schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hx6g-q9v2-xh7v | 2021-12-06T22:01:08Z | 2021-12-16T15:30:48Z | null | ['CVE-2021-3980'] | Information exposure in elgg | elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980'}, {'type': 'WEB', 'url': 'https://github.com/Elgg/Elgg/pull/13791'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}, {'type': 'PACKAGE', 'url': 'https://github.com/Elgg/Elgg'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac'}] | {'cwe_ids': ['CWE-359'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:01:08Z', 'nvd_published_at': '2021-12-03T15:15:00Z'} |
1.4.0 | GHSA-8qv8-fq5w-p966 | 2021-12-16T14:09:58Z | 2021-12-16T14:26:00Z | null | ['CVE-2021-4097'] | phpservermon is vulnerable to CRLF Injection | phpservermon is vulnerable to Improper Neutralization of CRLF Sequences. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4097'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpservermon/phpservermon'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43'}] | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T15:10:46Z', 'nvd_published_at': '2021-12-12T00:15:00Z'} |
1.4.0 | GHSA-273r-rm8g-7f3x | 2021-12-13T20:20:28Z | 2021-12-13T21:33:04Z | null | ['CVE-2021-43801'] | Uncaught Exception in mercurius | ### Impact
Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler.
### Patches
The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2.
### Workarounds
Use a custom error handler.
### References
See https://github.com/mercurius-js/mercurius/issues/677
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/mercurius-js/mercurius
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mercurius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.10.0'}, {'fixed': '8.11.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801'}, {'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/issues/677'}, {'type': 'WEB', 'url': 'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'}, {'type': 'PACKAGE', 'url': 'https://github.com/mercurius-js/mercurius'}] | {'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-13T20:20:28Z', 'nvd_published_at': '2021-12-13T20:15:00Z'} |
1.4.0 | GHSA-4gwh-2pqx-f5cc | 2023-09-19T10:06:45Z | 2021-12-03T20:48:42Z | null | ['CVE-2021-44277'] | Cross-site Scripting in LibreNMS | LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T18:56:32Z', 'nvd_published_at': '2021-12-01T14:15:00Z'} |
1.4.0 | GHSA-m6x4-97wx-4q27 | 2022-02-08T21:38:27Z | 2021-12-09T19:16:26Z | null | ['CVE-2020-36184'] | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36184'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2998'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/567194c53ae91f0a14dc27239afb739b1c10448a'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:30:19Z', 'nvd_published_at': '2021-01-06T23:15:00Z'} |
1.4.0 | GHSA-cfqj-9g2g-w7q6 | 2022-08-11T14:51:18Z | 2021-12-02T17:49:14Z | null | ['CVE-2021-40369'] | Apache JSPWiki Cross-site Scripting due to carefully crafted plugin link invocation | A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40369'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/03/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-25T00:20:27Z', 'nvd_published_at': '2021-11-24T12:15:00Z'} |
1.4.0 | GHSA-rf3m-mhv7-x39f | 2023-02-13T18:18:48Z | 2021-12-20T16:58:22Z | null | ['CVE-2015-5250'] | Denial of Service in OpenShift Origin | The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5250'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/issues/4374'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/commit/dace5075e31b74703e944b6b3ebe8836be8d1b9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1736'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5250'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1259867'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5250'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:21:13Z', 'nvd_published_at': '2015-09-08T15:59:00Z'} |
1.4.0 | GHSA-7q9f-x6rm-qmxr | 2022-02-24T18:19:11Z | 2021-12-09T19:27:46Z | null | ['CVE-2020-7635'] | Command Injection in compass-compile | compass-compile through 0.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'compass-compile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7635'}, {'type': 'PACKAGE', 'url': 'https://github.com/quaertym/compass-compile'}, {'type': 'WEB', 'url': 'https://github.com/quaertym/compass-compile/blob/master/lib/compass.js#L25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T15:32:23Z', 'nvd_published_at': '2020-04-06T13:15:00Z'} |
1.4.0 | GHSA-f34m-x9pj-62vq | 2021-12-01T14:34:05Z | 2021-12-01T18:29:02Z | null | ['CVE-2021-43785'] | Cross-Site Scripting Vulnerability in @joeattardi/emoji-button | ### Impact
There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2:
- A URL for a custom emoji
- An i18n string
In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code.
