nvd_published_at': '2021-12-04T12:15:00Z'} |
1.4.0 | GHSA-c6c4-jmqx-3r33 | 2021-05-25T16:23:58Z | 2021-12-09T19:30:14Z | null | ['CVE-2020-11611'] | Open Redirect in xdLocalStorage | An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11611'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:23:58Z', 'nvd_published_at': '2020-04-07T18:15:00Z'} |
1.4.0 | GHSA-4f6x-49g2-99fm | 2021-07-02T16:59:18Z | 2021-12-10T18:57:41Z | null | ['CVE-2021-35513'] | Cross-site Scripting in Mermaid | Mermaid before 8.11.0 allows XSS when the antiscript feature is used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/issues/2122'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/pull/2123'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T18:34:26Z', 'nvd_published_at': '2021-06-27T12:15:00Z'} |
1.4.0 | GHSA-w6v2-qchm-grj7 | 2021-05-24T17:12:01Z | 2021-12-20T18:25:46Z | null | ['CVE-2020-25039'] | Insecure permissions on user namespace / fakeroot temporary rootfs in Singularity | ### Impact
Insecure permissions on temporary directories used in fakeroot or user namespace container execution.
When a Singularity action command (run, shell, exec) is run with the fakeroot or user namespace option, Singularity will extract a container image to a temporary sandbox directory. Due to insecure permissions on the temporary directory it is possible for any user with access to the system to read the contents of the image. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running container.
### Patches
This issue is addressed in Singularity 3.6.3.
All users are advised to upgrade to 3.6.3.
### Workarounds
The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation.
### For more information
General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:
* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)
Any sensitive security concerns should be directed to: security@sylabs.io
See our Security Policy here: https://sylabs.io/security-policy | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.6.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25039'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html'}] | {'cwe_ids': ['CWE-668', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:12:01Z', 'nvd_published_at': '2020-09-16T18:15:00Z'} |
1.4.0 | GHSA-h86j-6h6m-qjqw | 2021-12-09T17:55:01Z | 2021-12-10T20:26:34Z | null | ['CVE-2021-4049'] | Cross-Site Request Forgery in remdex/livehelperchat | An attacker is able to log out a user if a logged-in user visits the attacker's website. While this cannot harm a user's account, it can be a great annoyance and is a valid CSRF. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4049'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e'}] | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:27:25Z', 'nvd_published_at': '2021-12-07T11:15:00Z'} |
1.4.0 | GHSA-jfh8-c2jp-5v3q | 2022-03-25T20:56:18Z | 2021-12-10T00:40:56Z | null | ['CVE-2021-44228'] | Remote code injection in Log4j | # Summary
Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.
As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default.
Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory.
# Impact
Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input.
# Affected versions
Any Log4J version prior to v2.15.0 is affected to this specific issue.
The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible.
## Security releases
Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3
## Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
# Remediation Advice
## Updated advice for version 2.16.0
The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0).
Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33).
Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221).
Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.15.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'fixed': '2.12.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.guicedee.services:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1.2-jre17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xbib.elasticsearch:log4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['6.3.2.1']}, {'package': {'ecosystem': 'Maven', 'name': 'uk.co.nichesolutions.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['2.6.3-CUSTOM']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/apache/logging-log4j2/pull/608'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7rjr-3q55-vv33'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://github.com/cisagov/log4j-affected-db'}, {'type': 'WEB', 'url': 'https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/tangxiaofeng7/apache-log4j-poc'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3198'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3201'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3214'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3221'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/manual/migration.html'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211210-0007/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213189'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://twitter.com/kurtseifried/status/1469345530182455296'}, {'type': 'WEB', 'url': 'https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5020'}, {'type': 'WEB', 'url': 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Dec/2'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Mar/23'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/13/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/15/3'}] | {'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-502', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T00:40:41Z', 'nvd_published_at': '2021-12-10T10:15:00Z'} |
1.4.0 | GHSA-9m6f-7xcq-8vf8 | 2023-09-14T16:15:43Z | 2021-12-09T19:16:34Z | null | ['CVE-2020-36183'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.00'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36183'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3003'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/12e23c962ffb4cf1857c5461d72ae54cc8008f29'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:27:59Z', 'nvd_published_at': '2021-01-07T00:15:00Z'} |
1.4.0 | GHSA-2v2v-fx7r-f2fh | 2021-12-14T14:45:36Z | 2021-12-16T14:28:10Z | null | ['CVE-2021-4082'] | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:45:36Z', 'nvd_published_at': '2021-12-10T11:15:00Z'} |
1.4.0 | GHSA-7qm6-9v49-38m9 | 2023-09-11T18:40:49Z | 2021-12-10T18:55:39Z | null | ['CVE-2021-23402'] | Prototype Pollution in record-like-deep-assign | All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality.
