schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-hx6g-q9v2-xh7v
2021-12-06T22:01:08Z
2021-12-16T15:30:48Z
null
['CVE-2021-3980']
Information exposure in elgg
elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980'}, {'type': 'WEB', 'url': 'https://github.com/Elgg/Elgg/pull/13791'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}, {'type': 'PACKAGE', 'url': 'https://github.com/Elgg/Elgg'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac'}]
{'cwe_ids': ['CWE-359'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:01:08Z', 'nvd_published_at': '2021-12-03T15:15:00Z'}
1.4.0
GHSA-8qv8-fq5w-p966
2021-12-16T14:09:58Z
2021-12-16T14:26:00Z
null
['CVE-2021-4097']
phpservermon is vulnerable to CRLF Injection
phpservermon is vulnerable to Improper Neutralization of CRLF Sequences.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4097'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpservermon/phpservermon'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43'}]
{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:10:46Z', 'nvd_published_at': '2021-12-12T00:15:00Z'}
1.4.0
GHSA-273r-rm8g-7f3x
2021-12-13T20:20:28Z
2021-12-13T21:33:04Z
null
['CVE-2021-43801']
Uncaught Exception in mercurius
### Impact Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. ### Patches The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. ### Workarounds Use a custom error handler. ### References See https://github.com/mercurius-js/mercurius/issues/677 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/mercurius-js/mercurius * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mercurius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.10.0'}, {'fixed': '8.11.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801'}, {'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/issues/677'}, {'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'}, {'type': 'PACKAGE', 'url': 'https://github.com/mercurius-js/mercurius'}]
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-13T20:20:28Z', 'nvd_published_at': '2021-12-13T20:15:00Z'}
1.4.0
GHSA-4gwh-2pqx-f5cc
2023-09-19T10:06:45Z
2021-12-03T20:48:42Z
null
['CVE-2021-44277']
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T18:56:32Z', 'nvd_published_at': '2021-12-01T14:15:00Z'}
1.4.0
GHSA-m6x4-97wx-4q27
2022-02-08T21:38:27Z
2021-12-09T19:16:26Z
null
['CVE-2020-36184']
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36184'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2998'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/567194c53ae91f0a14dc27239afb739b1c10448a'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:30:19Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}
1.4.0
GHSA-cfqj-9g2g-w7q6
2022-08-11T14:51:18Z
2021-12-02T17:49:14Z
null
['CVE-2021-40369']
Apache JSPWiki Cross-site Scripting due to carefully crafted plugin link invocation
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40369'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/03/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-25T00:20:27Z', 'nvd_published_at': '2021-11-24T12:15:00Z'}
1.4.0
GHSA-rf3m-mhv7-x39f
2023-02-13T18:18:48Z
2021-12-20T16:58:22Z
null
['CVE-2015-5250']
Denial of Service in OpenShift Origin
The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5250'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/issues/4374'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/commit/dace5075e31b74703e944b6b3ebe8836be8d1b9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1736'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5250'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1259867'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5250'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:21:13Z', 'nvd_published_at': '2015-09-08T15:59:00Z'}
1.4.0
GHSA-7q9f-x6rm-qmxr
2022-02-24T18:19:11Z
2021-12-09T19:27:46Z
null
['CVE-2020-7635']
Command Injection in compass-compile
compass-compile through 0.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'compass-compile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7635'}, {'type': 'PACKAGE', 'url': 'https://github.com/quaertym/compass-compile'}, {'type': 'WEB', 'url': 'https://github.com/quaertym/compass-compile/blob/master/lib/compass.js#L25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T15:32:23Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}
1.4.0
GHSA-f34m-x9pj-62vq
2021-12-01T14:34:05Z
2021-12-01T18:29:02Z
null
['CVE-2021-43785']
Cross-Site Scripting Vulnerability in @joeattardi/emoji-button
### Impact There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2: - A URL for a custom emoji - An i18n string In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code. ### Patches This vulnerability is fixed starting in version 4.6.2. This is resolved by properly escaping strings that are inserted into the HTML document. ### Workarounds There is no workaround other than upgrading to a non-vulnerable version. ### Credit This issue was discovered by GitHub team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh) and was reported by the GitHub Security Lab team.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@joeattardi/emoji-button'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785'}, {'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16'}, {'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/joeattardi/emoji-button'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:21:36Z', 'nvd_published_at': '2021-11-26T19:15:00Z'}
1.4.0
GHSA-v6rh-hp5x-86rv
2022-02-14T22:20:29Z
2021-12-09T19:09:37Z
null
['CVE-2021-44420']
Potential bypass of an upstream access control based on URL paths in Django
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. This issue has low severity, according to the Django security policy.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.1.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44420'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0006/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/dec/07/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/12/07/1'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:35:08Z', 'nvd_published_at': '2021-12-08T00:15:00Z'}
1.4.0
GHSA-59g4-hpg3-3gcp
2022-01-04T18:53:43Z
2021-12-14T21:44:03Z
null
['CVE-2021-43821']
Files Accessible to External Parties in Opencast
Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface. ### Impact Before Opencast 10.6, Opencast would [open and include local files during ingests](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. For example, to expose the `custom.properties` of develop.opencast.org via the asset manager, an attacker could have run: ``` curl -f -i -u admin:opencast \ https://develop.opencast.org/ingest/addMediaPackage/fast \ -F 'flavor=presenter/source'\ -F mediaUri=file:///srv/opencast/opencast-dist-allinone/etc/custom.properties\ -F title="custom.properties" ``` An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. ### Patches The issue has been fixed in Opencast 10.6 and 11.0. ### Workarounds You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating. ### References - [Example of problematic code](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). - [Patch fixing the issue](https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764) ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) * Email us at [security@opencast.org](mailto:security@opencast.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-ingest-service-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43821'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl'}]
{'cwe_ids': ['CWE-552'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:29:54Z', 'nvd_published_at': '2021-12-14T20:15:00Z'}
1.4.0
GHSA-9c5c-5j4h-8q2c
2022-08-11T18:45:55Z
2021-12-16T19:40:26Z
null
['CVE-2021-4119']
BookStack is vulnerable to Improper Access Control.
