schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-55xv-f85c-248q
2022-01-04T19:52:06Z
2021-12-17T19:59:02Z
null
['CVE-2021-43838']
Regular Expression Denial of Service (ReDoS) in jsx-slack
jsx-slack v4.5.1 and earlier versions are vulnerable to a regular expression denial-of-service (ReDoS) attack. ### Impact If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. ```javascript /** @jsxImportSource jsx-slack */ import { Section } from 'jsx-slack' console.log( <Section> <blockquote> {[...Array(40)].map((_, i) => ( <p>{i + 1}</p> ))} </blockquote> </Section> ) ``` ### Patches _See also: https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6_ jsx-slack v4.5.2 has updated regular expressions to prevent catastrophic backtracking. jsx-slack v4.5.1 also had patched a workaround. It has no problems to contents with ASCII characters, but _still vulnerable to contents with multibyte characters_. (https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d) ### References - https://nvd.nist.gov/vuln/detail/CVE-2021-43838 - https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d ### Credits Thanks to @hieki for finding out this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsx-slack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43838'}, {'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d'}, {'type': 'PACKAGE', 'url': 'https://github.com/yhatt/jsx-slack/'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:33:23Z', 'nvd_published_at': '2021-12-17T19:15:00Z'}
1.4.0
GHSA-wx5j-54mm-rqqq
2023-08-04T20:07:19Z
2021-12-09T19:09:17Z
null
['CVE-2021-43797']
HTTP request smuggling in netty
### Impact Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.71.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43797'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/11891'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220107-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:17:28Z', 'nvd_published_at': '2021-12-09T19:15:00Z'}
1.4.0
GHSA-3xph-cp8f-2229
2021-12-13T13:10:41Z
2021-12-10T20:31:32Z
null
['CVE-2021-3815']
Prototype Pollution in @fabiocaccamo/utils.js
utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@fabiocaccamo/utils.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815'}, {'type': 'WEB', 'url': 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'}, {'type': 'PACKAGE', 'url': 'https://github.com/fabiocaccamo/utils.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:05:12Z', 'nvd_published_at': '2021-12-08T17:15:00Z'}
1.4.0
GHSA-hm82-qr45-h7mw
2023-09-08T22:51:04Z
2021-12-10T17:22:58Z
null
['CVE-2020-28269']
Prototype Pollution in field
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'field'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28269'}, {'type': 'WEB', 'url': 'https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269,'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:23:15Z', 'nvd_published_at': '2020-11-12T18:15:00Z'}
1.4.0
GHSA-9vwf-54m9-gc4f
2022-08-11T19:17:54Z
2021-12-16T14:32:39Z
null
['CVE-2021-4089']
snipe-it is vulnerable to Improper Access Control
snipe-it prior to version 5.3.4 is vulnerable to Improper Access Control. Regular users with `DENY` set to all models permissions can still view model information via the /models/{id}/clone endpoint due to no authorize('view') permission being set.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862'}]
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:21:35Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}
1.4.0
GHSA-668q-qrv7-99fm
2021-12-17T19:25:11Z
2021-12-17T20:00:50Z
null
['CVE-2021-42550']
Deserialization of Untrusted Data in logback
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ch.qos.logback:logback-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42550'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf'}, {'type': 'WEB', 'url': 'https://github.com/cn-panda/logbackRceDemo'}, {'type': 'PACKAGE', 'url': 'https://github.com/qos-ch/logback'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html'}, {'type': 'WEB', 'url': 'https://jira.qos.ch/browse/LOGBACK-1591'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0001/'}, {'type': 'WEB', 'url': 'http://logback.qos.ch/news.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/11'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:25:11Z', 'nvd_published_at': '2021-12-16T19:15:00Z'}
1.4.0
GHSA-mx43-r985-5h4m
2021-12-09T19:40:01Z
2021-12-20T18:12:47Z
null
['CVE-2020-12283']
Open redirect vulnerability in Sourcegraph
### Impact An open redirect vulnerability that allows users to be targeted for phishing attacks has been found in Sourcegraph instances configured with OAuth, OpenID, or SAML authentication enabled. Users targeted by these phishing attacks could have their authentication tokens silently harvested by an attacker. ### Resolution Sourcegraph v3.14.4 and v3.15.1 have been released which resolve the vulnerability. ([associated change](https://github.com/sourcegraph/sourcegraph/pull/10167)) ### Workarounds Disabling OAuth, OpenID and/or SAML sign-in options until upgraded to the patched versions will secure Sourcegraph / workaround the issue. ### Timeline - Apr 23, 8 AM PST: GitHub Security Lab reported the issue to Sourcegraph. - Apr 23, 11 PM PST: A Sourcegraph engineer proposed a resolution for the vulnerability. https://github.com/sourcegraph/sourcegraph/pull/10167 - Apr 24, 3 AM PST: The proposed resolution was reviewed, approved, and merged. - Apr 28, 2 PM PST: Patch releases for 3.14.4 and 3.15.1 were published. - Apr 29, 10 PM PST: Mitre publicly disclosed [CVE-2020-12283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12283). - Apr 30, 11 AM PST: Sourcegraph issued a GitHub security advisory and notified all affected users. ### References - [Mitre: CVE-2020-12283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12283) - [GitHub Security Lab: GHSL-2020-085](https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph) - [detectify's blog post on open redirect vulnerabilities ](https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/) ### For more information If you have any questions or comments about this advisory, please contact us at [support@sourcegraph.com](mailto:support@sourcegraph.com) and include `CVE-2020-12283` in the title.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sourcegraph/sourcegraph/cmd/frontend/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/sourcegraph/sourcegraph/cmd/frontend/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.15.0'}, {'fixed': '3.15.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-mx43-r985-5h4m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12283'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/pull/10167'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64'}, {'type': 'PACKAGE', 'url': 'https://github.com/sourcegraph/sourcegraph'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/sourcegraph/sourcegraph/compare/v3.15.0...v3.15.1'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:06:22Z', 'nvd_published_at': None}
1.4.0
GHSA-84px-q68r-2fc9
2021-12-15T22:27:38Z
2021-12-15T22:55:16Z
null
['CVE-2021-43835']
Privilege escalation in the Sulu Admin panel
### Impact Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction. ### Patches The versions have been patched in 2.2.18, 2.3.8 and 2.4.0. ### Workarounds Patching the ProfileController of affected sulu versions yourself by overwriting it. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues) * Email us at [security@sulu.io](mailto:security@sulu.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.17'}}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.7'}}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-RC1'}, {'fixed': '2.4.0'}]}], 'versions': ['2.4.0-RC1']}]
[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T22:27:38Z', 'nvd_published_at': '2021-12-15T20:15:00Z'}
1.4.0
GHSA-hwvm-vfw8-93mw
2021-12-16T18:40:26Z
2021-12-16T18:53:32Z
null
[]
Vulnerable dependency in XTDB connector
### Impact The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the connector we understand to be any URI used to configure connectivity to S3. Note therefore that if you do not use or configure S3 as a backing store in your use of the connector, you should not be exposed to any vulnerability from this component. ### Patches The problem has been addressed in version 4.5.13 of the httpclient library, which is included as a replacement dependency version for the build of the XTDB connector from release 3.5 onwards. Therefore, using release 3.5 (or newer) of the connector will include the fixes to address this CVE. ### Workarounds We have not investigated specific workarounds, but per the description of the issue it seems likely that ensuring the proper URIs are used for any S3 connectivity used by the connector (and ensuring there are appropriate controls around modifying such URIs in the connector's configuration) would be the first point of investigation. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-13956
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.odpi.egeria:egeria-connector-xtdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}, {'type': 'WEB', 'url': 'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15'}, {'type': 'PACKAGE', 'url': 'https://github.com/odpi/egeria-connector-xtdb'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:40:26Z', 'nvd_published_at': None}
1.4.0
GHSA-68wm-pfjf-wqp6
2023-01-18T16:44:31Z
2021-12-20T16:57:16Z
null
['CVE-2021-32637']
Authentication bypassed with malformed request URI on nginx