### PoC
```js
const deepAssign = require('record-like-deep-assign');
let obj = {};
console.log("Before being polluted: " + obj.polluted);
EVIL_JSON = JSON.parse('{"__proto__":{"polluted":true}}');
deepAssign({}, EVIL_JSON);
console.log("After being polluted: " + obj.polluted);
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'record-like-deep-assign'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23402'}, {'type': 'PACKAGE', 'url': 'https://github.com/kripod/record-like-deep-assign'}, {'type': 'WEB', 'url': 'https://github.com/kripod/record-like-deep-assign/blob/v1.0.1/src/mod.ts%23L17-L35'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T14:32:33Z', 'nvd_published_at': '2021-07-02T16:15:00Z'} |
1.4.0 | GHSA-c69w-jj56-834w | 2022-01-04T19:09:34Z | 2021-12-16T14:12:49Z | null | ['CVE-2021-44549'] | Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Apache Sling Commons Messaging Mail | Apache Sling Commons Messaging Mail provides a simple layer on top of JavaMail/Jakarta Mail for OSGi to send mails via SMTPS. To reduce the risk of "man in the middle" attacks additional server identity checks must be performed when accessing mail servers. For compatibility reasons these additional checks are disabled by default in JavaMail/Jakarta Mail. The SimpleMailService in Apache Sling Commons Messaging Mail 1.0 lacks an option to enable these checks for the shared mail session. A user could enable these checks nevertheless by accessing the session via the message created by SimpleMessageBuilder and setting the property mail.smtps.ssl.checkserveridentity to true. Apache Sling Commons Messaging Mail 2.0 adds support for enabling server identity checks and these checks are enabled by default. - https://javaee.github.io/javamail/docs/SSLNOTES.txt - https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html - https://github.com/eclipse-ee4j/mail/issues/429 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.commons.messaging.mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44549'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mail/issues/429'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j'}, {'type': 'WEB', 'url': 'https://javaee.github.io/javamail/docs/SSLNOTES.txt'}, {'type': 'WEB', 'url': 'https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l8p9h2bqvkj6rhv4w8kzctb817415b7f'}] | {'cwe_ids': ['CWE-295', 'CWE-297'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:15:17Z', 'nvd_published_at': '2021-12-14T16:15:00Z'} |
1.4.0 | GHSA-x68c-4gmm-5g43 | 2021-12-03T15:19:53Z | 2021-12-03T20:40:38Z | null | ['CVE-2021-3985'] | kimai2 is vulnerable to Cross-site Scripting | kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:25:44Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-9c4x-5hgq-q3wh | 2021-12-14T15:32:21Z | 2021-12-08T19:52:40Z | null | ['CVE-2021-41090'] | Instance config inline secret exposure in Grafana | ### Impact
Some inline secrets are exposed in plaintext over the Grafana Agent HTTP server:
* Inline secrets for metrics instance configs in the base YAML file are exposed at `/-/config`
* Inline secrets for integrations are exposed at `/-/config`
* Inline secrets for Consul ACL tokens and ETCD basic auth when configured for the scraping service at `/-/config`.
* Inline secrets for the Kafka receiver for OpenTelemetry-Collector tracing at `/-/config`.
* Inline secrets for metrics instance configs loaded from the scraping service are exposed at `/agent/api/v1/configs/{name}`.
Inline secrets will be exposed to anyone being able to reach these endpoints.
Secrets found in these sections are used for:
* Delivering metrics to a Prometheus Remote Write system
* Authenticating against a system for discovering Prometheus targets
* Authenticating against a system for collecting metrics (scrape_configs and integrations)
* Authenticating against a Consul or ETCD for storing configurations to distribute in scraping service mode
* Authenticating against Kafka for receiving traces
Non-inlined secrets, such as `*_file`-based secrets, are not impacted by this vulnerability.
### Patches
Download [v0.20.1](https://github.com/grafana/agent/releases/tag/v0.20.1) or any version past [v0.21.2](https://github.com/grafana/agent/releases/tag/v0.21.2) to patch Grafana Agent. These patches obfuscate the listed impacted secrets from the vulnerable endpoints.
The patches also disable the endpoints by default. Pass the command-line flag `--config.enable-read-api` to opt-in and re-enable the endpoints.