### Patches
This vulnerability is fixed starting in version 4.6.2. This is resolved by properly escaping strings that are inserted into the HTML document.
### Workarounds
There is no workaround other than upgrading to a non-vulnerable version.
### Credit
This issue was discovered by GitHub team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh) and was reported by the GitHub Security Lab team. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@joeattardi/emoji-button'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785'}, {'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16'}, {'type': 'WEB', 'url': 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/joeattardi/emoji-button'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:21:36Z', 'nvd_published_at': '2021-11-26T19:15:00Z'} |
1.4.0 | GHSA-v6rh-hp5x-86rv | 2022-02-14T22:20:29Z | 2021-12-09T19:09:37Z | null | ['CVE-2021-44420'] | Potential bypass of an upstream access control based on URL paths in Django | In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. This issue has low severity, according to the Django security policy. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.1.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44420'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0006/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/dec/07/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/12/07/1'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:35:08Z', 'nvd_published_at': '2021-12-08T00:15:00Z'} |
1.4.0 | GHSA-59g4-hpg3-3gcp | 2022-01-04T18:53:43Z | 2021-12-14T21:44:03Z | null | ['CVE-2021-43821'] | Files Accessible to External Parties in Opencast | Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface.
### Impact
Before Opencast 10.6, Opencast would [open and include local files during ingests](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine.
For example, to expose the `custom.properties` of develop.opencast.org via the asset manager, an attacker could have run:
```
curl -f -i -u admin:opencast \
https://develop.opencast.org/ingest/addMediaPackage/fast \
-F 'flavor=presenter/source'\
-F mediaUri=file:///srv/opencast/opencast-dist-allinone/etc/custom.properties\
-F title="custom.properties"
```
An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given.
### Patches
The issue has been fixed in Opencast 10.6 and 11.0.
### Workarounds
You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating.
### References
- [Example of problematic code](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587).
- [Patch fixing the issue](https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-ingest-service-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43821'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl'}] | {'cwe_ids': ['CWE-552'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T19:29:54Z', 'nvd_published_at': '2021-12-14T20:15:00Z'} |
1.4.0 | GHSA-9c5c-5j4h-8q2c | 2022-08-11T18:45:55Z | 2021-12-16T19:40:26Z | null | ['CVE-2021-4119'] | BookStack is vulnerable to Improper Access Control. | BookStack prior to version 21.11.3 is vulnerable to Improper Access Control. A logged-in user with no privileges OR guest user (if public access enabled) can access the /search/users/select AJAX endpoint meant for admins to manage audit logs, to dump all usernames existing in the Bookstack database. This can also be used to harvest email belonging to a user because BookStack also uses the code where(`email`, `like`, `%` . $search . `%`) to search for users based on email. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4119'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.3'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:36:38Z', 'nvd_published_at': '2021-12-15T20:15:00Z'} |
1.4.0 | GHSA-j377-2x76-558h | 2022-05-04T03:12:57Z | 2021-12-10T17:25:21Z | null | ['CVE-2021-36716'] | Improper Input Validation in is-email | is-email helps validate an email address. A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'is-email'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36716'}, {'type': 'PACKAGE', 'url': 'https://github.com/segmentio/is-email'}, {'type': 'WEB', 'url': 'https://github.com/segmentio/is-email/releases'}, {'type': 'WEB', 'url': 'https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/'}] | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T18:43:45Z', 'nvd_published_at': '2021-07-14T16:15:00Z'} |
1.4.0 | GHSA-wf5p-f5xr-c4jj | 2021-12-01T21:03:52Z | 2021-12-02T17:48:53Z | null | ['CVE-2021-44427'] | SQL Injection in rosariosis | An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44427'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/328'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-811'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T21:03:52Z', 'nvd_published_at': '2021-11-29T22:15:00Z'} |
1.4.0 | GHSA-7rpc-9m88-cf9w | 2021-12-01T14:32:13Z | 2021-12-01T18:29:42Z | null | ['CVE-2021-41243'] | OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS | There is an OS Command Injection Vulnerability on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
Target
baserCMS 4.5.3 and earlier versions
Vulnerability
OS Command Injection Vulnerability.