### Impact This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, but all of the ones we officially support except nginx do not allow malformed URI paths. ### Patches The problem is rectified entirely in v4.29.3. As this patch is relatively straightforward we can back port this to any version upon request. Alternatively we are supplying a git patch to 4.25.1 which should be relatively straightforward to apply to any version, the git patches for specific versions can be found below. <details><summary>Patch for 4.25.1:</summary><p> ```patch From ca22f3d2c44ca7bef043ffbeeb06d6659c1d550f Mon Sep 17 00:00:00 2001 From: James Elliott <james-d-elliott@users.noreply.github.com> Date: Wed, 19 May 2021 12:10:13 +1000 Subject: [PATCH] fix(handlers): verify returns 200 on malformed request This is a git patch for commit at tag v4.25.1 to address a potential method to bypass authentication in proxies that forward malformed information to Authelia in the forward auth process. Instead of returning a 200 this ensures that Authelia returns a 401 when this occurs. --- internal/handlers/handler_verify.go | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/internal/handlers/handler_verify.go b/internal/handlers/handler_verify.go index 65c064ce..4dd9702d 100644 --- a/internal/handlers/handler_verify.go +++ b/internal/handlers/handler_verify.go @@ -396,7 +396,9 @@ func VerifyGet(cfg schema.AuthenticationBackendConfiguration) middlewares.Reques targetURL, err := getOriginalURL(ctx) if err != nil { - ctx.Error(fmt.Errorf("Unable to parse target URL: %s", err), operationFailedMessage) + ctx.Logger.Error(fmt.Errorf("Unable to parse target URL: %s", err)) + ctx.ReplyUnauthorized() + return } -- 2.31.1 ``` </p></details> ### Workarounds The most relevant workaround is upgrading. **If you need assistance with an upgrade please contact us on [Matrix](https://riot.im/app/#/room/#authelia:matrix.org) or [Discord](https://discord.authelia.com).** Please just let us know you're needing help upgrading to above 4.29.2. You can add an block which fails requests that contains a malformed URI in the internal location block. We have crafted one that should work in most instances, it basically checks no chars that are required to be URL-encoded for either the path or the query are in the URI. Basically this regex checks that the characters between the square braces are the only characters in the $request_uri header, if they exist, it returns a HTTP 401 status code. The characters in the regex match are tested to not cause a parsing error that would result in a failure, however they are not exhaustive since query strings seem to not always conform to the RFC. <details><summary>authelia.conf:</summary><p> ```nginx location /authelia { internal; # **IMPORTANT** # This block rejects requests with a 401 which contain characters that are unable to be parsed. # It is necessary for security prior to v4.29.3 due to the fact we returned an invalid code in the event of a parser error. # You may comment this section if you're using Authelia v4.29.3 or above. We strongly recommend upgrading. # RFC3986: http://tools.ietf.org/html/rfc3986 # Commentary on RFC regarding Query Strings: https://www.456bereastreet.com/archive/201008/what_characters_are_allowed_unencoded_in_query_strings/ if ($request_uri ~ [^a-zA-Z0-9_+-=\!@$%&*?~.:#'\;\(\)\[\]]) { return 401; } # Include the remainder of the block here. } ```` </p></details> ### Discovery This issue was discovered by: Siemens Energy Cybersecurity Red Team - Silas Francisco - Ricardo Pesqueira ### Identifying active exploitation of the vulnerability The following regex should match log entries that are an indication of the vulnerability being exploited: ```regex level=error msg="Unable to parse target URL: Unable to parse URL (extracted from X-Original-URL header)?.*?: parse.*?net/url:.*github\.com/authelia/authelia/internal/handlers/handler_verify\.go ``` Example log entry ***with*** X-Original-URL configured: ```log time="2021-05-21T16:31:15+10:00" level=error msg="Unable to parse target URL: Unable to parse URL extracted from X-Original-URL header: parse \"https://example.com/": net/url: invalid control character in URL" method=GET path=/api/verify remote_ip=192.168.1.10 stack="github.com/authelia/authelia/internal/middlewares/authelia_context.go:65 (*AutheliaCtx).Error\ngithub.com/authelia/authelia/internal/handlers/handler_verify.go:431 VerifyGet.func1\ngithub.com/authelia/authelia/internal/middlewares/authelia_context.go:50 AutheliaMiddleware.func1.1\ngithub.com/fasthttp/router@v1.3.12/router.go:414 (*Router).Handler\ngithub.com/authelia/authelia/internal/middlewares/log_request.go:14 LogRequestMiddleware.func1\ngithub.com/valyala/fasthttp@v1.24.0/server.go:2219 (*Server).serveConn\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:223 (*workerPool).workerFunc\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:195 (*workerPool).getCh.func1\nruntime/asm_amd64.s:1371 goexit" ``` Example log entry ***without*** X-Original-URL configured: ```log time="2021-05-21T16:30:17+10:00" level=error msg="Unable to parse target URL: Unable to parse URL https://example.com/: parse \"https://example.com/": net/url: invalid control character in URL" method=GET path=/api/verify remote_ip=192.168.1.10 stack="github.com/authelia/authelia/internal/middlewares/authelia_context.go:65 (*AutheliaCtx).Error\ngithub.com/authelia/authelia/internal/handlers/handler_verify.go:431 VerifyGet.func1\ngithub.com/authelia/authelia/internal/middlewares/authelia_context.go:50 AutheliaMiddleware.func1.1\ngithub.com/fasthttp/router@v1.3.12/router.go:414 (*Router).Handler\ngithub.com/authelia/authelia/internal/middlewares/log_request.go:14 LogRequestMiddleware.func1\ngithub.com/valyala/fasthttp@v1.24.0/server.go:2219 (*Server).serveConn\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:223 (*workerPool).workerFunc\ngithub.com/valyala/fasthttp@v1.24.0/workerpool.go:195 (*workerPool).getCh.func1\nruntime/asm_amd64.s:1371 goexit" ``` ### For more information If you have any questions or comments about this advisory: * Open a [Discussion](https://github.com/authelia/authelia/discussions) * Email us at [security@authelia.com](mailto:security@authelia.com) ### Edit / Adjustment This CVE has been edited adjusting the score to more accurately reflect the guidance in the [official CVSS 3.1 guide](https://www.first.org/cvss/specification-document). Under close evaluation the score we originally assigned to this CVE is inappropriate in two clearly identifiable criteria: - Complexity (Low -> High): This attack requires the administrator be using NGINX's auth_request module. This means the attack cannot be exploited at will but rather requires a pre-condition separate to the vulnerable system, and requires the attacker have gathered knowledge about the system for this likely to be exploited. - Availability (High -> None): This attack does not alter availability directly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/authelia/authelia/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha1'}, {'fixed': '4.29.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.29.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32637'}, {'type': 'WEB', 'url': 'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda'}, {'type': 'PACKAGE', 'url': 'https://github.com/authelia/authelia'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:08:47Z', 'nvd_published_at': '2021-05-28T17:15:00Z'}
1.4.0
GHSA-f77h-m9w2-vvg2
2021-12-02T20:24:56Z
2021-12-03T20:38:57Z
null
['CVE-2021-4017']
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4017'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:24:56Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-mf4f-j588-5xm8
2021-12-14T15:29:17Z
2021-12-14T21:07:14Z
null
[]
Apache Log4j Remote Code Execution
### Impact Opencast uses an Apache Log4j2 version which, combined with older JDK versions, can be used for remote code execution attacks which have been found to be actively exploited. Apache Log4j2 <=2.14.1 JNDI features is not sufficiently protected. An attacker who can control log messages or log message parameters can execute arbitrary code when message lookup substitution is enabled. ### Who is affected - Opencast before 9.10 or 10.6 are affected - Log4j version: all 2.x versions before 2.15.0 are affected ### Patches The issue has been fixed in Opencast 9.10 and 10.6. ### Workarounds The vulnerability can be mitigated by setting system property `log4j2.formatMsgNoLookups` to `true`. ### References - [Opencast pull request mitigating the vulnerability](https://github.com/opencast/opencast/pull/3253) - [CVE-2021-44228 Detail](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) - [Analysis and Remediation Guidance to the Log4j Zero-Day RCE (CVE-2021-44228) Vulnerability](https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228) - [VE-2021-44228 – Log4j 2 Vulnerability Analysis](https://www.randori.com/blog/cve-2021-44228/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) * Email us at [security@opencast.org](mailto:security@opencast.org) ### Note about dependencies This issue affects many Java applications. Please also verify these are not vulnerable.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0'}, {'fixed': '10.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-mf4f-j588-5xm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/pull/3253'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/9.x/admin/#changelog/#opencast-910'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:22:20Z', 'nvd_published_at': None}
1.4.0
GHSA-2mqv-4j3r-vjvp
2021-12-16T18:42:05Z
2021-12-16T18:52:21Z
null
['CVE-2021-43812']
Open redirect in @auth0/nextjs-auth0
### Overview Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability. ### Am I affected? You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`. ### How to fix that? Upgrade to version `>=1.6.2` ### Will this update impact my users? The fix provided in the patch will not affect your users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@auth0/nextjs-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812'}, {'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/nextjs-auth0'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:42:05Z', 'nvd_published_at': '2021-12-16T19:15:00Z'}
1.4.0
GHSA-fp5r-v3w9-4333
2022-02-08T20:28:50Z
2021-12-14T19:49:31Z
null
['CVE-2021-4104']
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'last_affected': '1.2.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104'}, {'type': 'WEB', 'url': 'https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4104'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202209-02'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211223-0007/'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/18/3'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:47:27Z', 'nvd_published_at': '2021-12-14T12:15:00Z'}
1.4.0
GHSA-76qm-4f93-fg6f
2022-09-21T22:30:52Z
2021-12-09T19:30:29Z
null
['CVE-2015-9545']
Improper Input Validation in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9545'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:14:14Z', 'nvd_published_at': '2020-04-07T18:15:00Z'}
1.4.0
GHSA-6vvh-5794-vpmj
2022-01-04T18:57:26Z
2021-12-17T20:40:58Z
null
['CVE-2020-35216']
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages.
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35216'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1woXwR3vciv7ltFan6LyK5vsWXmaUi8ArZonhk80Gr5U/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T15:12:52Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}
1.4.0
GHSA-2v5j-q74q-r53f
2021-12-03T15:19:07Z
2021-12-03T20:42:26Z
null
['CVE-2021-3994']
django-helpdesk is vulnerable to Cross-site Scripting
django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-helpdesk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3994'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-helpdesk/django-helpdesk'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:21:25Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-7rpj-hg47-cx62
2023-03-21T16:18:09Z
2021-12-16T14:29:57Z
null
['CVE-2021-23463']
Improper Restriction of XML External Entity Reference in com.h2database:h2.