### Workarounds
If for some reason you cannot upgrade, use non-inline secrets where possible. Not all configuration options may have a non-inline equivalent.
You also may desire to restrict API access to Grafana Agent, with some combination of:
* Restrict network interfaces Grafana Agent listens on through `http_listen_address` in the `server` block. `127.0.0.1` is the most restrictive, `0.0.0.0` is the default.
* Configure Grafana Agent to use HTTPS with client authentication.
* Use firewall rules to restrict external access to Grafana Agent's API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.21.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/grafana/agent/security/advisories/GHSA-9c4x-5hgq-q3wh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41090'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/pull/1152'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/commit/a5479755e946e5c7cddb793ee9adda8f5692ba11'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/agent'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/releases/tag/v0.20.1'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/releases/tag/v0.21.2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0004/'}] | {'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:32:31Z', 'nvd_published_at': '2021-12-08T17:15:00Z'} |
1.4.0 | GHSA-m3rf-7m4w-r66q | 2021-12-09T18:14:23Z | 2021-12-09T19:09:07Z | null | ['CVE-2021-41265'] | Improper Authentication in Flask-AppBuilder | ### Impact
Improper authentication on the REST API. Allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. Only affects non database authentication types, and new REST API endpoints.
### Patches
Upgrade to Flask-AppBuilder 3.3.4
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/dpgaspar/Flask-AppBuilder
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-m3rf-7m4w-r66q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41265'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.4'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:14:23Z', 'nvd_published_at': '2021-12-09T17:15:00Z'} |
1.4.0 | GHSA-9c22-pwxw-p6hx | 2022-11-07T21:13:24Z | 2021-12-14T21:47:33Z | null | ['CVE-2022-39384'] | OpenZeppelin Contracts initializer reentrancy may lead to double initialization | ### Impact
Initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call.
Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution.
Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor.
### Patches
A fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Avoid untrusted external calls during initialization.
### References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006
### Credits
This issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39384'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}] | {'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:22:45Z', 'nvd_published_at': '2022-11-04T22:15:00Z'} |
1.4.0 | GHSA-qxmr-qxh6-2cc9 | 2021-12-08T19:29:13Z | 2021-12-07T22:01:47Z | null | ['CVE-2021-43805'] | ReDos vulnerability on guest checkout email validation | ### Impact
Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`.
Before the patch, it can be reproduced in the console like this:
```ruby
irb(main)> Spree::EmailValidator::EMAIL_REGEXP.match "a@a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.@"
processing time: 54.293660s
=> nil
```
To reproduce in the browser, fill in the "Customer Email" field with that fake email address during a guest checkout. Before that, you should open the browser dev tools and change the `type` attribute for that field from `email` to `text`. After entering a fake address and pressing the "Save & Continue" button, the browser will take a long term to perform the request before showing an error message for the invalid address. Eventually, making the email string even longer could lead to the exhaustion of server resources.
### Patches
Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression.
There's an improbable chance that some orders in your system end up having associated an email address that is no longer valid. We've added a task to check precisely that:
```bash
bin/rails solidus:check_orders_with_invalid_email
```
The above will print information for every affected order if any.
### Workarounds
If a prompt upgrade is not an option, please, add the following to `config/application.rb`:
```ruby
config.after_initialize do
Spree::EmailValidator.send(:remove_const, :EMAIL_REGEXP)
Spree::EmailValidator::EMAIL_REGEXP = URI::MailTo::EMAIL_REGEXP
end
```
### References
- https://en.wikipedia.org/wiki/ReDoS
- https://snyk.io/blog/redos-and-catastrophic-backtracking/
### For more information
If you have any questions or comments about this advisory:
* Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus.