BookStack prior to version 21.11.3 is vulnerable to Improper Access Control. A logged-in user with no privileges OR guest user (if public access enabled) can access the /search/users/select AJAX endpoint meant for admins to manage audit logs, to dump all usernames existing in the Bookstack database. This can also be used to harvest email belonging to a user because BookStack also uses the code where(`email`, `like`, `%` . $search . `%`) to search for users based on email.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4119'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.3'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:36:38Z', 'nvd_published_at': '2021-12-15T20:15:00Z'}
1.4.0
GHSA-j377-2x76-558h
2022-05-04T03:12:57Z
2021-12-10T17:25:21Z
null
['CVE-2021-36716']
Improper Input Validation in is-email
is-email helps validate an email address. A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'is-email'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36716'}, {'type': 'PACKAGE', 'url': 'https://github.com/segmentio/is-email'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-email/releases'}, {'type': 'WEB', 'url': 'https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/'}]
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T18:43:45Z', 'nvd_published_at': '2021-07-14T16:15:00Z'}
1.4.0
GHSA-wf5p-f5xr-c4jj
2021-12-01T21:03:52Z
2021-12-02T17:48:53Z
null
['CVE-2021-44427']
SQL Injection in rosariosis
An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44427'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/328'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-811'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T21:03:52Z', 'nvd_published_at': '2021-11-29T22:15:00Z'}
1.4.0
GHSA-7rpc-9m88-cf9w
2021-12-01T14:32:13Z
2021-12-01T18:29:42Z
null
['CVE-2021-41243']
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS
There is an OS Command Injection Vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. Target baserCMS 4.5.3 and earlier versions Vulnerability OS Command Injection Vulnerability. Countermeasures Update to the latest version of baserCMS Credits Akagi Yusuke @NTT-ME
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:12:04Z', 'nvd_published_at': '2021-11-26T18:15:00Z'}
1.4.0
GHSA-6w9p-88qg-p3g3
2023-08-31T15:31:45Z
2021-12-03T20:44:48Z
null
['CVE-2021-25967']
Cross-site Scripting in CKAN
In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ckan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25967'}, {'type': 'WEB', 'url': 'https://github.com/ckan/ckan/pull/6477'}, {'type': 'WEB', 'url': 'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckan/ckan'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:23:05Z', 'nvd_published_at': '2021-12-01T14:15:00Z'}
1.4.0
GHSA-wjqc-j537-j9gj
2022-08-30T17:34:55Z
2021-12-08T00:01:44Z
null
['CVE-2021-44685']
Command injection in git-it-electron
Git-it through 4.4.0 allows OS command injection at the Branches Aren't Just For Birds challenge step. During the verification process, it attempts to run the reflog command followed by the current branch name (which is not sanitized for execution).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-it-electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44685'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/3'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jlord/git-it-electron'}, {'type': 'WEB', 'url': 'https://github.com/jlord/git-it-electron/releases'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:57:55Z', 'nvd_published_at': '2021-12-07T00:15:00Z'}
1.4.0
GHSA-r8j5-h5cx-65gg
2021-12-10T19:02:24Z
2021-12-10T19:02:37Z
null
['CVE-2021-29059']
ReDOS in IS-SVG
A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'is-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29059'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/is-svg'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/is-svg'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T15:40:38Z', 'nvd_published_at': '2021-06-21T16:15:00Z'}
1.4.0
GHSA-553q-hpvp-q8pc
2021-12-07T21:24:53Z
2021-12-10T20:22:15Z
null
['CVE-2021-4075']
Server-Side Request Forgery in snipe/snipe-it
Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to higher-impact.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0-GM'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T21:24:53Z', 'nvd_published_at': '2021-12-06T21:15:00Z'}
1.4.0
GHSA-8w3x-r6x7-c5r5
2021-12-14T14:44:34Z
2021-12-16T14:28:27Z
null
['CVE-2021-4084']
Cross-site Scripting in pimcore
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:44:34Z', 'nvd_published_at': '2021-12-10T12:15:00Z'}
1.4.0
GHSA-rp42-c45j-g46x
2021-12-16T14:09:16Z
2021-12-16T14:12:23Z
null
['CVE-2021-4107']
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4107'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:17:18Z', 'nvd_published_at': '2021-12-14T15:15:00Z'}
1.4.0
GHSA-7fr2-94h7-ccg2
2022-01-04T18:58:33Z
2021-12-17T20:41:33Z
null
['CVE-2020-35209']
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35209'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1W5KU7ffh4dheR8iD54ulABImi6byAhSI-OhEKw2adRo/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:40:51Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}
1.4.0
GHSA-rrm8-32g4-w8m3
2021-05-12T18:30:22Z
2021-12-20T18:04:46Z
null
['CVE-2017-1000069']
Cross-site Request Forgery (CSRF)
CSRF in Bitly oauth2_proxy 2.1 during authentication flow
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/bitly/oauth2_proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000069'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/pull/360'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000069'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:30:22Z', 'nvd_published_at': None}
1.4.0
GHSA-vrc7-6g8w-jh56
2022-03-11T22:59:06Z
2021-12-09T19:29:36Z
null
['CVE-2015-9544']
Improper Input Validation in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9544'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:20:26Z', 'nvd_published_at': '2020-04-07T18:15:00Z'}
1.4.0
GHSA-3m3h-v9hv-9j4h
2021-11-24T20:01:39Z
2021-12-02T17:49:40Z
null
['CVE-2021-25986']
Cross-site Scripting in django-wiki
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.20'}, {'fixed': '0.7.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25986'}, {'type': 'WEB', 'url': 'https://github.com/django-wiki/django-wiki/pull/1148'}, {'type': 'WEB', 'url': 'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-wiki/django-wiki'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:01:39Z', 'nvd_published_at': '2021-11-23T20:15:00Z'}
1.4.0
GHSA-7289-chwj-7h86
2021-12-06T22:05:08Z
2021-12-10T20:18:30Z
null
['CVE-2021-44278']
Path traversal in librenms/librenms
Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44278'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:05:08Z', 'nvd_published_at': '2021-12-03T13:15:00Z'}
1.4.0
GHSA-wc7v-77jr-5c3m
2021-12-03T15:35:34Z
2021-12-03T20:38:37Z
null
['CVE-2021-3944']
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9'}]
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T15:35:34Z', 'nvd_published_at': '2021-12-02T17:15:00Z'}
1.4.0
GHSA-hwqf-gcqm-7353
2021-06-30T17:38:02Z
2021-12-10T18:56:57Z
null
['CVE-2021-23400']
Header injection in nodemailer
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodemailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/issues/1289'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:38:02Z', 'nvd_published_at': '2021-06-29T12:15:00Z'}
1.4.0
GHSA-2g8g-63j4-9w3r
2021-11-29T19:39:57Z
2021-12-01T18:29:12Z
null
[]
RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend
The templating library used by the scaffolder backend assumes that templates are trusted which is an undesired property of the scaffolder-backend. This has now been mitigated by sandboxing the template code execution. ### Impact A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template yaml definition itself and not by user input data. ### Patches This is vulnerability is patched in version `0.15.14` of `@backstage/plugin-scaffolder-backend`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
[]
[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-2g8g-63j4-9w3r'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:39:57Z', 'nvd_published_at': None}
1.4.0
GHSA-5m6c-jp6f-2vcv
2021-05-24T20:58:18Z
2021-12-20T17:58:59Z
null
['CVE-2020-4037']
Open Redirect in OAuth2 Proxy
### Impact As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4037'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:58:18Z', 'nvd_published_at': None}
1.4.0
GHSA-fwh7-v4gf-xv7w
2022-01-03T15:55:40Z
2021-12-16T21:00:45Z
null
['CVE-2021-4116']
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4116'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:40:11Z', 'nvd_published_at': '2021-12-15T14:15:00Z'}
1.4.0
GHSA-4jhc-wjr3-pwh2
2022-01-04T18:59:32Z
2021-12-17T20:40:38Z
null
['CVE-2020-35211']
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node.