H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.198'}, {'fixed': '2.0.202'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/issues/3195'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3199'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3199#issuecomment-1002830390'}, {'type': 'WEB', 'url': 'https://github.com/boris-unckel/h2database/commit/f9ad6aef2bfa59eba2b4d3e7c4c32d2cce8e8b05'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/h2database/h2database/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0010/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:17:37Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}
1.4.0
GHSA-r3gr-cxrf-hg25
2022-02-08T22:01:01Z
2021-12-09T19:15:11Z
null
['CVE-2020-35491']
Serialization gadgets exploit in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35491'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2986'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502', 'CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:05:38Z', 'nvd_published_at': '2020-12-17T19:15:00Z'}
1.4.0
GHSA-fj7f-vq84-fh43
2021-12-14T15:31:09Z
2021-12-08T19:51:36Z
null
['CVE-2021-43809']
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile.
In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. ### Exploitation To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the [upload-pack](https://git-scm.com/docs/git-clone#Documentation/git-clone.txt--ultupload-packgt) argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside. ### Impact This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the `Gemfile` (although they would need the weird URL with a leading dash to not raise any flags). This kind of attack vector [has been used in the past](https://www.cnbc.com/2021/01/26/north-korean-hackers-targeting-security-researchers-on-twitter.html) to target security researchers by sending them projects to collaborate on. ### Patches Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. ### Workarounds Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code. ### References https://cwe.mitre.org/data/definitions/88.html
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.33'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/pull/5142'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2021-43809.yml'}]
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:33:42Z', 'nvd_published_at': '2021-12-08T19:15:00Z'}
1.4.0
GHSA-g7mq-rfj2-25wq
2023-09-11T16:19:43Z
2021-12-10T17:26:33Z
null
['CVE-2021-23390']
Code Injection in total4
The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the `U.set()` and `U.get()` functions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'total4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.43'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23390'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/commit/8a72d8c20f38bbcac031a76a51238aa528f68821'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework4/blob/master/utils.js%23L5430-L5455'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:43:28Z', 'nvd_published_at': '2021-07-12T16:15:00Z'}
1.4.0
GHSA-9gph-22xh-8x98
2023-09-14T16:07:39Z
2021-12-09T19:15:54Z
null
['CVE-2020-36179']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36179'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:47Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}
1.4.0
GHSA-xr38-w74q-r8jv
2021-12-06T23:56:39Z
2021-12-06T23:57:59Z
null
['CVE-2021-43781']
Permissions not properly checked in Invenio-Drafts-Resources
### Impact Invenio-Drafts-Resources does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. ### Details The service's ``publish()`` method contains the following permission check: ```python def publish(..): self.require_permission(identity, "publish") ``` However, the record should have been passed into the permission check so that the need generators have access to e.g. the record owner. ```python def publish(..): self.require_permission(identity, "publish", record=record) ``` The bug is activated in Invenio-RDM-Records which has a need generator called ``RecordOwners()``, which when no record is passed in defaults to allow any authenticated user: ```python class RecordOwners(Generator): def needs(self, record=None, **kwargs): if record is None: return [authenticated_user] # ... ``` ### Patches The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6+, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively. You can verify the version installed of Invenio-Drafts-Resources via PIP: ```console cd ~/src/my-site pipenv run pip freeze | grep invenio-drafts-resources ``` ### References - [Security policy](https://invenio.readthedocs.io/en/latest/community/security-policy.html) ### For more information If you have any questions or comments about this advisory: * Chat with us on Discord: https://discord.gg/8qatqBC
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'invenio-drafts-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-app-rdm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-rdm-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.32.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-drafts-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.14.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-rdm-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.0'}, {'fixed': '0.33.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43781'}, {'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626'}]
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:15:02Z', 'nvd_published_at': '2021-12-06T18:15:00Z'}
1.4.0
GHSA-p6xc-xr62-6r2g
2022-08-11T21:38:34Z
2021-12-18T18:00:07Z
null
['CVE-2021-45105']
Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3. # Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.12.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45105'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211218-0001/'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5024'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1541/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/19/1'}]
{'cwe_ids': ['CWE-20', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-18T17:59:37Z', 'nvd_published_at': '2021-12-18T12:15:00Z'}
1.4.0
GHSA-945q-ch46-pchg
2022-06-22T18:29:35Z
2021-12-01T00:00:40Z
null
['CVE-2021-22095']
Deserialization of Untrusted Data in Spring AMQP
In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.amqp:spring-amqp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22095'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22097'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:29:35Z', 'nvd_published_at': '2021-11-30T19:15:00Z'}
1.4.0
GHSA-8c4j-34r4-xr8g
2023-09-14T16:13:00Z
2021-12-09T19:16:18Z
null
['CVE-2020-36180']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36180'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:36:46Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}
1.4.0
GHSA-pmfr-63c2-jr5c
2023-01-20T22:02:58Z
2021-12-20T18:24:30Z
null
['CVE-2020-13845']
Execution Control List (ECL) Is Insecure in Singularity
### Impact The Singularity Execution Control List (ECL) allows system administrators to set up a policy that defines rules about what signature(s) must be (or must not be) present on a SIF container image for it to be permitted to run. In Singularity 3.x versions below 3.6.0, the following issues allow the ECL to be bypassed by a malicious user: * Image integrity is not validated when an ECL policy is enforced. * The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature. Thus, it is trivial to craft an arbitrary payload which will be permitted to run, even if the attacker does not have access to the private key associated with the fingerprint(s) configured in the ECL. ### Patches These issues are addressed in Singularity 3.6.0. All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0. Version 3.6.0 includes a `legacyinsecure` option that can be set to `legacyinsecure = true` in `ecl.toml` to allow the ECL to perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. The option should be used only to temporarily ease the transition to containers signed with the new 3.6.0 signature format. ### Workarounds This issue affects any installation of Singularity configured to use the Execution Control List (ECL) functionality. There is no workaround if ECL is required. ### For more information General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: * [Singularity Slack Channel](https://bit.ly/2m0g3lX) * [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13845'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html'}]
{'cwe_ids': ['CWE-347', 'CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:13:13Z', 'nvd_published_at': '2020-07-14T18:15:00Z'}
1.4.0
GHSA-ph98-v78f-jqrm
2021-12-14T15:25:41Z
2021-12-14T21:08:13Z
null
['CVE-2021-43822']
SQL injection in jackalope/jackalope-doctrine-dbal
### Impact Users can provoke SQL injections if they can specify a node name or query. ### Patches Upgrade to version 1.7.4 If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. ### Workarounds Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected. ### References No further references. ### For more information If you have any questions or comments about this advisory: * Open an issue in [jackalope/jackalope-doctrine-dbal repo](https://github.com/jackalope/jackalope-doctrine-dbal/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'jackalope/jackalope-doctrine-dbal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43822'}, {'type': 'WEB', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}, {'type': 'PACKAGE', 'url': 'https://github.com/jackalope/jackalope-doctrine-dbal'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:25:41Z', 'nvd_published_at': '2021-12-13T20:15:00Z'}
1.4.0
GHSA-v4cr-m5f8-gxw8
2021-12-15T15:20:43Z
2021-12-16T14:14:56Z
null
['CVE-2021-4092']
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF)
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:08:25Z', 'nvd_published_at': '2021-12-11T14:15:00Z'}
1.4.0
GHSA-pfmw-vj74-ph8g
2022-08-10T23:48:33Z
2021-12-02T17:48:30Z
null
['CVE-2021-43998']
HashiCorp Vault Incorrect Permission Assignment for Critical Resource
HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43998'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-30-vaults-templated-acl-policies-matched-first-created-alias-per-entity-and-auth-backend/32132'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}]
{'cwe_ids': ['CWE-732'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T18:25:18Z', 'nvd_published_at': '2021-11-30T15:15:00Z'}
1.4.0
GHSA-j7px-6hwj-hpjg
2021-05-24T21:05:58Z
2021-12-20T17:59:10Z
null
['CVE-2020-11053']
Open Redirect in OAuth2 Proxy
### Impact As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites. However, by crafting a redirect URL with HTML encoded whitespace characters (eg. `%0a`, `%0b`,`%09`,`%0d`) the validation could be bypassed and allow a redirect to any URL provided. ### Patches @rootxharsh and @iamnoooob provided this patch as potential solution: ``` From 4b941f56eda310b5c4dc8080b7635a6bfabccad4 Mon Sep 17 00:00:00 2001 From: Harsh Jaiswal <harsh@pop-os.localdomain> Date: Fri, 1 May 2020 20:38:31 +0530 Subject: [PATCH] Fixes redirect issue --- oauthproxy.go | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/oauthproxy.go b/oauthproxy.go index 1e9bb7c..f8beb4d 100644 --- a/oauthproxy.go +++ b/oauthproxy.go @@ -577,8 +577,9 @@ func validOptionalPort(port string) bool { // IsValidRedirect checks whether the redirect URL is whitelisted func (p *OAuthProxy) IsValidRedirect(redirect string) bool { + matched, _ := regexp.MatchString(`^/\s+/|\\`, redirect) switch { - case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !strings.HasPrefix(redirect, "/\\"): + case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !matched: return true case strings.HasPrefix(redirect, "http://") || strings.HasPrefix(redirect, "https://"): redirectURL, err := url.Parse(redirect) -- 2.17.1 ``` This issue was also reported to us separately by @mik317 several hours later The fix was implemented in [#xxx]() and released as version 5.1.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-j7px-6hwj-hpjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11053'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43'}]
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:05:58Z', 'nvd_published_at': None}