Countermeasures
Update to the latest version of baserCMS
Credits
Akagi Yusuke @NTT-ME | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:12:04Z', 'nvd_published_at': '2021-11-26T18:15:00Z'} |
1.4.0 | GHSA-6w9p-88qg-p3g3 | 2023-08-31T15:31:45Z | 2021-12-03T20:44:48Z | null | ['CVE-2021-25967'] | Cross-site Scripting in CKAN | In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ckan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25967'}, {'type': 'WEB', 'url': 'https://github.com/ckan/ckan/pull/6477'}, {'type': 'WEB', 'url': 'https://github.com/ckan/ckan/commit/5a46989c0a4f2c2873ca182c196da83b82babd25'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckan/ckan'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25967'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:23:05Z', 'nvd_published_at': '2021-12-01T14:15:00Z'} |
1.4.0 | GHSA-wjqc-j537-j9gj | 2022-08-30T17:34:55Z | 2021-12-08T00:01:44Z | null | ['CVE-2021-44685'] | Command injection in git-it-electron | Git-it through 4.4.0 allows OS command injection at the Branches Aren't Just For Birds challenge step. During the verification process, it attempts to run the reflog command followed by the current branch name (which is not sanitized for execution). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-it-electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44685'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/3'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jlord/git-it-electron'}, {'type': 'WEB', 'url': 'https://github.com/jlord/git-it-electron/releases'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-09T17:57:55Z', 'nvd_published_at': '2021-12-07T00:15:00Z'} |
1.4.0 | GHSA-r8j5-h5cx-65gg | 2021-12-10T19:02:24Z | 2021-12-10T19:02:37Z | null | ['CVE-2021-29059'] | ReDOS in IS-SVG | A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'is-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29059'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/is-svg'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/is-svg'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T15:40:38Z', 'nvd_published_at': '2021-06-21T16:15:00Z'} |
1.4.0 | GHSA-553q-hpvp-q8pc | 2021-12-07T21:24:53Z | 2021-12-10T20:22:15Z | null | ['CVE-2021-4075'] | Server-Side Request Forgery in snipe/snipe-it | Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to higher-impact. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0-GM'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T21:24:53Z', 'nvd_published_at': '2021-12-06T21:15:00Z'} |
1.4.0 | GHSA-8w3x-r6x7-c5r5 | 2021-12-14T14:44:34Z | 2021-12-16T14:28:27Z | null | ['CVE-2021-4084'] | Cross-site Scripting in pimcore | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:44:34Z', 'nvd_published_at': '2021-12-10T12:15:00Z'} |
1.4.0 | GHSA-rp42-c45j-g46x | 2021-12-16T14:09:16Z | 2021-12-16T14:12:23Z | null | ['CVE-2021-4107'] | yetiforcecrm is vulnerable to Cross-site Scripting | yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4107'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T15:17:18Z', 'nvd_published_at': '2021-12-14T15:15:00Z'} |
1.4.0 | GHSA-7fr2-94h7-ccg2 | 2022-01-04T18:58:33Z | 2021-12-17T20:41:33Z | null | ['CVE-2020-35209'] | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information. | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35209'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1W5KU7ffh4dheR8iD54ulABImi6byAhSI-OhEKw2adRo/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:40:51Z', 'nvd_published_at': '2021-12-16T20:15:00Z'} |
1.4.0 | GHSA-rrm8-32g4-w8m3 | 2021-05-12T18:30:22Z | 2021-12-20T18:04:46Z | null | ['CVE-2017-1000069'] | Cross-site Request Forgery (CSRF) | CSRF in Bitly oauth2_proxy 2.1 during authentication flow | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/bitly/oauth2_proxy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000069'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/pull/360'}, {'type': 'WEB', 'url': 'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000069'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:30:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vrc7-6g8w-jh56 | 2022-03-11T22:59:06Z | 2021-12-09T19:29:36Z | null | ['CVE-2015-9544'] | Improper Input Validation in xdLocalStorage | An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'xdlocalstorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9544'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ofirdagan/cross-domain-local-storage'}, {'type': 'WEB', 'url': 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:20:26Z', 'nvd_published_at': '2020-04-07T18:15:00Z'} |
1.4.0 | GHSA-3m3h-v9hv-9j4h | 2021-11-24T20:01:39Z | 2021-12-02T17:49:40Z | null | ['CVE-2021-25986'] | Cross-site Scripting in django-wiki | In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.20'}, {'fixed': '0.7.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25986'}, {'type': 'WEB', 'url': 'https://github.com/django-wiki/django-wiki/pull/1148'}, {'type': 'WEB', 'url': 'https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-wiki/django-wiki'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:01:39Z', 'nvd_published_at': '2021-11-23T20:15:00Z'} |