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35211'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:48:40Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}
1.4.0
GHSA-mmjf-f5jw-w72q
2022-09-19T21:58:21Z
2021-12-15T00:00:42Z
null
['CVE-2021-4044']
Invalid handling of `X509_verify_cert()` internal errors in libssl
Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4044'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=758754966791c537ea95241438454aa86f91f256'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0129.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0003/'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20211214.txt'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:01:23Z', 'nvd_published_at': '2021-12-14T19:15:00Z'}
1.4.0
GHSA-3h68-wvv6-8r5h
2021-07-28T18:09:42Z
2021-12-10T17:20:11Z
null
['CVE-2020-1940']
Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak
The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:oak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.24.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.22.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:oak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1940'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da8e2fd253ecd4d3a0de71ce255631148b54be8500225b5812f7737@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45b0e2fb6ac51c5a03952b08b5e0efde1249ecb809884cc87eb0bd99@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r601637e38ee743e845856a4e24915cb8db26ae80ca782bef91989cbc@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra295f919586b19def7cc7713d9d78595507d5f703362fccb779eeeb9@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6b3e78f5ed545c1d859d664f66c6d3fc5d731d9b1d842349654e4f0@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3023cfd45441b570c1abaa347d0cac78df97b5d3f27d674d01b3d2a@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba884dbe733781cbaaffa28b77bc37a6a9f948b3a72a1bdad5e1587c@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbef4701b5ce4d827182e70ad7b4d987a9157682ba3643e05a9ef5a7b@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc35a57ecdeae342d46f729d6bc9750ba860c101f450cc171798dba28@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0%40%3Cusers.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0@%3Cannounce.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/01/28/1'}]
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:04:32Z', 'nvd_published_at': '2020-01-28T17:15:00Z'}
1.4.0
GHSA-q3j5-32m5-58c2
2021-10-05T16:34:17Z
2021-12-20T18:21:34Z
null
['CVE-2016-3697']
Privilege Elevation in runc
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3697'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/issues/21436'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/708'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/releases/tag/v0.1.0'}, {'type': 'WEB', 'url': 'https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0070'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2016-1034.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2016-2634.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-28'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1034.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2634.html'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T18:53:49Z', 'nvd_published_at': None}
1.4.0
GHSA-hg2p-2cvq-4ppv
2023-09-05T22:42:28Z
2021-12-10T20:06:23Z
null
['CVE-2020-7642']
Cross-site scripting in lazysizes
lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: `data-vimeo`, `data-vimeoparams`, `data-youtube` and `data-ytparams` which can be abused to inject malicious JavaScript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'lazysizes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642'}, {'type': 'WEB', 'url': 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:08:07Z', 'nvd_published_at': '2020-04-22T16:15:00Z'}
1.4.0
GHSA-v39h-qm32-8gwq
2021-07-29T15:53:05Z
2021-12-09T19:57:29Z
null
['CVE-2020-7616']
Improperly Controlled Modification of Dynamically-Determined Object Attributes in express-mock-middleware
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-mock-middleware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7616'}, {'type': 'WEB', 'url': 'https://github.com/LingyuCoder/express-mock-middleware/blob/master/lib/index.js#L39'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T17:28:15Z', 'nvd_published_at': '2020-04-07T14:15:00Z'}
1.4.0
GHSA-4jwx-78vx-gm6g
2021-12-14T15:29:58Z
2021-12-10T20:34:01Z
null
['CVE-2021-4033']
Cross-Site Request Forgery in kimai2
CSRF in saving invoices / modifying status of invoices (pending and cancel only)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4033'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T20:05:32Z', 'nvd_published_at': '2021-12-09T20:15:00Z'}
1.4.0
GHSA-j5qg-w9jg-3wg3
2021-12-16T15:47:47Z
2021-12-16T18:53:57Z
null
[]
Inability to de-op players if listed in ops.txt with non-lowercase letters
### Impact Originally reported in iTXTech/Genisys#1188 ```txt PotterHarry98 potterharry98 ``` `deop PotterHarry98` will remove `potterharry98` from the ops.txt but not `PotterHarry98`. Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449 This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters. ### Patches 4d37b79ff7f9d9452e988387f97919a9a1c4954e ### Workarounds This can be easily addressed by removing the offending lines from ops.txt manually. ### For more information If you have any questions or comments about this advisory: * Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP) * Email us at [team@pmmp.io](mailto:team@pmmp.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3'}, {'type': 'WEB', 'url': 'https://github.com/iTXTech/Genisys/issues/1188'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:47:47Z', 'nvd_published_at': None}
1.4.0
GHSA-23fp-fmrv-f5px
2021-03-30T13:53:18Z
2021-12-10T17:22:01Z
null
['CVE-2020-8123']
Uncontrolled Resource Consumption in strapi
A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.18.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.18.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8123'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/c0c191c08f05fe10d7a6b1bf9475c1a651a89362'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/768574'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T13:53:18Z', 'nvd_published_at': '2020-02-04T20:15:00Z'}
1.4.0
GHSA-9w8f-7wgr-2h7g
2021-12-03T15:37:45Z
2021-12-03T20:42:59Z
null
['CVE-2021-3992']
kimai2 is vulnerable to Improper Access Control
kimai2 is vulnerable to Improper Access Control
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93'}]
{'cwe_ids': ['CWE-284', 'CWE-639', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T15:37:45Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-j7c3-96rf-jrrp
2021-12-16T18:57:47Z
2021-12-16T21:01:51Z
null
[]
Critical vulnerability in log4j may affect generated PEAR projects
### Impact UIMA PEAR projects that have been generated with the `de.averbis.textanalysis:pear-archetype ` version `2.0.0` have a maven dependency with scope `test` to` log4j 2.8.2` and might be affected by CVE-2021-44228. ### Patches - The issue has been resolved in `de.averbis.textanalysis:pear-archetype ` version `2.0.1`. Please make sure to use `de.averbis.textanalysis:pear-archetype ` version >= `2.0.1` for generating new PEAR projects. - Existing maven PEAR projects can be patched by manually upgrading to `log4j` >= `2.16.0` in `pom.xml`. ### References https://www.lunasec.io/docs/blog/log4j-zero-day/ ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/averbis/pear-archetype/issues
[]
[{'package': {'ecosystem': 'Maven', 'name': 'de.averbis.textanalysis:pear-archetype'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/averbis/pear-archetype/security/advisories/GHSA-j7c3-96rf-jrrp'}, {'type': 'WEB', 'url': 'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/averbis/pear-archetype'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:57:47Z', 'nvd_published_at': None}
1.4.0
GHSA-2x32-jm95-2cpx
2021-06-01T17:58:22Z
2021-12-20T17:52:12Z
null
['CVE-2020-27847']
Authentication Bypass in dex
A vulnerability exists in the SAML connector of the github.com/dexidp/dex library used to process SAML Signature Validation. This flaw allows an attacker to bypass SAML authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects dex versions before 2.27.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27847'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1907732'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}]
{'cwe_ids': ['CWE-228', 'CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:58:22Z', 'nvd_published_at': '2021-05-28T11:15:00Z'}
1.4.0
GHSA-9x7m-9hpg-xxmw
2021-07-19T15:44:57Z
2021-12-10T17:24:16Z
null
['CVE-2021-25953']
Prototype Pollution in putil-merge
Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'putil-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25953'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25953'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:19:36Z', 'nvd_published_at': '2021-07-14T11:15:00Z'}
1.4.0
GHSA-95jp-77w6-qj52
2021-12-06T18:19:24Z
2021-12-06T18:17:45Z
null
['CVE-2009-4924']
Cross-site Scripting in python-cjson
Python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-cjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4924'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/python-cjson/PYSEC-2010-26.yaml'}, {'type': 'WEB', 'url': 'http://pypi.python.org/pypi/python-cjson/'}, {'type': 'WEB', 'url': 'http://t3.dotgnu.info/blog/insecurity/quotes-dont-help.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T18:17:00Z', 'nvd_published_at': None}
1.4.0
GHSA-3q9x-w53p-jg53
2023-09-13T21:57:41Z
2021-12-09T19:52:03Z
null
['CVE-2020-7634']
OS Command Injection in heroku-addonpool
heroku-addonpool through 0.1.15 is vulnerable to Command Injection. The second parameter of the exported function `HerokuAddonPool(id, app, opt)` can be controlled by users without any sanitization. **PoC** ```js var Root = require("heroku-addonpool"); var root = Root("sss", "& touch JHU", {}); root.setup(); ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'heroku-addonpool'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7634'}, {'type': 'WEB', 'url': 'https://github.com/nodef/heroku-addonpool/commit/b1a5b316473ac92d783f3d54ee048d54082da38d'}, {'type': 'WEB', 'url': 'https://github.com/nodef/heroku-addonpool/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T22:14:43Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}