1.4.0
GHSA-f9xh-2qgp-cq57
2023-09-14T16:03:37Z
2021-12-09T19:16:42Z
null
['CVE-2020-36188']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36188'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2996'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/33d96c13fe18a2dad01b19ce195548c9acea9da4'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:25:02Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}
1.4.0
GHSA-2hfj-cxw7-g45p
2022-01-04T18:54:05Z
2021-12-14T21:48:16Z
null
['CVE-2021-39183']
Unsafe inline XSS in pasting DOM element into chat
### Impact Inline scripts are executed when Javascript is parsed via a paste action. 1. Open https://watch.owncast.online/ 2. Copy and then paste `<img src=null onerror=alert('hello')>` into the chat field. 3. An alert should pop up. ### Patches ``` ⋮ 13 │ // Content security policy ⋮ 14 │ csp := []string{ ⋮ 15 │ "script-src 'self' 'sha256-2HPCfJIJHnY0NrRDPTOdC7AOSJIcQyNxzUuut3TsYRY='", ⋮ 16 │ "worker-src 'self' blob:", // No single quotes around blob: ⋮ 17 │ } ``` Will be patched in 0.0.9 by blocking `unsafe-inline` Content Security Policy and specifying the `script-src`. The `worker-src` is required to be set to `blob` for the video player. ### For more information If you have any questions or comments about this advisory: * Open an issue in [owncast/owncast](https://github.com/owncast/owncast/issues) * Email us at [gabek@real-ity.com](mailto:gabek@real-ity.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/owncast/owncast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/owncast/owncast/security/advisories/GHSA-2hfj-cxw7-g45p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39183'}, {'type': 'PACKAGE', 'url': 'https://github.com/owncast/owncast'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T20:16:10Z', 'nvd_published_at': '2021-12-14T20:15:00Z'}
1.4.0
GHSA-rxch-gp62-574w
2022-01-04T19:01:10Z
2021-12-16T14:13:27Z
null
['CVE-2021-4108']
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4108'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:11:10Z', 'nvd_published_at': '2021-12-14T20:15:00Z'}
1.4.0
GHSA-q54r-r9pr-w7qv
2023-09-13T19:55:33Z
2021-12-01T18:27:44Z
null
['CVE-2021-25987']
Hexo Vulnerable to XSS
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hexo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25987'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/issues/4838'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/pull/4750'}, {'type': 'WEB', 'url': 'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}, {'type': 'PACKAGE', 'url': 'https://github.com/hexojs/hexo'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T16:15:32Z', 'nvd_published_at': '2021-11-30T14:15:00Z'}
1.4.0
GHSA-5xjx-4xcm-hpcm
2022-07-05T18:01:53Z
2021-12-10T18:53:42Z
null
['CVE-2021-23403']
Prototype Pollution in ts-nodash
`ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'ts-nodash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403'}, {'type': 'WEB', 'url': 'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5'}, {'type': 'PACKAGE', 'url': 'https://github.com/BadOPCode/NoDash'}, {'type': 'WEB', 'url': 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T14:35:53Z', 'nvd_published_at': '2021-07-02T17:15:00Z'}
1.4.0
GHSA-hcxx-mp6g-6gr9
2021-12-14T15:51:41Z
2021-12-14T21:43:48Z
null
['CVE-2018-16153']
Opencast publishes global system account credentials
The issue was mostly mitigated before, drastically reducing the risk. See references below for more information. ### Impact Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials, regardless of the target being part of the Opencast cluster or not. Previous mitigations already prevented clear text authentications for such requests (e.g. HTTP Basic authentication), but with enough malicious intent, even hashed credentials can be broken. ### Patches Opencast 10.6 will now send authentication requests only against servers which are part of the Opencast cluster, preventing external services from getting any form of authentication attempt in the first place. ### Workarounds No workaround available. ### References - [Patch fixing the issue](https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51) - [Original security notice](https://groups.google.com/a/opencast.org/g/security-notices/c/XRZzRiqp-NE) - [Original security mitigation](https://github.com/opencast/opencast/commit/fe8c3d3a60dc5869b468957270dbad5f8c30ead6) ### For more information If you have any questions or comments about this advisory: - Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) - Email us at [security@opencast.org](mailto:security@opencast.org)
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'}, {'type': 'WEB', 'url': 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}]
{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:51:41Z', 'nvd_published_at': None}
1.4.0
GHSA-qrmm-w75w-3wpx
2022-05-26T20:08:34Z
2021-12-09T19:08:38Z
null
[]
Server side request forgery in SwaggerUI
SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered. However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances. An example scenario abusing this functionality could take the following form: - `https://example.com/api-docs` hosts a version of SwaggerUI with `?url=` query parameter enabled. - Users will trust the domain `https://example.com` and the contents of the OpenAPI definition. - A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at `https://evildomain`. - Users mistakenly click a phishing URL like `https://example.com/api-docs?url=https://evildomain/fakeapi.yaml` and enters sensitive data via the "Try-it-out" feature. We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is *not* possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism. ### Resolution We've made the decision to [disable query parameters (#4872)](https://github.com/swagger-api/swagger-ui/issues/4872) by default starting with SwaggerUI version `4.1.3`. Please update to this version when it becomes available (**ETA: 2021 December**). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites. ### Workaround If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code: ```js SwaggerUI({ // ...other configuration options, plugins: [function UrlParamDisablePlugin() { return { statePlugins: { spec: { wrapActions: { // Remove the ?url parameter from loading an external OpenAPI definition. updateUrl: (oriAction) => (payload) => { const url = new URL(window.location.href) if (url.searchParams.has('url')) { url.searchParams.delete('url') window.location.replace(url.toString()) } return oriAction(payload) } } } } } }], }) ``` ### Future UX work Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the "Execute" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community. ## Reflected XSS attack **Warning** in versions < 3.38.0, it is possible to combine the URL options (as mentioned above) with a vulnerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than 3.38.0, we suggest you upgrade or implement the workaround as mentioned above.
[]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'swagger-ui-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'swagger-ui-react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Swashbuckle.AspNetCore.SwaggerUI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/4872'}, {'type': 'WEB', 'url': 'https://github.com/domaindrivendev/Swashbuckle.AspNetCore/commit/401c7cb81e5efe835ceb8aae23e82057d57c7d29'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:49:08Z', 'nvd_published_at': None}
1.4.0
GHSA-m9hp-7r99-94h5
2021-05-21T20:49:36Z
2021-12-20T17:53:53Z
null
['CVE-2020-26290']
Critical security issues in XML encoding in github.com/dexidp/dex
### Impact The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector: Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7 `encoding/xml` instabilities: - [Element namespace prefix instability (CVE-2020-29511)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md) - [Attribute namespace prefix instability (CVE-2020-29509)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md) - [Directive comment instability (CVE-2020-29510)](https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md) ### Patches Immediately update to [Dex v2.27.0](https://github.com/dexidp/dex/releases/tag/v2.27.0). ### Workarounds There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex/connector/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.27.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/releases/tag/v2.27.0'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0050'}]
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:49:36Z', 'nvd_published_at': None}
1.4.0
GHSA-25mp-g6fv-mqxx
2022-04-07T16:06:54Z
2021-12-07T21:12:09Z
null
['CVE-2021-43803']
Unexpected server crash in Next.js.
Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package `next` hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.9'}, {'fixed': '11.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43803'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/32080'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v11.1.3'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/v12.0.5'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T19:17:55Z', 'nvd_published_at': '2021-12-10T00:15:00Z'}
1.4.0
GHSA-3w6p-8f82-gw8r
2021-12-17T20:34:04Z
2021-12-17T20:42:38Z
null
[]
Using JMSAppender in log4j configuration may lead to deserialization of untrusted data
### Impact ClickHouse JDBC Bridge uses [slf4j-log4j12 1.7.32](https://repo1.maven.org/maven2/org/slf4j/slf4j-log4j12/1.7.32/), which depends on [log4j 1.2.17](https://repo1.maven.org/maven2/log4j/log4j/1.2.17/). It allows a remote attacker to execute code on the server, if you changed default log4j configuration by adding JMSAppender and an insecure JMS broker. ### Patches The patch version `2.0.7` removed log4j dependency by replacing `slf4j-log4j12` to `slf4j-jdk14`. Logging configuration is also changed from `log4j.properties` to `logging.properties`. ### Workarounds 1. Do NOT change log4j configuration to use JMSAppender along with insecure JMS broker 2. Alternatively, you can issue below command to remove `JMSAppender.class`: ```(bash) # install zip command if you don't have apt-get update && apt-get install -y zip # remove the class zip -d clickhouse-jdbc-bridge*.jar ru/yandex/clickhouse/jdbcbridge/internal/log4j/net/JMSAppender.class ``` ### References Please refer to [CVE-2021-4104](https://access.redhat.com/security/cve/CVE-2021-4104) to read more. ### For more information If you have any questions or comments about this advisory, please feel free to open an issue in the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ru.yandex.clickhouse:clickhouse-jdbc-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ClickHouse/clickhouse-jdbc-bridge/security/advisories/GHSA-3w6p-8f82-gw8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4104'}, {'type': 'PACKAGE', 'url': 'https://github.com/ClickHouse/clickhouse-jdbc-bridge'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T20:34:04Z', 'nvd_published_at': None}
1.4.0
GHSA-5r5r-6hpj-8gg9
2022-02-08T21:39:40Z
2021-12-09T19:15:24Z
null
['CVE-2020-35728']
Serialization gadget exploit in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35728'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2999'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210129-0007/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:24:20Z', 'nvd_published_at': '2020-12-27T05:15:00Z'}
1.4.0
GHSA-vm5j-vqr6-v7v8
2021-05-25T20:40:19Z
2021-12-10T20:04:56Z
null
['CVE-2020-7640']
OS Command Injection in pixl-class
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pixl-class'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640'}, {'type': 'WEB', 'url': 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}, {'type': 'WEB', 'url': 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:40:19Z', 'nvd_published_at': '2020-04-27T22:15:00Z'}
1.4.0
GHSA-m4h3-7mc2-v295
2022-01-04T19:00:33Z
2021-12-17T20:41:21Z
null
['CVE-2020-35214']
An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.