* Email us at [security@solidus.io](mailto:security@soliidus.io)
* Contact the core team on [Slack](http://slack.solidus.io/)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_core/CVE-2021-43805.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T20:58:37Z', 'nvd_published_at': '2021-12-07T18:15:00Z'} |
1.4.0 | GHSA-q6gq-997w-f55g | 2021-06-18T22:05:40Z | 2021-12-16T19:16:40Z | null | ['CVE-2020-16845'] | Infinite loop in xz | Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ulikunitz/xz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16845'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200924-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4848'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T22:05:40Z', 'nvd_published_at': '2020-08-06T18:15:00Z'} |
1.4.0 | GHSA-wjpc-cgvw-xx23 | 2023-09-08T21:04:57Z | 2021-12-16T14:29:34Z | null | ['CVE-2021-23663'] | Prototype Pollution in sey | All versions of package `sey` are vulnerable to Prototype Pollution via the `deepmerge()` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'sey'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23663'}, {'type': 'PACKAGE', 'url': 'https://github.com/eserozvataf/sey'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEY-1727592'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:35:47Z', 'nvd_published_at': '2021-12-10T20:15:00Z'} |
1.4.0 | GHSA-mf27-wg66-m8f5 | 2022-01-04T18:57:49Z | 2021-12-17T20:41:09Z | null | ['CVE-2020-35210'] | A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages. | A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35210'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T17:20:09Z', 'nvd_published_at': '2021-12-16T20:15:00Z'} |
1.4.0 | GHSA-qjw2-hr98-qgfh | 2022-04-08T22:16:20Z | 2021-12-09T19:15:36Z | null | ['CVE-2020-24750'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.6.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2798'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/6cc9f1a1af323cd156f5668a47e43bab324ae16f'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201009-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:41:09Z', 'nvd_published_at': '2020-09-17T19:15:00Z'} |
1.4.0 | GHSA-vxr4-rxw7-g7v6 | 2023-09-11T16:21:17Z | 2021-12-16T14:30:56Z | null | ['CVE-2021-23561'] | Prototype Pollution in comb | All versions of package comb are vulnerable to Prototype Pollution via the `deepMerge()` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'comb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23561'}, {'type': 'PACKAGE', 'url': 'https://github.com/C2FO/comb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMB-1730083'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:30:03Z', 'nvd_published_at': '2021-12-10T20:15:00Z'} |
1.4.0 | GHSA-ggmr-44cv-24pm | 2021-12-08T23:14:41Z | 2021-12-09T18:35:22Z | null | ['CVE-2021-43811'] | Code injection via unsafe YAML loading | ### Impact
Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files.
An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally.
### Patches
The issue is fixed in version 2.3.24 and above by #964.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [awslabs/sockeye](https://github.com/awslabs/sockeye)
* Email us at [sockeye-dev](mailto:sockeye-dev@amazon.com)
### Attribution
This vulnerability was reported by Masatoshi Yoshizawa of yamory Security Team. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sockeye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.24'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/security/advisories/GHSA-ggmr-44cv-24pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43811'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/pull/964'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/sockeye'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/releases/tag/2.3.24'}] | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T23:14:41Z', 'nvd_published_at': '2021-12-08T23:15:00Z'} |
1.4.0 | GHSA-vj54-cjrx-x696 | 2023-09-29T17:24:54Z | 2021-12-09T19:59:24Z | null | ['CVE-2020-11576'] | Observable Discrepancy in Argo | Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise.
### Specific Go Packages Affected
github.com/argoproj/argo-cd/util/session
github.com/argoproj/argo-cd/server/session | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11576'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/3215'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}] | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T18:19:26Z', 'nvd_published_at': '2020-04-08T18:15:00Z'} |
1.4.0 | GHSA-89qr-369f-5m5x | 2023-09-14T16:08:36Z | 2021-12-09T19:15:46Z | null | ['CVE-2020-36182'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36182'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:58Z', 'nvd_published_at': '2021-01-07T00:15:00Z'} |
1.4.0 | GHSA-3p85-p4qg-hcrp | 2021-12-14T15:06:00Z | 2021-12-16T14:27:58Z | null | ['CVE-2021-4081'] | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:06:00Z', 'nvd_published_at': '2021-12-10T11:15:00Z'} |
1.4.0 | GHSA-97cc-825c-399g | 2021-12-09T18:07:18Z | 2021-12-10T20:33:29Z | null | ['CVE-2021-4050'] | Cross site scripting in remdex/livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4050'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:07:18Z', 'nvd_published_at': '2021-12-08T11:15:00Z'} |
1.4.0 | GHSA-6w7g-p4jh-rf92 | 2023-01-20T22:03:21Z | 2021-12-20T18:24:43Z | null | ['CVE-2020-13846'] | "Verify All" Returns Success Despite Validation Failures in Singularity | ### Impact
The `--all / -a` option to `singularity verify` returns success even when some objects in a SIF container are not signed, or cannot be verified.
The SIF objects that are not verified are reported in `WARNING` log messages, but a `Container Verified` message and exit code of `0` are returned.
Workflows that verify a container using `--all / -a` and use the exit code as an indicator of success are vulnerable to running SIF containers that have unsigned, or modified, objects that may be exploited to introduce malicious behavior.