1.4.0
GHSA-v95c-p5hm-xq8f
2023-08-29T22:55:54Z
2021-12-07T21:22:39Z
null
['CVE-2021-43784']
Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC
### Impact In runc, [netlink](https://www.man7.org/linux/man-pages/man7/netlink.7.html) is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. Prior to 9c444070ec7bb83995dbc0185da68284da71c554, in practice it was fairly difficult to specify an arbitrary-length netlink message with most container runtimes. The only user-controlled byte array was the namespace paths attributes which can be specified in runc's `config.json`, but as far as we can tell no container runtime gives raw access to that configuration setting -- and having raw access to that setting **would allow the attacker to disable namespace protections entirely anyway** (setting them to `/proc/1/ns/...` for instance). In addition, each namespace path is limited to 4096 bytes (with only 7 namespaces supported by runc at the moment) meaning that even with custom namespace paths it appears an attacker still cannot shove enough bytes into the netlink bytemsg in order to overflow the uint16 counter. However, out of an abundance of caution (given how old this bug is) we decided to treat it as a potentially exploitable vulnerability with a low severity. After 9c444070ec7bb83995dbc0185da68284da71c554 (which was not present in any release of runc prior to the discovery of this bug), all mount paths are included as a giant netlink message which means that this bug becomes significantly more exploitable in more reasonable threat scenarios. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure), though as mentioned above it appears this bug was not practically exploitable on any released version of runc to date. ### Patches The patch for this is d72d057ba794164c3cce9451a00b72a78b25e1ae and runc 1.0.3 was released with this bug fixed. ### Workarounds To the extent this is exploitable, disallowing untrusted namespace paths in container configuration should eliminate all practical ways of exploiting this bug. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug. ### References * commit d72d057ba794 ("runc init: avoid netlink message length overflows") * https://bugs.chromium.org/p/project-zero/issues/detail?id=2241 ### Credits Thanks to Felix Wilhelm from Google Project Zero for discovering and reporting this vulnerability. In particular, the fact they found this vulnerability so quickly, before we made a 1.1 release of runc (which would've been vulnerable) was quite impressive. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/opencontainers/runc)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43784'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/project-zero/issues/detail?id=2241'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0274'}]
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:09:36Z', 'nvd_published_at': '2021-12-06T18:15:00Z'}
1.4.0
GHSA-6r7c-6w96-8pvw
2022-01-04T18:56:03Z
2021-12-07T21:21:49Z
null
[]
Remote Code Execution in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. ### Description Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc. Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products. An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed. Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands). ### Releases Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds There is no workaround available that addresses all issues except updating to latest version from GitHub. ### References Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971 Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.29.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.11.29'}}]
[{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}, {'type': 'PACKAGE', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:20:20Z', 'nvd_published_at': None}
1.4.0
GHSA-gjrj-9rj4-pgwx
2021-12-17T19:33:49Z
2021-12-15T22:51:07Z
null
[]
DoS Vulnerability from Upstream Actix Web Issues
### Impact This vulnerability affects all users of the `perseus deploy` functionality who have not exported their sites to static files. If you are using the inbuilt Perseus server in production, there is a memory leak in Actix Web stemming from [this upstream issue](https://github.com/actix/actix-web/issues/1780) which can allow even a single user to cause the process to exhaust its memory on low-memory servers by continuously reloading the page. Note that this issue does not affect all Actix Web applications, but rather results from certain usage patterns which appear to be present in Perseus' server mechanics. ### Patches This vulnerability is addressed in all versions after Perseus `v0.3.0-beta.21`, which temporarily discontinues the use of `perseus-actix-web` (until the upstream bug is fixed) and switches to `perseus-warp` instead, which utilizes [Warp](https://github.com/seanmonstar/warp). Additionally, as of Perseus `v0.3.0-beta.22`, the Actix Web integration has been upgraded to use the latest unstable beta version of Actix Web, which appears to partially resolve this issue (the severity of the memory leak is reduced). However, due to the instability of this version, the default integration will remain Warp for now, and a warning will appear if you attempt to use the Actix Web integration. <details> <summary>Using the Actix Web integration</summary> If the instability of the latest beta version of Actix Web is not a concern for you, you can use this integration by adding `-i actix-web` to `perseus serve` and the like. This will print a warning about instability, and will then operate with the beta version. Please report any failures in functionality that are not security-related to the Perseus team by [opening an issue on the repository](https://github.com/arctic-hen7/perseus/issues/new/choose). Note however that switching to the Warp integration requires no code changes whatsoever unless you've ejected, so there are very few disadvantages to this change. </details> ### Workarounds Due to significant infrastructural changes within other Perseus packages that were needed to support Warp, this integration is not backward-compatible with any previous version of Perseus, meaning there are no easily feasible workarounds. If you're only in development though, this vulnerability is irrelevant until you push to production. ### CVE Status Due to GitHub's requirements, a CVE can't be issued for this security advisory because the issue is technically one with Actix Web (though it's only in combination with certain mechanics in the Perseus server that this problem arises). ### References See [this upstream issue](https://github.com/actix/actix-web/issues/1780) in Actix Web. ### For more information If you have any questions or comments about this advisory: * Open an issue on this repository * Email me at [arctic_hen7@pm.me](mailto:arctic_hen7@pm.me)
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'perseus-actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0-beta.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0-beta.21'}}]
[{'type': 'WEB', 'url': 'https://github.com/arctic-hen7/perseus/security/advisories/GHSA-gjrj-9rj4-pgwx'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/1780'}, {'type': 'PACKAGE', 'url': 'https://github.com/arctic-hen7/perseus'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T21:42:48Z', 'nvd_published_at': None}
1.4.0
GHSA-g6vq-wc8w-4g69
2021-12-03T15:19:23Z
2021-12-06T17:19:18Z
null
['CVE-2021-4015']
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4015'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/518b4ba5a7a56760902758ae0a2c6a392c2f4d37'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.6.5'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:22:54Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-f3w5-v9xx-rp8p
2021-05-20T20:10:47Z
2021-12-20T18:17:41Z
null
[]
Signature verification failure in Tendermint
_The root cause of this security vulnerability is in the Tendermint specification, and this advisory is a duplicate of https://github.com/tendermint/spec/security/advisories/GHSA-jqfc-687g-59pw._ ### Impact Tendermint light clients running versions 0.34.0 to 0.34.8 are unable to detect and punish a new kind of attack. We’re calling this a “forward lunatic attack,” or FLA. The severity of this vulnerability is _moderate_. Note that an FLA cannot be successfully executed unless there are already ⅓+ Byzantine validators, and therefore outside of Tendermint’s security model; however, it is important to be able to detect and punish these kinds of attacks in order to incentivize correct behavior. In an FLA, an attacking validator (with ⅓+ voting power) signs commit messages for arbitrary application state associated with a block height that hasn’t been seen yet, hence the name “forward lunatic attacks.” A malicious validator effectively executes a [lunatic attack](https://docs.tendermint.com/master/spec/light-client/accountability/#the-misbehavior-of-faulty-validators), but signs messages for a target block that is higher than the current block. This can be dangerous: Typically, misbehavior evidence is only created when there are conflicting blocks at the same height, but by targeting a block height that is far “ahead” of the current chain height, it’s possible that the chain will not produce a (conflicting) block at the target height in time to create evidence. Prior to Tendermint v0.34.9, the light client could accept a bad header from its primary witness, and would not be able to form evidence of this deception, even if all the secondary witnesses were correct. Because the light client is responsible for verifying cross-chain state for IBC, a successful FLA could result in loss of funds. However, it is important to note that FLAs are only possible outside the Tendermint security model. All FLAs, attempted and successful, leave traces of provable misbehavior on-chain. A faulty header contains signatures from the faulty validator, and even in unpatched versions of Tendermint Core, networks could use social consensus (off-chain action) to recover the network. The patches introduced in Tendermint Core v0.34.9 handle all evidence automatically and on-chain. Note that this fix also allows for successful automatic reporting of FLAs, even after a chain halt. By adding a time to FetchBlock, light clients effectively have a backup way to determine if a halted chain should have continued, and it will be able to submit evidence as soon as the chain resumes. ### Patches This problem has been patched in Tendermint Core v0.34.9. ### Workarounds There are no workarounds. All users are recommended to upgrade to Tendermint Core v0.34.9 at their earliest possible convenience. ### Credits Thank you to @MaximilianDiez for originally surfacing this issue, and to @cmwaters, @josef-widder, and @milosevic for creating fixes at both the implementation and specification level. ### For more information If you have any questions or comments about this advisory: * Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) * Email us at [security@tendermint.com](mailto:security@tendermint.com)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.34.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-f3w5-v9xx-rp8p'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:10:47Z', 'nvd_published_at': None}