An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35214'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:11:26Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}
1.4.0
GHSA-5fh3-25xr-g85h
2021-12-03T15:19:38Z
2021-12-03T20:40:50Z
null
['CVE-2021-4018']
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4018'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/ff81e6d5366c2cfb15618793ad919ae4cbb3ac57'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it/'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:24:35Z', 'nvd_published_at': '2021-12-01T10:15:00Z'}
1.4.0
GHSA-7prf-vw4p-qr59
2021-06-22T15:45:35Z
2021-12-10T19:03:07Z
null
['CVE-2020-24939']
Prototype pollution in supermixer
Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'supermixer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/959987'}, {'type': 'WEB', 'url': 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:46:22Z', 'nvd_published_at': '2021-06-16T16:15:00Z'}
1.4.0
GHSA-cvm9-fjm9-3572
2023-09-14T16:06:24Z
2021-12-09T19:16:10Z
null
['CVE-2020-36181']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36181'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:23Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}
1.4.0
GHSA-cxg7-84wp-8pcq
2022-08-11T18:47:07Z
2021-12-16T21:01:07Z
null
['CVE-2021-4117']
YetiForceCRM is vulnerable to Business Logic Errors in the weight of a product
YetiForceCRM is vulnerable to Business Logic Errors in the Weight of a Product since that value can be a negative number.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:39:07Z', 'nvd_published_at': '2021-12-15T15:15:00Z'}
1.4.0
GHSA-6gww-qpm6-mc2g
2021-11-29T15:08:38Z
2021-12-02T17:51:51Z
null
['CVE-2021-23718']
Server-Side Request Forgery in ssrf-agent
The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ssrf-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718'}, {'type': 'WEB', 'url': 'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'}, {'type': 'PACKAGE', 'url': 'https://github.com/welefen/ssrf-agent'}, {'type': 'WEB', 'url': 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211203-0005/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T19:15:40Z', 'nvd_published_at': '2021-11-22T17:15:00Z'}
1.4.0
GHSA-hjhp-hwfj-hwf3
2021-12-06T21:43:09Z
2021-12-10T20:20:08Z
null
['CVE-2021-4005']
Cross Site Request Forgery in firefly-iii
firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4005'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:43:09Z', 'nvd_published_at': '2021-12-04T12:15:00Z'}
1.4.0
GHSA-c6c4-jmqx-3r33
2021-05-25T16:23:58Z
2021-12-09T19:30:14Z
null
['CVE-2020-11611']
Open Redirect in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11611'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:23:58Z', 'nvd_published_at': '2020-04-07T18:15:00Z'}
1.4.0
GHSA-4f6x-49g2-99fm
2021-07-02T16:59:18Z
2021-12-10T18:57:41Z
null
['CVE-2021-35513']
Cross-site Scripting in Mermaid
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/issues/2122'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/pull/2123'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T18:34:26Z', 'nvd_published_at': '2021-06-27T12:15:00Z'}
1.4.0
GHSA-w6v2-qchm-grj7
2021-05-24T17:12:01Z
2021-12-20T18:25:46Z
null
['CVE-2020-25039']
Insecure permissions on user namespace / fakeroot temporary rootfs in Singularity
### Impact Insecure permissions on temporary directories used in fakeroot or user namespace container execution. When a Singularity action command (run, shell, exec) is run with the fakeroot or user namespace option, Singularity will extract a container image to a temporary sandbox directory. Due to insecure permissions on the temporary directory it is possible for any user with access to the system to read the contents of the image. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running container. ### Patches This issue is addressed in Singularity 3.6.3. All users are advised to upgrade to 3.6.3. ### Workarounds The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation. ### For more information General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: * [Singularity Slack Channel](https://bit.ly/2m0g3lX) * [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.6.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-w6v2-qchm-grj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25039'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html'}]
{'cwe_ids': ['CWE-668', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:12:01Z', 'nvd_published_at': '2020-09-16T18:15:00Z'}
1.4.0
GHSA-h86j-6h6m-qjqw
2021-12-09T17:55:01Z
2021-12-10T20:26:34Z
null
['CVE-2021-4049']
Cross-Site Request Forgery in remdex/livehelperchat
An attacker is able to log out a user if a logged-in user visits the attacker's website. While this cannot harm a user's account, it can be a great annoyance and is a valid CSRF.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4049'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e'}]
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:27:25Z', 'nvd_published_at': '2021-12-07T11:15:00Z'}
1.4.0
GHSA-jfh8-c2jp-5v3q
2022-03-25T20:56:18Z
2021-12-10T00:40:56Z
null
['CVE-2021-44228']
Remote code injection in Log4j
# Summary Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. # Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. # Affected versions Any Log4J version prior to v2.15.0 is affected to this specific issue. The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible. ## Security releases Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3 ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Remediation Advice ## Updated advice for version 2.16.0 The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0). Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33). Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221). Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.15.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'fixed': '2.12.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.guicedee.services:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1.2-jre17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xbib.elasticsearch:log4j'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['6.3.2.1']}, {'package': {'ecosystem': 'Maven', 'name': 'uk.co.nichesolutions.logging.log4j:log4j-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['2.6.3-CUSTOM']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/apache/logging-log4j2/pull/608'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7rjr-3q55-vv33'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://github.com/cisagov/log4j-affected-db'}, {'type': 'WEB', 'url': 'https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://github.com/tangxiaofeng7/apache-log4j-poc'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3198'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3201'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3214'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3221'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/manual/migration.html'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211210-0007/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213189'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://twitter.com/kurtseifried/status/1469345530182455296'}, {'type': 'WEB', 'url': 'https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5020'}, {'type': 'WEB', 'url': 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Dec/2'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jul/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Mar/23'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/10/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/13/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/15/3'}]
{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-502', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T00:40:41Z', 'nvd_published_at': '2021-12-10T10:15:00Z'}
1.4.0
GHSA-9m6f-7xcq-8vf8
2023-09-14T16:15:43Z
2021-12-09T19:16:34Z
null
['CVE-2020-36183']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.00'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36183'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3003'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/12e23c962ffb4cf1857c5461d72ae54cc8008f29'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:27:59Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}
1.4.0
GHSA-2v2v-fx7r-f2fh
2021-12-14T14:45:36Z
2021-12-16T14:28:10Z
null
['CVE-2021-4082']
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:45:36Z', 'nvd_published_at': '2021-12-10T11:15:00Z'}
1.4.0
GHSA-7qm6-9v49-38m9
2023-09-11T18:40:49Z
2021-12-10T18:55:39Z
null
['CVE-2021-23402']
Prototype Pollution in record-like-deep-assign
All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality. ### PoC ```js const deepAssign = require('record-like-deep-assign'); let obj = {}; console.log("Before being polluted: " + obj.polluted); EVIL_JSON = JSON.parse('{"__proto__":{"polluted":true}}'); deepAssign({}, EVIL_JSON); console.log("After being polluted: " + obj.polluted); ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'record-like-deep-assign'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23402'}, {'type': 'PACKAGE', 'url': 'https://github.com/kripod/record-like-deep-assign'}, {'type': 'WEB', 'url': 'https://github.com/kripod/record-like-deep-assign/blob/v1.0.1/src/mod.ts%23L17-L35'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T14:32:33Z', 'nvd_published_at': '2021-07-02T16:15:00Z'}
1.4.0
GHSA-c69w-jj56-834w
2022-01-04T19:09:34Z
2021-12-16T14:12:49Z
null
['CVE-2021-44549']
Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Apache Sling Commons Messaging Mail
Apache Sling Commons Messaging Mail provides a simple layer on top of JavaMail/Jakarta Mail for OSGi to send mails via SMTPS. To reduce the risk of "man in the middle" attacks additional server identity checks must be performed when accessing mail servers. For compatibility reasons these additional checks are disabled by default in JavaMail/Jakarta Mail. The SimpleMailService in Apache Sling Commons Messaging Mail 1.0 lacks an option to enable these checks for the shared mail session. A user could enable these checks nevertheless by accessing the session via the message created by SimpleMessageBuilder and setting the property mail.smtps.ssl.checkserveridentity to true. Apache Sling Commons Messaging Mail 2.0 adds support for enabling server identity checks and these checks are enabled by default. - https://javaee.github.io/javamail/docs/SSLNOTES.txt - https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html - https://github.com/eclipse-ee4j/mail/issues/429
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.commons.messaging.mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44549'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mail/issues/429'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j'}, {'type': 'WEB', 'url': 'https://javaee.github.io/javamail/docs/SSLNOTES.txt'}, {'type': 'WEB', 'url': 'https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l8p9h2bqvkj6rhv4w8kzctb817415b7f'}]
{'cwe_ids': ['CWE-295', 'CWE-297'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:15:17Z', 'nvd_published_at': '2021-12-14T16:15:00Z'}
1.4.0
GHSA-x68c-4gmm-5g43
2021-12-03T15:19:53Z
2021-12-03T20:40:38Z
null
['CVE-2021-3985']
kimai2 is vulnerable to Cross-site Scripting
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:25:44Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-9c4x-5hgq-q3wh
2021-12-14T15:32:21Z
2021-12-08T19:52:40Z
null
['CVE-2021-41090']
Instance config inline secret exposure in Grafana