```
$ singularity verify -a image.sif
WARNING: Missing signature for SIF descriptor 2 (JSON.Generic)
WARNING: Missing signature for SIF descriptor 3 (FS)
Container is signed by 1 key(s):
Verifying partition: Def.FILE:
12045C8C0B1004D058DE4BEDA20C27EE7FF7BA84
[LOCAL] Unit Test <unit@test.com>
[OK] Data integrity verified
INFO: Container verified: image.sif
$ echo $?
0
```
### Patches
Singularity 3.6.0 has a new implementation of sign/verify that fixes this issue.
All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0.
Version 3.6.0 includes a `--legacy-insecure` flag for the `singularity verify` command, that will perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format.
### Workarounds
If you are unable to update to 3.6.0 ensure that you do not rely on the return code of `singularity verify --all / -a` as an indicator of trust in a container.
Note that other issues in the sign/verify implementation in Singularity < 3.6.0 allow additional means to introduce malicious behavior to a signed container.
### For more information
General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:
* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)
Any sensitive security concerns should be directed to: security@sylabs.io
See our Security Policy here: https://sylabs.io/security-policy | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13846'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/singularity'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:12:04Z', 'nvd_published_at': '2020-07-14T18:15:00Z'} |
1.4.0 | GHSA-792j-9wj3-j634 | 2023-09-07T18:46:54Z | 2021-12-10T20:30:52Z | null | ['CVE-2021-44684'] | Command injection in github-todos | naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'github-todos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44684'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/5'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/5'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:28:47Z', 'nvd_published_at': '2021-12-07T00:15:00Z'} |
1.4.0 | GHSA-xmgj-5fh3-xjmm | 2021-12-17T19:34:45Z | 2021-12-17T19:59:13Z | null | ['CVE-2021-43840'] | Path traversal when MessageBus::Diagnostics is enabled | ### Impact
Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels.
### Patches
Patched in 3.3.7.
### Workarounds
Disable MessageBus::Diagnostics in production like environments.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'message_bus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43840'}, {'type': 'WEB', 'url': 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/discourse/message_bus'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/message_bus/CVE-2021-43840.yml'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:34:45Z', 'nvd_published_at': '2021-12-17T19:15:00Z'} |
1.4.0 | GHSA-mh9j-v6mq-pfch | 2022-03-18T15:08:03Z | 2021-12-04T00:00:53Z | null | ['CVE-2021-43676'] | Path manipulation in matyhtf/framework | matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php. The issue was fixed in version 3.0.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'matyhtf/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43676'}, {'type': 'WEB', 'url': 'https://github.com/matyhtf/framework/issues/206'}, {'type': 'WEB', 'url': 'https://github.com/matyhtf/framework/commit/25084603b7ea771eebe263d39744fe6abf1f8d61'}, {'type': 'PACKAGE', 'url': 'https://github.com/matyhtf/framework'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:51:34Z', 'nvd_published_at': '2021-12-03T14:15:00Z'} |
1.4.0 | GHSA-8w26-6f25-cm9x | 2023-09-14T15:52:47Z | 2021-12-09T19:16:02Z | null | ['CVE-2020-36185'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36185'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2998'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/567194c53ae91f0a14dc27239afb739b1c10448a'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:42Z', 'nvd_published_at': '2021-01-06T23:15:00Z'} |
1.4.0 | GHSA-8fp4-rp6c-5gcv | 2021-12-02T21:28:29Z | 2021-12-02T22:25:54Z | null | ['CVE-2021-43795'] | Path Traversal in com.linecorp.armeria:armeria | ### Impact
An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic.
### Patches
Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly.
### Workarounds
This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path, e.g.
```java
Server
.builder()
.serviceUnder(
"/files",
FileService
.of(...)
.decorate((delegate, ctx, req) -> {
String path = req.headers().path();
if (path.contains("%2f") || path.contains("%2F")) {
return HttpResponse.of(HttpStatus.BAD_REQUEST);
}
return delegate.serve(ctx, req);
})
)
.build()
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [line/armeria](https://github.com/line/armeria)
* Chat with us at [Slack](https://armeria.dev/s/slack)
### Credits
This vulnerability was originally reported by Abdallah Zaher ([elcayser-0x0a](https://hackerone.com/elcayser-0x0a?type=user)). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43795'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/pull/3855'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'}, {'type': 'PACKAGE', 'url': 'https://github.com/line/armeria'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:28:29Z', 'nvd_published_at': '2021-12-02T18:15:00Z'} |
1.4.0 | GHSA-g54h-m393-cpwq | 2021-05-24T20:46:53Z | 2021-12-20T18:21:54Z | null | [] | devices resource list treated as a blacklist by default | ### Impact
Contrary to the [OCI runtime specification](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist), `runc`'s implementation of the `linux.resources.devices` list was a black-list by default. This means that users who created their own `config.json` objects and didn't prefix a deny-all rule (`{"allow": false, "permissions": "rwm"}` or equivalent) were not provided protection by the `devices` cgroup. This would allow malicious containers (with sufficient privileges) to create arbitrary device inodes (assuming they have `CAP_MKNOD`) and operate on any device inodes they may have access to (assuming they have regular Unix DAC permissions).