1.4.0
GHSA-2589-w6xf-983r
2021-07-01T21:48:39Z
2021-12-10T18:58:49Z
null
['CVE-2021-23398']
Cross-site scripting in react-bootstrap-table
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-bootstrap-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23398'}, {'type': 'WEB', 'url': 'https://github.com/AllenFang/react-bootstrap-table/issues/2071'}, {'type': 'WEB', 'url': 'https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T13:08:06Z', 'nvd_published_at': '2021-06-24T15:15:00Z'}
1.4.0
GHSA-74r6-grj9-8rq6
2021-12-06T22:06:15Z
2021-12-16T15:27:55Z
null
['CVE-2021-23758']
Remote Code Execution in AjaxNetProfessional
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.29.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.11.29'}}]
[{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}, {'type': 'PACKAGE', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:06:15Z', 'nvd_published_at': '2021-12-03T20:15:00Z'}
1.4.0
GHSA-49vv-6q7q-w5cf
2021-09-01T19:36:25Z
2021-12-10T17:22:12Z
null
['CVE-2019-19609']
OS Command Injection in Strapi
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19609'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4636'}, {'type': 'WEB', 'url': 'https://bittherapy.net/post/strapi-framework-remote-code-execution/'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:24:09Z', 'nvd_published_at': '2019-12-05T20:15:00Z'}
1.4.0
GHSA-wp4h-pvgw-5727
2021-12-02T14:45:03Z
2021-12-02T14:50:51Z
null
['CVE-2019-0230']
Improperly Controlled Modification of Dynamically-Determined Object Attributes in Apache Struts
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0230'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/ww/s2-059'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://launchpad.support.sap.com/#/notes/2982840'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T14:45:03Z', 'nvd_published_at': '2020-09-14T17:15:00Z'}
1.4.0
GHSA-627p-rr78-99rj
2021-05-24T17:56:03Z
2021-12-20T17:56:03Z
null
['CVE-2020-5415']
GitLab auth uses full name instead of username as user ID, allowing impersonation
### Impact Installations which use the GitLab auth connector are vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another GitLab user who is granted access to a Concourse team by having their full name listed under `users` in the team configuration or given to the `--gitlab-user` flag. See the [GitLab auth docs](https://concourse-ci.org/gitlab-auth.html) for details. Concourse installations which do not configure the GitLab auth connector are not affected. ### Patches Concourse [v6.3.1](https://github.com/concourse/concourse/releases/tag/v6.3.1) and [v6.4.1](https://github.com/concourse/concourse/releases/tag/v6.4.1) were both released with a fix on August 4th, 2020. Both versions change the GitLab connector to use the username, rather than the full name. This was always the intent, and the previous behavior was originally reported as a bug (concourse/dex#7) prior to being reported as a security issue. Any Concourse teams which configure GitLab users will have to switch each user from their full name to their username upon upgrading to these versions. ### Workarounds GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team. ### References * concourse/dex#12: PR with the fix ### For more information If you have any questions or comments about this advisory, you may reach us privately at [concourseteam+security@gmail.com](mailto:concourseteam+security@gmail.com).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.1'}]}], 'versions': ['6.4.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}], 'versions': ['6.3.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.1'}]}], 'versions': ['6.4.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}], 'versions': ['6.3.0']}]
[{'type': 'WEB', 'url': 'https://github.com/concourse/concourse/security/advisories/GHSA-627p-rr78-99rj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5415'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5415'}]
{'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:56:03Z', 'nvd_published_at': None}
1.4.0
GHSA-xq58-69h2-765m
2021-12-06T21:52:30Z
2021-12-16T15:27:06Z
null
['CVE-2021-44227']
Cross Site Request Forgery in mailman
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.38'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44227'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/mailman/+bug/1952384'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/mailman'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/06/msg00011.html'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:52:30Z', 'nvd_published_at': '2021-12-02T03:15:00Z'}
1.4.0
GHSA-q34h-97wf-8r8j
2022-01-04T19:42:10Z
2021-12-16T21:02:12Z
null
['CVE-2021-43837']
vault-cli contains possible RCE when reading user-defined data
### Impact _What kind of vulnerability is it? Who is impacted?_ vault-cli features the ability for rendering templated values (as explained in the [documentation](https://github.com/peopledoc/vault-cli/blob/2.2.1/docs/howto/templated_secrets.rst)). When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and it's not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. This does not impact `vault` itself, except for the fact that the attacker, having an RCE on the machine that executes `vault-cli`, may abuse the token that `vault-cli` uses, to read, write or delete other data from the vault. ### Patches _Has the problem been patched? What versions should users upgrade to?_ In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability. Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely. ### References _Are there any links users can visit to find out more?_ Here's an article explaining how jinja2 templates might be exploited to have side effects: https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [the vault-cli repo](https://github.com/peopledoc/vault-cli/issues/new)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vault-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43837'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/pull/198'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/commit/3ba3955887fd6b7d4d646c8b260f21cebf5db852'}, {'type': 'PACKAGE', 'url': 'https://github.com/peopledoc/vault-cli'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/'}]
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T19:28:49Z', 'nvd_published_at': '2021-12-16T19:15:00Z'}
1.4.0
GHSA-f545-vpwp-r9j7
2021-12-03T15:18:14Z
2021-12-03T20:41:35Z
null
['CVE-2021-3989']
showdoc is vulnerable to URL Redirection to Untrusted Site
showdoc is vulnerable to URL Redirection to Untrusted Site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:39:26Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-qqxw-m5fj-f7gv
2021-05-24T21:20:17Z
2021-12-20T18:02:38Z
null
['CVE-2020-5233']
The pattern '/\domain.com' is not disallowed when redirecting, allowing for open redirect
### Impact An open redirect vulnerability has been found in `oauth2_proxy`. Anyone who uses `oauth2_proxy` may potentially be impacted. For a context [detectify] have an in depth blog post about the potential impact of an open redirect. Particularly see the OAuth section. **tl;dr**: People's authentication tokens could be silently harvested by an attacker. e.g: `facebook.com/oauth.php?clientid=123&state=abc&redirect_url=https://yourdomain.com/red.php?url%3dhttps://attacker.com/` ### Patches @sauyon found the issue, and has submitted a patch. ``` diff --git a/oauthproxy.go b/oauthproxy.go index 72ab580..f420df6 100644 --- a/oauthproxy.go +++ b/oauthproxy.go @@ -517,7 +517,7 @@ func (p *OAuthProxy) GetRedirect(req *http.Request) (redirect string, err error) // IsValidRedirect checks whether the redirect URL is whitelisted func (p *OAuthProxy) IsValidRedirect(redirect string) bool { switch { - case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//"): + case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !strings.HasPrefix(redirect, "/\\"): return true case strings.HasPrefix(redirect, "http://") || strings.HasPrefix(redirect, "https://"): redirectURL, err := url.Parse(redirect) ``` This patch will be applied to the next release, which is scheduled for when this is publicly disclosed. ### Workarounds At this stage there is no work around.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-qqxw-m5fj-f7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5233'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2'}, {'type': 'WEB', 'url': 'https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2_proxy/releases/tag/v5.0.0'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:20:17Z', 'nvd_published_at': None}
1.4.0
GHSA-x949-7cm6-fm6p
2021-12-15T15:22:46Z
2021-12-16T14:34:40Z
null
['CVE-2021-23639']
Code Injection in md-to-pdf.