### Impact Some inline secrets are exposed in plaintext over the Grafana Agent HTTP server: * Inline secrets for metrics instance configs in the base YAML file are exposed at `/-/config` * Inline secrets for integrations are exposed at `/-/config` * Inline secrets for Consul ACL tokens and ETCD basic auth when configured for the scraping service at `/-/config`. * Inline secrets for the Kafka receiver for OpenTelemetry-Collector tracing at `/-/config`. * Inline secrets for metrics instance configs loaded from the scraping service are exposed at `/agent/api/v1/configs/{name}`. Inline secrets will be exposed to anyone being able to reach these endpoints. Secrets found in these sections are used for: * Delivering metrics to a Prometheus Remote Write system * Authenticating against a system for discovering Prometheus targets * Authenticating against a system for collecting metrics (scrape_configs and integrations) * Authenticating against a Consul or ETCD for storing configurations to distribute in scraping service mode * Authenticating against Kafka for receiving traces Non-inlined secrets, such as `*_file`-based secrets, are not impacted by this vulnerability. ### Patches Download [v0.20.1](https://github.com/grafana/agent/releases/tag/v0.20.1) or any version past [v0.21.2](https://github.com/grafana/agent/releases/tag/v0.21.2) to patch Grafana Agent. These patches obfuscate the listed impacted secrets from the vulnerable endpoints. The patches also disable the endpoints by default. Pass the command-line flag `--config.enable-read-api` to opt-in and re-enable the endpoints. ### Workarounds If for some reason you cannot upgrade, use non-inline secrets where possible. Not all configuration options may have a non-inline equivalent. You also may desire to restrict API access to Grafana Agent, with some combination of: * Restrict network interfaces Grafana Agent listens on through `http_listen_address` in the `server` block. `127.0.0.1` is the most restrictive, `0.0.0.0` is the default. * Configure Grafana Agent to use HTTPS with client authentication. * Use firewall rules to restrict external access to Grafana Agent's API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.21.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/grafana/agent/security/advisories/GHSA-9c4x-5hgq-q3wh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41090'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/pull/1152'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/commit/a5479755e946e5c7cddb793ee9adda8f5692ba11'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/agent'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/releases/tag/v0.20.1'}, {'type': 'WEB', 'url': 'https://github.com/grafana/agent/releases/tag/v0.21.2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0004/'}]
{'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:32:31Z', 'nvd_published_at': '2021-12-08T17:15:00Z'}
1.4.0
GHSA-m3rf-7m4w-r66q
2021-12-09T18:14:23Z
2021-12-09T19:09:07Z
null
['CVE-2021-41265']
Improper Authentication in Flask-AppBuilder
### Impact Improper authentication on the REST API. Allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. Only affects non database authentication types, and new REST API endpoints. ### Patches Upgrade to Flask-AppBuilder 3.3.4 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/dpgaspar/Flask-AppBuilder
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-m3rf-7m4w-r66q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41265'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.4'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:14:23Z', 'nvd_published_at': '2021-12-09T17:15:00Z'}
1.4.0
GHSA-9c22-pwxw-p6hx
2022-11-07T21:13:24Z
2021-12-14T21:47:33Z
null
['CVE-2022-39384']
OpenZeppelin Contracts initializer reentrancy may lead to double initialization
### Impact Initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution. Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor. ### Patches A fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Avoid untrusted external calls during initialization. ### References https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006 ### Credits This issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '4.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39384'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}]
{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:22:45Z', 'nvd_published_at': '2022-11-04T22:15:00Z'}
1.4.0
GHSA-qxmr-qxh6-2cc9
2021-12-08T19:29:13Z
2021-12-07T22:01:47Z
null
['CVE-2021-43805']
ReDos vulnerability on guest checkout email validation
### Impact Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`. Before the patch, it can be reproduced in the console like this: ```ruby irb(main)> Spree::EmailValidator::EMAIL_REGEXP.match "a@a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.@" processing time: 54.293660s => nil ``` To reproduce in the browser, fill in the "Customer Email" field with that fake email address during a guest checkout. Before that, you should open the browser dev tools and change the `type` attribute for that field from `email` to `text`. After entering a fake address and pressing the "Save & Continue" button, the browser will take a long term to perform the request before showing an error message for the invalid address. Eventually, making the email string even longer could lead to the exhaustion of server resources. ### Patches Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. There's an improbable chance that some orders in your system end up having associated an email address that is no longer valid. We've added a task to check precisely that: ```bash bin/rails solidus:check_orders_with_invalid_email ``` The above will print information for every affected order if any. ### Workarounds If a prompt upgrade is not an option, please, add the following to `config/application.rb`: ```ruby config.after_initialize do Spree::EmailValidator.send(:remove_const, :EMAIL_REGEXP) Spree::EmailValidator::EMAIL_REGEXP = URI::MailTo::EMAIL_REGEXP end ``` ### References - https://en.wikipedia.org/wiki/ReDoS - https://snyk.io/blog/redos-and-catastrophic-backtracking/ ### For more information If you have any questions or comments about this advisory: * Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus. * Email us at [security@solidus.io](mailto:security@soliidus.io) * Contact the core team on [Slack](http://slack.solidus.io/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_core/CVE-2021-43805.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T20:58:37Z', 'nvd_published_at': '2021-12-07T18:15:00Z'}
1.4.0
GHSA-q6gq-997w-f55g
2021-06-18T22:05:40Z
2021-12-16T19:16:40Z
null
['CVE-2020-16845']
Infinite loop in xz
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ulikunitz/xz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16845'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200924-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4848'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T22:05:40Z', 'nvd_published_at': '2020-08-06T18:15:00Z'}
1.4.0
GHSA-wjpc-cgvw-xx23
2023-09-08T21:04:57Z
2021-12-16T14:29:34Z
null
['CVE-2021-23663']
Prototype Pollution in sey
All versions of package `sey` are vulnerable to Prototype Pollution via the `deepmerge()` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'sey'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23663'}, {'type': 'PACKAGE', 'url': 'https://github.com/eserozvataf/sey'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEY-1727592'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:35:47Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}
1.4.0
GHSA-mf27-wg66-m8f5
2022-01-04T18:57:49Z
2021-12-17T20:41:09Z
null
['CVE-2020-35210']
A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35210'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T17:20:09Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}
1.4.0
GHSA-qjw2-hr98-qgfh
2022-04-08T22:16:20Z
2021-12-09T19:15:36Z
null
['CVE-2020-24750']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.6.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2798'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/6cc9f1a1af323cd156f5668a47e43bab324ae16f'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201009-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:41:09Z', 'nvd_published_at': '2020-09-17T19:15:00Z'}
1.4.0
GHSA-vxr4-rxw7-g7v6
2023-09-11T16:21:17Z
2021-12-16T14:30:56Z
null
['CVE-2021-23561']
Prototype Pollution in comb
All versions of package comb are vulnerable to Prototype Pollution via the `deepMerge()` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'comb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23561'}, {'type': 'PACKAGE', 'url': 'https://github.com/C2FO/comb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMB-1730083'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:30:03Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}
1.4.0
GHSA-ggmr-44cv-24pm
2021-12-08T23:14:41Z
2021-12-09T18:35:22Z
null
['CVE-2021-43811']
Code injection via unsafe YAML loading
### Impact Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. ### Patches The issue is fixed in version 2.3.24 and above by #964. ### For more information If you have any questions or comments about this advisory: * Open an issue in [awslabs/sockeye](https://github.com/awslabs/sockeye) * Email us at [sockeye-dev](mailto:sockeye-dev@amazon.com) ### Attribution This vulnerability was reported by Masatoshi Yoshizawa of yamory Security Team.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sockeye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.24'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/security/advisories/GHSA-ggmr-44cv-24pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43811'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/pull/964'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/sockeye'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/sockeye/releases/tag/2.3.24'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T23:14:41Z', 'nvd_published_at': '2021-12-08T23:15:00Z'}
1.4.0
GHSA-vj54-cjrx-x696
2023-09-29T17:24:54Z
2021-12-09T19:59:24Z
null
['CVE-2020-11576']
Observable Discrepancy in Argo
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise. ### Specific Go Packages Affected github.com/argoproj/argo-cd/util/session github.com/argoproj/argo-cd/server/session
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11576'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/3215'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}]
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T18:19:26Z', 'nvd_published_at': '2020-04-08T18:15:00Z'}
1.4.0
GHSA-89qr-369f-5m5x
2023-09-14T16:08:36Z
2021-12-09T19:15:46Z
null
['CVE-2020-36182']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 and 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36182'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3ded28aece694d0df39c9f0fa1ff385b14a8656b'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:58Z', 'nvd_published_at': '2021-01-07T00:15:00Z'}
1.4.0
GHSA-3p85-p4qg-hcrp
2021-12-14T15:06:00Z
2021-12-16T14:27:58Z
null
['CVE-2021-4081']
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:06:00Z', 'nvd_published_at': '2021-12-10T11:15:00Z'}
1.4.0
GHSA-97cc-825c-399g
2021-12-09T18:07:18Z
2021-12-10T20:33:29Z
null
['CVE-2021-4050']
Cross site scripting in remdex/livehelperchat
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4050'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:07:18Z', 'nvd_published_at': '2021-12-08T11:15:00Z'}
1.4.0
GHSA-6w7g-p4jh-rf92
2023-01-20T22:03:21Z
2021-12-20T18:24:43Z
null
['CVE-2020-13846']
"Verify All" Returns Success Despite Validation Failures in Singularity
### Impact The `--all / -a` option to `singularity verify` returns success even when some objects in a SIF container are not signed, or cannot be verified. The SIF objects that are not verified are reported in `WARNING` log messages, but a `Container Verified` message and exit code of `0` are returned. Workflows that verify a container using `--all / -a` and use the exit code as an indicator of success are vulnerable to running SIF containers that have unsigned, or modified, objects that may be exploited to introduce malicious behavior. ``` $ singularity verify -a image.sif WARNING: Missing signature for SIF descriptor 2 (JSON.Generic) WARNING: Missing signature for SIF descriptor 3 (FS) Container is signed by 1 key(s): Verifying partition: Def.FILE: 12045C8C0B1004D058DE4BEDA20C27EE7FF7BA84 [LOCAL] Unit Test <unit@test.com> [OK] Data integrity verified INFO: Container verified: image.sif $ echo $? 0 ``` ### Patches Singularity 3.6.0 has a new implementation of sign/verify that fixes this issue. All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0. Version 3.6.0 includes a `--legacy-insecure` flag for the `singularity verify` command, that will perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. ### Workarounds If you are unable to update to 3.6.0 ensure that you do not rely on the return code of `singularity verify --all / -a` as an indicator of trust in a container. Note that other issues in the sign/verify implementation in Singularity < 3.6.0 allow additional means to introduce malicious behavior to a signed container. ### For more information General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the: * [Singularity Slack Channel](https://bit.ly/2m0g3lX) * [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-6w7g-p4jh-rf92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13846'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/singularity'}, {'type': 'WEB', 'url': 'https://medium.com/sylabs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:12:04Z', 'nvd_published_at': '2020-07-14T18:15:00Z'}
1.4.0