However, most (if not all) programs that make use of `runc` include this deny-all rule. This was most likely added before the specification mandated a white-list of devices, and the fact that all programs wrote their own deny-all rule obscured the existence of this bug for several years. In fact, even the specification's examples include a default deny-all rule! We therefore believe that while this is a security bug (and has been fixed as such), it was almost certainly not exploitable in the wild due to the inclusion of default deny-all rules by all known users of `runc` -- hence why this advisory has low severity.
### Patches
This issue has been fixed in [a patch that was part of a larger rework of the devices cgroup code in runc](https://github.com/opencontainers/runc/pull/2391) -- which lead to the discovery of this security bug. Users should upgrade to 1.0.0-rc91 as soon as it is released, or wait for your distribution to backport the relevant fixes.
### Workarounds
If you are using `runc` directly, ensure that there is a deny-all entry at the beginning of `linux.resources.devices` -- such an entry would look like `{"allow": false, "permissions": "rwm"}` (all other fields are ignored, though `type` must be set to `"a"` or `null` if it is present).
Users which consume `runc` through another program should check whether their containers are operating under a white-list -- this can be done by reading `/sys/fs/cgroup/devices/devices.list` inside the container. If the file contains only the entry `a *:* rwm` (meaning the cgroup is in black-list mode, which likely means "allow all device access") then your containers are vulnerable to this issue.
As always, we recommend **in the strongest possible terms** that all of our users enable user namespaces on all of their workloads (or pressure their vendors to do so). User namespaces are one of the most significant defense-in-depth protections you can enable for containers, and have prevented many container-related vulnerabilities (both kernel 0days as well as bugs in container runtimes, such as this one).
### References
* https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/devices.html
* [opencontainers/runtime-spec/config-linux.md#device-whitelist](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist)
* https://github.com/opencontainers/runc/pull/2391
### For more information
If you have any questions or comments about this advisory:
* [Open an issue in this repo](https://github.com/opencontainers/runc/issues/new).
* Email us at <security@opencontainers.org>. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc91'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc90'}}] | [{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-g54h-m393-cpwq'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:46:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7hpj-hfcr-5qwm | 2021-12-06T18:13:11Z | 2021-12-06T18:17:38Z | null | ['CVE-2019-14867'] | Code injection in FreeIPA | A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.2'}, {'fixed': '4.6.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14867'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:4268'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0378'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/ipa/PYSEC-2019-28.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.6.7'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.7.4'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.8.3'}] | {'cwe_ids': ['CWE-400', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T18:13:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7fm6-gxqg-2pwr | 2021-07-13T19:51:48Z | 2021-12-10T17:26:06Z | null | ['CVE-2021-23389'] | Code Injection in total.js | The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:51:48Z', 'nvd_published_at': '2021-07-12T16:15:00Z'} |
1.4.0 | GHSA-fpfv-jqm9-f5jm | 2022-06-21T20:12:53Z | 2021-12-18T00:00:41Z | null | ['CVE-2021-34141'] | Incorrect Comparison in NumPy | Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34141'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18993'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18993#issuecomment-1010735102'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpfv-jqm9-f5jm'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/numpy/PYSEC-2021-855.yaml'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:12:53Z', 'nvd_published_at': '2021-12-17T19:15:00Z'} |
1.4.0 | GHSA-55x5-fj6c-h6m8 | 2022-08-11T20:41:28Z | 2021-12-13T18:14:36Z | null | ['CVE-2021-43818'] | lxml's HTML Cleaner allows crafted and SVG embedded scripts to pass through | ### Impact
The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs.
Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5.
### Patches
The issue has been resolved in lxml 4.6.5.
### Workarounds
None.