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'md-to-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639'}, {'type': 'WEB', 'url': 'https://github.com/simonhaenisch/md-to-pdf/issues/99'}, {'type': 'WEB', 'url': 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonhaenisch/md-to-pdf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:31:35Z', 'nvd_published_at': '2021-12-10T20:15:00Z'}
1.4.0
GHSA-67c7-5v9j-227r
2021-12-03T15:16:39Z
2021-12-03T20:43:06Z
null
['CVE-2021-3983']
Cross-site Scripting in kimai2
kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3983'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T19:29:53Z', 'nvd_published_at': '2021-12-01T12:15:00Z'}
1.4.0
GHSA-g7p8-r2ch-4rmf
2022-01-04T18:56:53Z
2021-12-17T20:41:45Z
null
['CVE-2020-35215']
Malicious Atomix node queries expose sensitive information
An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35215'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1pRRLfdSUqUZ688CZ9e9AyceuXPGp9oyGj7j4bdSsBcw/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:00:58Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}
1.4.0
GHSA-33gc-6cw9-w3g4
2023-09-19T10:02:42Z
2021-12-10T20:23:19Z
null
['CVE-2021-36564']
Deserialization of Untrusted Data in topthink/framework
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36564'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2559'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:30:33Z', 'nvd_published_at': '2021-12-06T21:15:00Z'}
1.4.0
GHSA-2jhh-5xm2-j4gf
2021-12-06T22:11:44Z
2021-12-10T20:17:55Z
null
['CVE-2021-43415']
Improper Authentication in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. Fixed in 1.0.14, 1.1.8, and 1.2.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43415'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-31-nomad-qemu-task-driver-allowed-paths-bypass-with-job-args/32288'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:11:44Z', 'nvd_published_at': '2021-12-03T22:15:00Z'}
1.4.0
GHSA-h3cw-g4mq-c5x2
2022-04-22T18:19:50Z
2021-12-09T19:14:51Z
null
['CVE-2020-24616']
Code Injection in jackson-databind
This project contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24616'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2814'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3d97153944f7de9c19c1b3637b33d3cf1fbbe4d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T17:38:11Z', 'nvd_published_at': '2020-08-25T18:15:00Z'}
1.4.0
GHSA-25f5-gc4h-hc22
2023-09-05T21:51:12Z
2021-12-08T19:55:30Z
null
['CVE-2021-28680']
Improper Privilege Management in devise_masquerade
The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side `secret_key_base` value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When `devise_masquerade` is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'devise_masquerade'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28680'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/issues/83'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/pull/76'}, {'type': 'PACKAGE', 'url': 'https://github.com/oivoodoo/devise_masquerade'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/releases/tag/v1.3.1'}, {'type': 'WEB', 'url': 'https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:36:08Z', 'nvd_published_at': '2021-12-07T21:15:00Z'}
1.4.0
GHSA-3p94-vj97-fm4q
2021-05-25T16:28:38Z
2021-12-09T19:56:44Z
null
['CVE-2020-7615']
OS Command Injection in fsa
fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7615'}, {'type': 'WEB', 'url': 'https://github.com/gregof/fsa/blob/master/lib/rep.js#L12'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FSA-564118'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:28:38Z', 'nvd_published_at': '2020-04-07T14:15:00Z'}
1.4.0
GHSA-vrgh-5w3c-ggf8
2021-12-03T15:18:33Z
2021-12-03T20:38:50Z
null
['CVE-2021-3990']
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3990'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f'}]
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:16:12Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-fxwm-rx68-p5vx
2021-11-29T20:55:04Z
2021-12-01T18:28:29Z
null
[]
XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext
The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-richtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-fxwm-rx68-p5vx'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-richtext/commit/3cebfe2ae4c22e6590632a0ff71893854a16afc5'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-richtext'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:53:09Z', 'nvd_published_at': None}
1.4.0
GHSA-f78f-353m-cf4j
2021-07-29T16:13:17Z
2021-12-10T20:05:37Z
null
['CVE-2020-7609']
Code Injection in node-rules
node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-rules'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7609'}, {'type': 'WEB', 'url': 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832'}, {'type': 'WEB', 'url': 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:34:33Z', 'nvd_published_at': '2020-04-27T22:15:00Z'}
1.4.0
GHSA-w7fj-336r-vw49
2021-12-01T14:35:30Z
2021-12-01T18:29:21Z
null
['CVE-2021-43776']
Cross-Site Scripting vulnerability in @backstage/plugin-auth-backend
### Impact This vulnerability allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other secrets from the user's browser. The default CSP does prevent this attack, but it is expected that some deployments have these policies disabled due to incompatibilities. ### Patches This is vulnerability is patched in version `0.4.9` of `@backstage/plugin-auth-backend`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-auth-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-w7fj-336r-vw49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43776'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/tree/master/plugins/auth-backend'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:19:57Z', 'nvd_published_at': '2021-11-26T19:15:00Z'}
1.4.0
GHSA-xxfh-x98p-j8fr
2021-12-11T21:25:16Z
2021-12-10T20:15:37Z
null
[]
Remote code injection in Log4j (through pax-logging-log4j2)
### Impact Remote Code Execution. ### Patches Users of pax-logging 1.11.9 should update to 1.11.10. Users of pax-logging 2.0.10 should update to 2.0.11. ### Workarounds Set system property `-Dlog4j2.formatMsgNoLookups=true` ### References https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.ops4j.pax.logging:pax-logging-log4j2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.ops4j.pax.logging:pax-logging-log4j2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ops4j/org.ops4j.pax.logging/security/advisories/GHSA-xxfh-x98p-j8fr'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'PACKAGE', 'url': 'https://github.com/ops4j/org.ops4j.pax.logging'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T18:54:56Z', 'nvd_published_at': None}
1.4.0
GHSA-6xxj-gcjq-wgf4
2021-12-08T19:28:53Z
2021-12-07T21:23:17Z
null
['CVE-2021-43789']
SQL injection in prestashop/prestashop
### Impact Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters ### Patches The problem is fixed in 1.7.8.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.5.0'}, {'fixed': '1.7.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.8.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/issues/26623'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/89.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T20:58:26Z', 'nvd_published_at': '2021-12-07T17:15:00Z'}
1.4.0
GHSA-4x2f-54wr-4hjg
2021-11-29T19:15:58Z
2021-12-01T18:29:32Z
null
['CVE-2021-41279']
Potential Zip Slip Vulnerability in baserCMS
There is a OS Command Injection Vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. Target baserCMS 4.5.3 and earlier versions Vulnerability OS Command Injection Vulnerability. Countermeasures Update to the latest version of baserCMS Credits Daniele Scanu @SoterItSecurity
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41279'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:15:58Z', 'nvd_published_at': '2021-11-26T18:15:00Z'}
1.4.0
GHSA-gwpx-q2h9-wxgx
2021-12-03T15:16:06Z
2021-12-03T20:43:25Z
null
['CVE-2021-3964']
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3964'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}, {'type': 'PACKAGE', 'url': 'https://github.com/elgg/elgg/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a'}]