GHSA-792j-9wj3-j634
2023-09-07T18:46:54Z
2021-12-10T20:30:52Z
null
['CVE-2021-44684']
Command injection in github-todos
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'github-todos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44684'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/5'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/5'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:28:47Z', 'nvd_published_at': '2021-12-07T00:15:00Z'}
1.4.0
GHSA-xmgj-5fh3-xjmm
2021-12-17T19:34:45Z
2021-12-17T19:59:13Z
null
['CVE-2021-43840']
Path traversal when MessageBus::Diagnostics is enabled
### Impact Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. ### Patches Patched in 3.3.7. ### Workarounds Disable MessageBus::Diagnostics in production like environments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'message_bus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43840'}, {'type': 'WEB', 'url': 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/discourse/message_bus'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/message_bus/CVE-2021-43840.yml'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:34:45Z', 'nvd_published_at': '2021-12-17T19:15:00Z'}
1.4.0
GHSA-mh9j-v6mq-pfch
2022-03-18T15:08:03Z
2021-12-04T00:00:53Z
null
['CVE-2021-43676']
Path manipulation in matyhtf/framework
matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php. The issue was fixed in version 3.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'matyhtf/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43676'}, {'type': 'WEB', 'url': 'https://github.com/matyhtf/framework/issues/206'}, {'type': 'WEB', 'url': 'https://github.com/matyhtf/framework/commit/25084603b7ea771eebe263d39744fe6abf1f8d61'}, {'type': 'PACKAGE', 'url': 'https://github.com/matyhtf/framework'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:51:34Z', 'nvd_published_at': '2021-12-03T14:15:00Z'}
1.4.0
GHSA-8w26-6f25-cm9x
2023-09-14T15:52:47Z
2021-12-09T19:16:02Z
null
['CVE-2020-36185']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36185'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2998'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/567194c53ae91f0a14dc27239afb739b1c10448a'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:37:42Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}
1.4.0
GHSA-8fp4-rp6c-5gcv
2021-12-02T21:28:29Z
2021-12-02T22:25:54Z
null
['CVE-2021-43795']
Path Traversal in com.linecorp.armeria:armeria
### Impact An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. ### Patches Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. ### Workarounds This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path, e.g. ```java Server .builder() .serviceUnder( "/files", FileService .of(...) .decorate((delegate, ctx, req) -> { String path = req.headers().path(); if (path.contains("%2f") || path.contains("%2F")) { return HttpResponse.of(HttpStatus.BAD_REQUEST); } return delegate.serve(ctx, req); }) ) .build() ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [line/armeria](https://github.com/line/armeria) * Chat with us at [Slack](https://armeria.dev/s/slack) ### Credits This vulnerability was originally reported by Abdallah Zaher ([elcayser-0x0a](https://hackerone.com/elcayser-0x0a?type=user)).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43795'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/pull/3855'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284'}, {'type': 'PACKAGE', 'url': 'https://github.com/line/armeria'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:28:29Z', 'nvd_published_at': '2021-12-02T18:15:00Z'}
1.4.0
GHSA-g54h-m393-cpwq
2021-05-24T20:46:53Z
2021-12-20T18:21:54Z
null
[]
devices resource list treated as a blacklist by default
### Impact Contrary to the [OCI runtime specification](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist), `runc`'s implementation of the `linux.resources.devices` list was a black-list by default. This means that users who created their own `config.json` objects and didn't prefix a deny-all rule (`{"allow": false, "permissions": "rwm"}` or equivalent) were not provided protection by the `devices` cgroup. This would allow malicious containers (with sufficient privileges) to create arbitrary device inodes (assuming they have `CAP_MKNOD`) and operate on any device inodes they may have access to (assuming they have regular Unix DAC permissions). However, most (if not all) programs that make use of `runc` include this deny-all rule. This was most likely added before the specification mandated a white-list of devices, and the fact that all programs wrote their own deny-all rule obscured the existence of this bug for several years. In fact, even the specification's examples include a default deny-all rule! We therefore believe that while this is a security bug (and has been fixed as such), it was almost certainly not exploitable in the wild due to the inclusion of default deny-all rules by all known users of `runc` -- hence why this advisory has low severity. ### Patches This issue has been fixed in [a patch that was part of a larger rework of the devices cgroup code in runc](https://github.com/opencontainers/runc/pull/2391) -- which lead to the discovery of this security bug. Users should upgrade to 1.0.0-rc91 as soon as it is released, or wait for your distribution to backport the relevant fixes. ### Workarounds If you are using `runc` directly, ensure that there is a deny-all entry at the beginning of `linux.resources.devices` -- such an entry would look like `{"allow": false, "permissions": "rwm"}` (all other fields are ignored, though `type` must be set to `"a"` or `null` if it is present). Users which consume `runc` through another program should check whether their containers are operating under a white-list -- this can be done by reading `/sys/fs/cgroup/devices/devices.list` inside the container. If the file contains only the entry `a *:* rwm` (meaning the cgroup is in black-list mode, which likely means "allow all device access") then your containers are vulnerable to this issue. As always, we recommend **in the strongest possible terms** that all of our users enable user namespaces on all of their workloads (or pressure their vendors to do so). User namespaces are one of the most significant defense-in-depth protections you can enable for containers, and have prevented many container-related vulnerabilities (both kernel 0days as well as bugs in container runtimes, such as this one). ### References * https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/devices.html * [opencontainers/runtime-spec/config-linux.md#device-whitelist](https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config-linux.md#device-whitelist) * https://github.com/opencontainers/runc/pull/2391 ### For more information If you have any questions or comments about this advisory: * [Open an issue in this repo](https://github.com/opencontainers/runc/issues/new). * Email us at <security@opencontainers.org>.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc91'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc90'}}]
[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-g54h-m393-cpwq'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:46:53Z', 'nvd_published_at': None}
1.4.0
GHSA-7hpj-hfcr-5qwm
2021-12-06T18:13:11Z
2021-12-06T18:17:38Z
null
['CVE-2019-14867']
Code injection in FreeIPA
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.2'}, {'fixed': '4.6.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14867'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:4268'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0378'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/ipa/PYSEC-2019-28.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.6.7'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.7.4'}, {'type': 'WEB', 'url': 'https://www.freeipa.org/page/Releases/4.8.3'}]
{'cwe_ids': ['CWE-400', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T18:13:11Z', 'nvd_published_at': None}
1.4.0
GHSA-7fm6-gxqg-2pwr
2021-07-13T19:51:48Z
2021-12-10T17:26:06Z
null
['CVE-2021-23389']
Code Injection in total.js
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T19:51:48Z', 'nvd_published_at': '2021-07-12T16:15:00Z'}
1.4.0
GHSA-fpfv-jqm9-f5jm
2022-06-21T20:12:53Z
2021-12-18T00:00:41Z
null
['CVE-2021-34141']
Incorrect Comparison in NumPy
Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34141'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18993'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18993#issuecomment-1010735102'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpfv-jqm9-f5jm'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/numpy/PYSEC-2021-855.yaml'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:12:53Z', 'nvd_published_at': '2021-12-17T19:15:00Z'}
1.4.0
GHSA-55x5-fj6c-h6m8
2022-08-11T20:41:28Z
2021-12-13T18:14:36Z
null
['CVE-2021-43818']
lxml's HTML Cleaner allows crafted and SVG embedded scripts to pass through
### Impact The HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5. ### Patches The issue has been resolved in lxml 4.6.5. ### Workarounds None. ### References The issues are tracked under the report IDs GHSL-2021-1037 and GHSL-2021-1038.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43818'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/lxml/lxml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-06'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220107-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5043'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-13T18:12:54Z', 'nvd_published_at': '2021-12-13T18:15:00Z'}
1.4.0
GHSA-r695-7vr9-jgc2
2022-02-08T21:37:40Z
2021-12-09T19:16:51Z
null
['CVE-2020-36187']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36187'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2997'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3e8fa3beea49ea62109df9e643c9cb678dabdde1'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:23:27Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}
1.4.0
GHSA-j85f-xw9x-ffwp
2022-01-04T18:52:13Z
2021-12-17T20:00:12Z
null
['CVE-2021-4121']
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4121'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/6b5967198e43b6fbb3b2715b49c6cd5b12ce08c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:31:47Z', 'nvd_published_at': '2021-12-16T08:15:00Z'}
1.4.0
GHSA-rpg7-q4cv-p466
2022-01-04T18:52:37Z
2021-12-17T20:00:16Z
null
['CVE-2021-4123']
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.90'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:29:07Z', 'nvd_published_at': '2021-12-16T10:15:00Z'}
1.4.0
GHSA-94g7-hpv8-h9qm
2021-12-14T20:00:34Z
2021-12-14T21:46:35Z
null
[]
Remote code injection in Log4j
### Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. More Details: https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ### Patches Version 1.11.1 of the Splunk Logging for Java library. There is also a backport to version 1.6.2 released as a patch: 1.6.2-0-0. ### Workarounds If upgrading is not possible, then ensure the -Dlog4j2.formatMsgNoLookups=true system property is set on both client- and server-side components. ### References https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/splunk/splunk-library-javalogging/issues * Email us at [devinfo@splunk.com](mailto:devinfo@splunk.com)
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.splunk.logging:splunk-library-javalogging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/splunk/splunk-library-javalogging/security/advisories/GHSA-94g7-hpv8-h9qm'}, {'type': 'PACKAGE', 'url': 'https://github.com/splunk/splunk-library-javalogging'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T20:00:34Z', 'nvd_published_at': None}
1.4.0
GHSA-j28q-p8ww-cp87
2021-12-15T15:23:03Z
2021-12-16T14:33:09Z
null
['CVE-2021-23700']
Prototype Pollution in merge-deep2.