### References
The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/lxml/lxml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-06'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220107-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5043'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-13T18:12:54Z', 'nvd_published_at': '2021-12-13T18:15:00Z'} |
1.4.0 | GHSA-r695-7vr9-jgc2 | 2022-02-08T21:37:40Z | 2021-12-09T19:16:51Z | null | ['CVE-2020-36187'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36187'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2997'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3e8fa3beea49ea62109df9e643c9cb678dabdde1'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:23:27Z', 'nvd_published_at': '2021-01-06T23:15:00Z'} |
1.4.0 | GHSA-j85f-xw9x-ffwp | 2022-01-04T18:52:13Z | 2021-12-17T20:00:12Z | null | ['CVE-2021-4121'] | yetiforcecrm is vulnerable to Cross-site Scripting | yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4121'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/6b5967198e43b6fbb3b2715b49c6cd5b12ce08c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:31:47Z', 'nvd_published_at': '2021-12-16T08:15:00Z'} |
1.4.0 | GHSA-rpg7-q4cv-p466 | 2022-01-04T18:52:37Z | 2021-12-17T20:00:16Z | null | ['CVE-2021-4123'] | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.90'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:29:07Z', 'nvd_published_at': '2021-12-16T10:15:00Z'} |
1.4.0 | GHSA-94g7-hpv8-h9qm | 2021-12-14T20:00:34Z | 2021-12-14T21:46:35Z | null | [] | Remote code injection in Log4j | ### Impact
Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input.
More Details:
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
### Patches
Version 1.11.1 of the Splunk Logging for Java library.
There is also a backport to version 1.6.2 released as a patch: 1.6.2-0-0.
### Workarounds
If upgrading is not possible, then ensure the -Dlog4j2.formatMsgNoLookups=true system property is set on both client- and server-side components.
### References
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/splunk/splunk-library-javalogging/issues
* Email us at [devinfo@splunk.com](mailto:devinfo@splunk.com)
| [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.splunk.logging:splunk-library-javalogging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/splunk/splunk-library-javalogging/security/advisories/GHSA-94g7-hpv8-h9qm'}, {'type': 'PACKAGE', 'url': 'https://github.com/splunk/splunk-library-javalogging'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T20:00:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j28q-p8ww-cp87 | 2021-12-15T15:23:03Z | 2021-12-16T14:33:09Z | null | ['CVE-2021-23700'] | Prototype Pollution in merge-deep2. | All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'merge-deep2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23700'}, {'type': 'PACKAGE', 'url': 'https://github.com/luyuan/merge-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:33:34Z', 'nvd_published_at': '2021-12-10T20:15:00Z'} |
1.4.0 | GHSA-7rg2-qxmf-hhx9 | 2021-12-15T15:28:49Z | 2021-12-09T19:08:58Z | null | ['CVE-2021-41246'] | Session fixation in express-openid-connect | ### Overview
Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities.
### Am I affected?
You are affected by this vulnerability if you are using `express-openid-connect` version `2.3.0` up to and including `2.5.1` and use a custom session store.
### How to fix that?
Upgrade to version `>= 2.5.2`.
### Will this update impact my users?
The fix provided in patch will not affect your users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-openid-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41246'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/express-openid-connect'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:09:56Z', 'nvd_published_at': '2021-12-09T16:15:00Z'} |
1.4.0 | GHSA-2wr2-8qjq-gh55 | 2021-12-06T21:35:33Z | 2021-12-16T15:27:35Z | null | ['CVE-2021-23264'] | Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search | Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23264'}, {'type': 'WEB', 'url': 'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107'}] | {'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:35:33Z', 'nvd_published_at': '2021-12-02T16:15:00Z'} |
1.4.0 | GHSA-p33m-7w7f-gmj8 | 2021-07-29T16:41:29Z | 2021-12-10T20:05:07Z | null | ['CVE-2020-7644'] | Uncontrolled Resource Consumption in fun-map | fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fun-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7644'}, {'type': 'WEB', 'url': 'https://github.com/nathan7/fun-map/blob/master/index.js#L137,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FUNMAP-564436'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:37:47Z', 'nvd_published_at': '2020-04-28T19:15:00Z'} |
1.4.0 | GHSA-6jqj-f58p-mrw3 | 2022-10-06T21:46:48Z | 2021-12-20T18:17:33Z | null | ['CVE-2020-15091'] | Denial of Service in TenderMint | ### Description
**Denial of Service**
Tendermint 0.33.0 and above allow block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it without changing the chainID. (It is a [misconfiguration](https://docs.tendermint.com/master/tendermint-core/using-tendermint.html) to reuse chainIDs.) Correct block proposers will accidentally include signatures for the wrong block if they see these signatures, and then commits won't validate, making all proposed blocks invalid. A malicious validator (even with a minimal amount of stake) can use this vulnerability to completely halt the network.
Tendermint 0.33.6 checks all the signatures are for the block with +2/3 majority before creating a commit.