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:20:04Z', 'nvd_published_at': '2021-12-01T12:15:00Z'}
1.4.0
GHSA-v3r2-3fp4-rp46
2023-09-06T20:14:32Z
2021-12-10T20:05:57Z
null
['CVE-2020-7643']
Prototype pollution in paypal-adaptive
paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a `__proto__` payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'paypal-adaptive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7643'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs'}, {'type': 'WEB', 'url': 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs/blob/master/lib/paypal-adaptive.js#L31'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:14:36Z', 'nvd_published_at': '2020-04-23T15:15:00Z'}
1.4.0
GHSA-93j5-g845-9wqp
2021-12-02T17:54:05Z
2021-12-02T17:52:45Z
null
['CVE-2021-27023']
Unsafe HTTP Redirect in Puppet Agent and Puppet Server
A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.25.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27023'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2021-27023.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2021-27023'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:48Z', 'nvd_published_at': '2021-11-18T15:15:00Z'}
1.4.0
GHSA-5cqm-crxm-6qpv
2022-07-29T14:18:05Z
2021-12-14T21:36:20Z
null
['CVE-2021-41816']
Buffer overrun in CGI.escape_html
A buffer overrun vulnerability was discovered in CGI.escape_html. This can lead to a buffer overflow when a user passes a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41816'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/959ccf0b6a672bcc64aeaa60c6e1f9e728f1e87f'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/ad079c1cb5f58eba1ffac46da79995fcf94a3a6e'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/c6a37a671b556eb06140ea89cc465136b24207a6'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/c728632c1c09d46cfd4ecbff9caaa3651dd1002a'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1328463'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/cgi'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-41816.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/4MQ568ZG47c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2021-41816'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220303-0006/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/'}]
{'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T21:34:08Z', 'nvd_published_at': '2022-02-06T21:15:00Z'}
1.4.0
GHSA-5vr6-hm68-5j9p
2021-12-06T21:36:37Z
2021-12-03T20:49:16Z
null
['CVE-2021-44279']
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T18:54:26Z', 'nvd_published_at': '2021-12-01T14:15:00Z'}
1.4.0
GHSA-gxjj-f44v-qm94
2021-12-14T18:14:54Z
2021-12-14T18:14:04Z
2021-05-27T19:07:52Z
[]
Open Redirect in Flask-Security-Too
# Withdrawn Duplicate of GHSA-6qmf-fj6m-686c # Original description Flask-Security-Too allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want. This is considered a low severity due to the fact that if Werkzeug is used (which is very common with Flask applications) as the WSGI layer, it by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32618'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/issues/486'}]
{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:52:04Z', 'nvd_published_at': None}
1.4.0
GHSA-j4mm-7pj3-jf7v
2022-01-04T18:54:12Z
2021-12-14T21:43:00Z
null
['CVE-2021-43807']
HTTP Method Spoofing
Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible. ### Impact The vulnerability allows attackers to craft links or forms which may change the server state. For example, the following GET request would create a new user: ```sh % curl -i -u admin:opencast \ 'https://legacy.opencast.org/admin-ng/users/test.json?_method=PUT&username=test&password=attack' HTTP/2 200 … ``` If an admin is logged in to legacy.opencast.org and accidentally clicks this link, a user will silently be created. ### Patches This issue is fixed in Opencast 9.10 and 10.0. ### Workarounds You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case. ### References - [Fix for 10.0](https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8) - [Fix for 9.10](https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444) ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) * Email us at [security@opencast.org](mailto:security@opencast.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43807'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}]
{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T18:49:26Z', 'nvd_published_at': '2021-12-14T18:15:00Z'}
1.4.0
GHSA-q5wr-fvpq-p67g
2021-07-26T18:09:11Z
2021-12-10T17:23:30Z
null
['CVE-2020-28248']
Integer Overflow in png-img
An integer overflow in the PngImg::InitStorage_() function of png-img before 3.1.0 leads to an under-allocation of heap memory and subsequently an exploitable heap-based buffer overflow when loading a crafted PNG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'png-img'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28248'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img/compare/v3.0.0...v3.1.0'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-142-gemini-png-img'}]
{'cwe_ids': ['CWE-190', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:09:11Z', 'nvd_published_at': '2021-02-20T00:15:00Z'}
1.4.0
GHSA-m3fm-h5jp-q79p
2023-02-03T20:37:11Z
2021-12-20T16:58:14Z
null
['CVE-2016-1906']
Authorization bypass in Openshift
Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1906'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/issues/6556'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/pull/6576'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0070'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0351'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2016-1906'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1297916'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1906'}]
{'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:01:34Z', 'nvd_published_at': '2016-02-03T18:59:00Z'}
1.4.0
GHSA-rp2c-jrgp-cvr8
2021-12-06T22:08:43Z
2021-12-16T15:32:31Z
null
['CVE-2021-23562']
Code injection in plupload
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'plupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/moxiecode/plupload'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909'}]
{'cwe_ids': ['CWE-434', 'CWE-75'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:08:43Z', 'nvd_published_at': '2021-12-03T20:15:00Z'}
1.4.0
GHSA-j96p-r523-8r3w
2021-11-24T19:42:20Z
2021-12-03T20:52:02Z
null
['CVE-2021-43669']
HTTP Request Smuggling in github.com/hyperledger/fabric
A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43669'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/2828'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperledger/fabric'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/releases/tag/v2.4.0-beta'}, {'type': 'WEB', 'url': 'https://jira.hyperledger.org/browse/FAB-18528'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T19:42:20Z', 'nvd_published_at': '2021-11-18T16:15:00Z'}
1.4.0
GHSA-wxc4-f4m6-wwqv
2023-02-09T17:45:10Z
2021-12-20T16:55:06Z
null
['CVE-2019-11254']
Excessive Platform Resource Consumption within a Loop in Kubernetes
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-yaml/yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11254'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/89535'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/pull/555'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0036'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200413-0003/'}]
{'cwe_ids': ['CWE-1050'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:24:04Z', 'nvd_published_at': None}
1.4.0
GHSA-ff45-7prw-58vj
2021-11-30T14:50:39Z
2021-12-02T17:51:22Z
2021-11-29T18:17:00Z
['CVE-2021-23732']
OS Command injection in docker-cli-js
# Withdrawn After reviewing this CVE, and [this response from the maintainer](https://github.com/Quobject/docker-cli-js/issues/22#issuecomment-967760940), we have withdrawn this advisory. # Original CVE description This affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system.