All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'merge-deep2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23700'}, {'type': 'PACKAGE', 'url': 'https://github.com/luyuan/merge-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:33:34Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}
1.4.0
GHSA-7rg2-qxmf-hhx9
2021-12-15T15:28:49Z
2021-12-09T19:08:58Z
null
['CVE-2021-41246']
Session fixation in express-openid-connect
### Overview Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities. ### Am I affected? You are affected by this vulnerability if you are using `express-openid-connect` version `2.3.0` up to and including `2.5.1` and use a custom session store. ### How to fix that? Upgrade to version `>= 2.5.2`. ### Will this update impact my users? The fix provided in patch will not affect your users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-openid-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41246'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f'}, {'type': 'PACKAGE', 'url': 'https://github.com/auth0/express-openid-connect'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T18:09:56Z', 'nvd_published_at': '2021-12-09T16:15:00Z'}
1.4.0
GHSA-2wr2-8qjq-gh55
2021-12-06T21:35:33Z
2021-12-16T15:27:35Z
null
['CVE-2021-23264']
Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23264'}, {'type': 'WEB', 'url': 'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107'}]
{'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:35:33Z', 'nvd_published_at': '2021-12-02T16:15:00Z'}
1.4.0
GHSA-p33m-7w7f-gmj8
2021-07-29T16:41:29Z
2021-12-10T20:05:07Z
null
['CVE-2020-7644']
Uncontrolled Resource Consumption in fun-map
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fun-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7644'}, {'type': 'WEB', 'url': 'https://github.com/nathan7/fun-map/blob/master/index.js#L137,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FUNMAP-564436'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:37:47Z', 'nvd_published_at': '2020-04-28T19:15:00Z'}
1.4.0
GHSA-6jqj-f58p-mrw3
2022-10-06T21:46:48Z
2021-12-20T18:17:33Z
null
['CVE-2020-15091']
Denial of Service in TenderMint
### Description **Denial of Service** Tendermint 0.33.0 and above allow block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it without changing the chainID. (It is a [misconfiguration](https://docs.tendermint.com/master/tendermint-core/using-tendermint.html) to reuse chainIDs.) Correct block proposers will accidentally include signatures for the wrong block if they see these signatures, and then commits won't validate, making all proposed blocks invalid. A malicious validator (even with a minimal amount of stake) can use this vulnerability to completely halt the network. Tendermint 0.33.6 checks all the signatures are for the block with +2/3 majority before creating a commit. **False Witness** Tendermint 0.33.1 and above are no longer fully verifying commit signatures during block execution - they stop after +2/3. This means proposers can propose blocks that contain valid +2/3 signatures and then the rest of the signatures can be whatever they want. They can claim that all the other validators signed just by including a CommitSig with arbitrary signature data. While this doesn't seem to impact safety of Tendermint per se, it means that Commits may contain a lot of invalid data **. _** This was already true of blocks, since they could include invalid txs filled with garbage, but in that case the application knew that they are invalid and could punish the proposer. But since applications didn't--and don't-- verify commit signatures directly (they trust Tendermint to do that), they won't be able to detect it._ This can impact incentivization logic in the application that depends on the LastCommitInfo sent in BeginBlock, which includes which validators signed. For instance, Gaia incentivizes proposers with a bonus for including more than +2/3 of the signatures. But a proposer can now claim that bonus just by including arbitrary data for the final -1/3 of validators without actually waiting for their signatures. There may be other tricks that can be played because of this. Tendermint 0.33.6 verifies all the signatures during block execution ***. _*** Please note that the light client does not check nil votes and exits as soon as 2/3+ of the signatures are checked._ ### Impact - All nodes - The network stops due to having a commit with a wrong signature. ### Patches - v0.33.6 ### Workarounds No workarounds. ### References - https://github.com/tendermint/tendermint/issues/4926 ### For more information If you have any questions or comments about this advisory: * Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) * Email us at [security@tendermint.com](mailto:security@tendermint.com) More information can be found [here](https://tendermint.com/security/).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.0'}, {'fixed': '0.33.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15091'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/issues/4926'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/pull/5426'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340'}, {'type': 'PACKAGE', 'url': 'https://github.com/tendermint/tendermint'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#v0336'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0090'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:49:56Z', 'nvd_published_at': None}
1.4.0
GHSA-v525-c3g5-cg9p
2021-03-15T23:45:19Z
2021-12-10T17:15:49Z
null
['CVE-2020-36282']
Unsafe Deserialization that can Result in Code Execution
JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq.jms:rabbitmq-jms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.rabbitmq.jms:rabbitmq-jms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36282'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/issues/135'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2'}, {'type': 'WEB', 'url': 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0'}, {'type': 'WEB', 'url': 'https://medium.com/@ramon93i7/a99645d0448b'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T23:45:19Z', 'nvd_published_at': '2021-03-12T01:15:00Z'}
1.4.0
GHSA-jm34-xm8m-w958
2021-05-19T22:31:56Z
2021-12-20T18:04:40Z
null
['CVE-2017-1000070']
Open Redirect in oauth2_proxy
The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/bitly/oauth2_proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/pull/359'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:31:56Z', 'nvd_published_at': None}
1.4.0
GHSA-vfqx-33qm-g869
2023-09-14T16:04:17Z
2021-12-09T19:16:59Z
null
['CVE-2020-36189']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 an 2.6.7.5 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36189'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2996'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/33d96c13fe18a2dad01b19ce195548c9acea9da4'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:14:22Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}
1.4.0
GHSA-4m6q-rxhm-675w
2021-07-28T23:08:13Z
2021-12-09T19:54:29Z
null
['CVE-2020-7636']
OS Command Injection in adb-driver
adb-driver through 0.1.8 is vulnerable to Command Injection.It allows execution of arbitrary commands via the command function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'adb-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7636'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/adb-driver'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:33:09Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}
1.4.0
GHSA-7rjr-3q55-vv33
2022-02-24T18:12:21Z
2021-12-14T18:01:28Z
null
['CVE-2021-45046']
Incomplete fix for Apache Log4j vulnerability
# Impact The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Mitigation Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.16.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45046'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/2.x/security.html'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2021-44228'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5022'}, {'type': 'WEB', 'url': 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/930724'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/15/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/18/1'}]
{'cwe_ids': ['CWE-502', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T17:55:00Z', 'nvd_published_at': '2021-12-14T19:15:00Z'}
1.4.0
GHSA-gfhx-jjwq-63gv
2021-12-08T20:20:15Z
2021-12-10T20:24:11Z
null
['CVE-2021-42567']
Cross-site Scripting in Apereo CAS
Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apereo.cas:cas-server-core-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42567'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/commit/376bf087d6d4267f61fc9f8028aa0d1ef407c3f0'}, {'type': 'WEB', 'url': 'https://apereo.github.io/2021/10/18/restvuln/'}, {'type': 'PACKAGE', 'url': 'https://github.com/apereo/cas'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/releases'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:20:15Z', 'nvd_published_at': '2021-12-07T22:15:00Z'}