**False Witness**
Tendermint 0.33.1 and above are no longer fully verifying commit signatures during block execution - they stop after +2/3. This means proposers can propose blocks that contain valid +2/3 signatures and then the rest of the signatures can be whatever they want. They can claim that all the other validators signed just by including a CommitSig with arbitrary signature data. While this doesn't seem to impact safety of Tendermint per se, it means that Commits may contain a lot of invalid data **.
_** This was already true of blocks, since they could include invalid txs filled with garbage, but in that case the application knew that they are invalid and could punish the proposer. But since applications didn't--and don't-- verify commit signatures directly (they trust Tendermint to do that), they won't be able to detect it._
This can impact incentivization logic in the application that depends on the LastCommitInfo sent in BeginBlock, which includes which validators signed. For instance, Gaia incentivizes proposers with a bonus for including more than +2/3 of the signatures. But a proposer can now claim that bonus just by including arbitrary data for the final -1/3 of validators without actually waiting for their signatures. There may be other tricks that can be played because of this.
Tendermint 0.33.6 verifies all the signatures during block execution ***.
_*** Please note that the light client does not check nil votes and exits as soon as 2/3+ of the signatures are checked._
### Impact
- All nodes
- The network stops due to having a commit with a wrong signature.
### Patches
- v0.33.6
### Workarounds
No workarounds.
### References
- https://github.com/tendermint/tendermint/issues/4926
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)
* Email us at [security@tendermint.com](mailto:security@tendermint.com)
More information can be found [here](https://tendermint.com/security/). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.0'}, {'fixed': '0.33.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15091'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/issues/4926'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/pull/5426'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340'}, {'type': 'PACKAGE', 'url': 'https://github.com/tendermint/tendermint'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#v0336'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0090'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:49:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v525-c3g5-cg9p | 2021-03-15T23:45:19Z | 2021-12-10T17:15:49Z | null | ['CVE-2020-36282'] | Unsafe Deserialization that can Result in Code Execution | JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq.jms:rabbitmq-jms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq.jms:rabbitmq-jms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36282'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/issues/135'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0'}, {'type': 'WEB', 'url': 'https://medium.com/@ramon93i7/a99645d0448b'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T23:45:19Z', 'nvd_published_at': '2021-03-12T01:15:00Z'} |
1.4.0 | GHSA-jm34-xm8m-w958 | 2021-05-19T22:31:56Z | 2021-12-20T18:04:40Z | null | ['CVE-2017-1000070'] | Open Redirect in oauth2_proxy | The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/bitly/oauth2_proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/pull/359'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:31:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vfqx-33qm-g869 | 2023-09-14T16:04:17Z | 2021-12-09T19:16:59Z | null | ['CVE-2020-36189'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 an 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36189'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2996'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/33d96c13fe18a2dad01b19ce195548c9acea9da4'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:14:22Z', 'nvd_published_at': '2021-01-06T23:15:00Z'} |
1.4.0 | GHSA-4m6q-rxhm-675w | 2021-07-28T23:08:13Z | 2021-12-09T19:54:29Z | null | ['CVE-2020-7636'] | OS Command Injection in adb-driver | adb-driver through 0.1.8 is vulnerable to Command Injection.It allows execution of arbitrary commands via the command function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'adb-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7636'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/adb-driver'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:33:09Z', 'nvd_published_at': '2020-04-06T13:15:00Z'} |
1.4.0 | GHSA-7rjr-3q55-vv33 | 2022-02-24T18:12:21Z | 2021-12-14T18:01:28Z | null | ['CVE-2021-45046'] | Incomplete fix for Apache Log4j vulnerability | # Impact
The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack.
## Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
# Mitigation
Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).
Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.16.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45046'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5022'}, {'type': 'WEB', 'url': 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/15/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/18/1'}] | {'cwe_ids': ['CWE-502', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T17:55:00Z', 'nvd_published_at': '2021-12-14T19:15:00Z'} |
1.4.0 | GHSA-gfhx-jjwq-63gv | 2021-12-08T20:20:15Z | 2021-12-10T20:24:11Z | null | ['CVE-2021-42567'] | Cross-site Scripting in Apereo CAS | Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-core-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42567'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/commit/376bf087d6d4267f61fc9f8028aa0d1ef407c3f0'}, {'type': 'WEB', 'url': 'https://apereo.github.io/2021/10/18/restvuln/'}, {'type': 'PACKAGE', 'url': 'https://github.com/apereo/cas'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/releases'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:20:15Z', 'nvd_published_at': '2021-12-07T22:15:00Z'} |