[]
[{'package': {'ecosystem': 'npm', 'name': 'docker-cli-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23732'}, {'type': 'WEB', 'url': 'https://github.com/Quobject/docker-cli-js/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/Quobject/docker-cli-js/issues/22#issuecomment-967760940'}, {'type': 'PACKAGE', 'url': 'https://github.com/Quobject/docker-cli-js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCKERCLIJS-1568516'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:50:39Z', 'nvd_published_at': '2021-11-22T17:15:00Z'}
1.4.0
GHSA-qrvj-274h-hfcg
2022-03-25T20:42:58Z
2021-12-07T00:00:27Z
null
['CVE-2021-36567']
Deserialization of Untrusted Data in topthink/framework
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36567'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2561'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T20:42:58Z', 'nvd_published_at': '2021-12-06T21:15:00Z'}
1.4.0
GHSA-7v7w-f7c6-f829
2022-08-11T18:47:52Z
2021-12-16T21:01:15Z
null
['CVE-2021-4111']
YetiForceCRM is vulnerable to Business Logic Errors because product amount can be a negative number
YetiForceCRM is vulnerable to Business Logic Errors because product amount can be a negative number.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:41:33Z', 'nvd_published_at': '2021-12-15T09:15:00Z'}
1.4.0
GHSA-wh8g-3j2c-rqj5
2022-02-08T22:00:53Z
2021-12-09T19:15:00Z
null
['CVE-2020-35490']
Serialization gadgets exploit in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35490'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2986'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:06:39Z', 'nvd_published_at': '2020-12-17T19:15:00Z'}
1.4.0
GHSA-gp4j-w3vj-7299
2021-05-20T16:22:33Z
2021-12-20T18:21:43Z
null
['CVE-2016-9962']
Information Exposure in RunC
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9962'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/releases/tag/v1.12.6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-34'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0116.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0123.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0127.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jan/21'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jan/29'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/540001/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95361'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:22:33Z', 'nvd_published_at': None}
1.4.0
GHSA-557g-r22w-9wvx
2023-02-28T16:47:09Z
2021-12-20T18:25:33Z
null
['CVE-2019-11328']
Incorrect Permission Assignment for Critical Resource in Singularity
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11328'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/releases/tag/v3.2.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/16/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108360'}]
{'cwe_ids': ['CWE-269', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:50:05Z', 'nvd_published_at': '2019-05-14T21:29:00Z'}
1.4.0
GHSA-mg3m-f475-28hv
2021-11-29T20:22:25Z
2021-12-01T18:28:51Z
null
['CVE-2021-43783']
Path Traversal in @backstage/plugin-scaffolder-backend
### Impact A malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend host instance. This vulnerability can in some situation also be exploited through user input when executing a template, meaning you do not need write access to the templates. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents. ### Patches This vulnerability is fixed in version `0.15.14` of the `@backstage/plugin-scaffolder-backend`. ### Workarounds This attack is mitigated by restricting access and requiring reviews when registering or modifying scaffolder templates. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-mg3m-f475-28hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43783'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/f9352ab606367cd9efc6ff048915c70ed3013b7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:22:25Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}
1.4.0
GHSA-66hf-2p6w-jqfw
2022-08-11T19:19:57Z
2021-12-08T19:57:36Z
null
['CVE-2021-43808']
Laravel Framework XSS in Blade templating engine
A security researcher has disclosed a possible XSS vulnerability in the Blade templating engine. Given the following two Blade templates: resources/views/parent.blade.php: ```html @section('content') <input value="{{ $value }}"> @show ``` resources/views/child.blade.php: ```html @extends('parent') @section('content') <input value="{{ $value }}"> @endsection ``` And a route like the following: ```php Route::get('/example', function() { $value = '//localhost/###parent-placeholder-040f06fd774092478d450774f5ba30c5da78acc8## onclick=location.assign(this.value);//'; return view('child', ['value' => $value]); }); ``` The broken HTML element may be clicked and the user is taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. This vulnerability has been patched by determining the parent placeholder at runtime and using a random hash that is unique to each request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.42'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.75.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43808'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39906'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39908'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39909'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v6.20.42'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v7.30.6'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v8.75.0'}]
{'cwe_ids': ['CWE-327', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T21:33:14Z', 'nvd_published_at': '2021-12-08T00:15:00Z'}
1.4.0
GHSA-8c9x-wfgj-v78w
2021-12-06T21:57:44Z
2021-12-16T15:31:58Z
null
['CVE-2021-4000']
Open Redirect in showdoc
showdoc is vulnerable to URL Redirection to Untrusted Site
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:57:44Z', 'nvd_published_at': '2021-12-03T11:15:00Z'}
1.4.0
GHSA-v26w-gcxh-v4r7
2022-06-29T20:42:16Z
2021-12-10T18:50:40Z
null
['CVE-2021-25952']
Prototype polluation in just-safe-set
Prototype pollution vulnerability in ‘just-safe-set’ versions 1.0.0 through 2.2.1 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'just-safe-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25952'}, {'type': 'WEB', 'url': 'https://github.com/angus-c/just/pull/267'}, {'type': 'WEB', 'url': 'https://github.com/angus-c/just/commit/dd57a476f4bb9d78c6f60741898dc04c71d2eb53'}, {'type': 'PACKAGE', 'url': 'https://github.com/angus-c/just'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-08T14:23:30Z', 'nvd_published_at': '2021-07-07T12:15:00Z'}
1.4.0
GHSA-gv87-q66h-4277
2022-01-25T21:02:25Z
2021-12-16T00:02:15Z
null
['CVE-2021-43113']
Command injection in itext7-core
iTextPDF in iText before 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itextpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.13.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43113'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/releases/tag/7.1.17'}, {'type': 'WEB', 'url': 'https://github.com/itext/itextpdf/releases/tag/5.5.13.3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00013.html'}, {'type': 'WEB', 'url': 'https://pastebin.com/BXnkY9YY'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5323'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:02:25Z', 'nvd_published_at': '2021-12-15T07:15:00Z'}
1.4.0
GHSA-q4g7-jrxv-67r9
2021-11-30T14:35:55Z
2021-12-02T17:54:25Z
null
['CVE-2021-27025']
Silent Configuration Failure in Puppet Agent
A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.25.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27025'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2021-27025.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2021-27025'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:55Z', 'nvd_published_at': '2021-11-18T15:15:00Z'}
1.4.0
GHSA-89q5-mj78-pw5w
2021-11-29T14:53:13Z
2021-12-02T17:52:26Z
null
['CVE-2021-23673']
Cross-site Scripting in pekeupload
This affects all versions of package pekeupload. If an attacker induces a user to upload a file whose name contains javascript code, the javascript code will be executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'pekeupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23673'}, {'type': 'PACKAGE', 'url': 'https://github.com/moxiecode/plupload'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/blob/120cc0b5dd3373d7181fd11b06ac2557c890d3f0/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T14:53:13Z', 'nvd_published_at': '2021-11-22T17:15:00Z'}