1.4.0 | GHSA-7289-chwj-7h86 | 2021-12-06T22:05:08Z | 2021-12-10T20:18:30Z | null | ['CVE-2021-44278'] | Path traversal in librenms/librenms | Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44278'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:05:08Z', 'nvd_published_at': '2021-12-03T13:15:00Z'} |
1.4.0 | GHSA-wc7v-77jr-5c3m | 2021-12-03T15:35:34Z | 2021-12-03T20:38:37Z | null | ['CVE-2021-3944'] | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9'}] | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T15:35:34Z', 'nvd_published_at': '2021-12-02T17:15:00Z'} |
1.4.0 | GHSA-hwqf-gcqm-7353 | 2021-06-30T17:38:02Z | 2021-12-10T18:56:57Z | null | ['CVE-2021-23400'] | Header injection in nodemailer | The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodemailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/issues/1289'}, {'type': 'WEB', 'url': 'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:38:02Z', 'nvd_published_at': '2021-06-29T12:15:00Z'} |
1.4.0 | GHSA-2g8g-63j4-9w3r | 2021-11-29T19:39:57Z | 2021-12-01T18:29:12Z | null | [] | RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend | The templating library used by the scaffolder backend assumes that templates are trusted which is an undesired property of the scaffolder-backend. This has now been mitigated by sandboxing the template code execution.
### Impact
A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template yaml definition itself and not by user input data.
### Patches
This is vulnerability is patched in version `0.15.14` of `@backstage/plugin-scaffolder-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) | [] | [{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-2g8g-63j4-9w3r'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:39:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5m6c-jp6f-2vcv | 2021-05-24T20:58:18Z | 2021-12-20T17:58:59Z | null | ['CVE-2020-4037'] | Open Redirect in OAuth2 Proxy | ### Impact
As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access.
This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4037'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:58:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fwh7-v4gf-xv7w | 2022-01-03T15:55:40Z | 2021-12-16T21:00:45Z | null | ['CVE-2021-4116'] | yetiforcecrm is vulnerable to Cross-site Scripting | yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4116'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:40:11Z', 'nvd_published_at': '2021-12-15T14:15:00Z'} |
1.4.0 | GHSA-4jhc-wjr3-pwh2 | 2022-01-04T18:59:32Z | 2021-12-17T20:40:38Z | null | ['CVE-2020-35211'] | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node. | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35211'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:48:40Z', 'nvd_published_at': '2021-12-16T20:15:00Z'} |
1.4.0 | GHSA-mmjf-f5jw-w72q | 2022-09-19T21:58:21Z | 2021-12-15T00:00:42Z | null | ['CVE-2021-4044'] | Invalid handling of `X509_verify_cert()` internal errors in libssl | Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4044'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=758754966791c537ea95241438454aa86f91f256'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0129.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211229-0003/'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20211214.txt'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:01:23Z', 'nvd_published_at': '2021-12-14T19:15:00Z'} |
1.4.0 | GHSA-3h68-wvv6-8r5h | 2021-07-28T18:09:42Z | 2021-12-10T17:20:11Z | null | ['CVE-2020-1940'] | Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak | The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:oak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.24.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.22.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:oak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1940'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da8e2fd253ecd4d3a0de71ce255631148b54be8500225b5812f7737@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45b0e2fb6ac51c5a03952b08b5e0efde1249ecb809884cc87eb0bd99@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r601637e38ee743e845856a4e24915cb8db26ae80ca782bef91989cbc@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra295f919586b19def7cc7713d9d78595507d5f703362fccb779eeeb9@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6b3e78f5ed545c1d859d664f66c6d3fc5d731d9b1d842349654e4f0@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3023cfd45441b570c1abaa347d0cac78df97b5d3f27d674d01b3d2a@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba884dbe733781cbaaffa28b77bc37a6a9f948b3a72a1bdad5e1587c@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbef4701b5ce4d827182e70ad7b4d987a9157682ba3643e05a9ef5a7b@%3Ccommits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc35a57ecdeae342d46f729d6bc9750ba860c101f450cc171798dba28@%3Coak-commits.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0%40%3Cusers.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0@%3Cannounce.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/01/28/1'}] | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:04:32Z', 'nvd_published_at': '2020-01-28T17:15:00Z'} |
1.4.0 | GHSA-q3j5-32m5-58c2 | 2021-10-05T16:34:17Z | 2021-12-20T18:21:34Z | null | ['CVE-2016-3697'] | Privilege Elevation in runc | libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3697'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/issues/21436'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/708'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/releases/tag/v0.1.0'}, {'type': 'WEB', 'url': 'https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0070'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2016-1034.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2016-2634.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201612-28'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1034.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2634.html'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T18:53:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hg2p-2cvq-4ppv | 2023-09-05T22:42:28Z | 2021-12-10T20:06:23Z | null | ['CVE-2020-7642'] | Cross-site scripting in lazysizes | lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: `data-vimeo`, `data-vimeoparams`, `data-youtube` and `data-ytparams` which can be abused to inject malicious JavaScript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'lazysizes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642'}, {'type': 'WEB', 'url': 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:08:07Z', 'nvd_published_at': '2020-04-22T16:15:00Z'} |
1.4.0 | GHSA-v39h-qm32-8gwq | 2021-07-29T15:53:05Z | 2021-12-09T19:57:29Z | null | ['CVE-2020-7616'] | Improperly Controlled Modification of Dynamically-Determined Object Attributes in express-mock-middleware | express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-mock-middleware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7616'}, {'type': 'WEB', 'url': 'https://github.com/LingyuCoder/express-mock-middleware/blob/master/lib/index.js#L39'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T17:28:15Z', 'nvd_published_at': '2020-04-07T14:15:00Z'} |
1.4.0 | GHSA-4jwx-78vx-gm6g | 2021-12-14T15:29:58Z | 2021-12-10T20:34:01Z | null | ['CVE-2021-4033'] | Cross-Site Request Forgery in kimai2 | CSRF in saving invoices / modifying status of invoices (pending and cancel only) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4033'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T20:05:32Z', 'nvd_published_at': '2021-12-09T20:15:00Z'} |
1.4.0 | GHSA-j5qg-w9jg-3wg3 | 2021-12-16T15:47:47Z | 2021-12-16T18:53:57Z | null | [] | Inability to de-op players if listed in ops.txt with non-lowercase letters | ### Impact
Originally reported in iTXTech/Genisys#1188
```txt
PotterHarry98
potterharry98
```
`deop PotterHarry98`
will remove `potterharry98` from the ops.txt but not `PotterHarry98`.
Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match:
https://github.com/pmmp/PocketMine-MP/blob/22bb1ce8e03dba57173debf0415390511d68e045/src/utils/Config.php#L449
This means that it's possible to make yourself impossible to de-op (using commands) by adding your name to ops.txt with uppercase letters.
### Patches
4d37b79ff7f9d9452e988387f97919a9a1c4954e
### Workarounds
This can be easily addressed by removing the offending lines from ops.txt manually.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP)
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3'}, {'type': 'WEB', 'url': 'https://github.com/iTXTech/Genisys/issues/1188'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:47:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-23fp-fmrv-f5px | 2021-03-30T13:53:18Z | 2021-12-10T17:22:01Z | null | ['CVE-2020-8123'] | Uncontrolled Resource Consumption in strapi | A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.18.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.18.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8123'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/c0c191c08f05fe10d7a6b1bf9475c1a651a89362'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/768574'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T13:53:18Z', 'nvd_published_at': '2020-02-04T20:15:00Z'} |
1.4.0 | GHSA-9w8f-7wgr-2h7g | 2021-12-03T15:37:45Z | 2021-12-03T20:42:59Z | null | ['CVE-2021-3992'] | kimai2 is vulnerable to Improper Access Control | kimai2 is vulnerable to Improper Access Control | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93'}] | {'cwe_ids': ['CWE-284', 'CWE-639', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-03T15:37:45Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-j7c3-96rf-jrrp | 2021-12-16T18:57:47Z | 2021-12-16T21:01:51Z | null | [] | Critical vulnerability in log4j may affect generated PEAR projects | ### Impact
UIMA PEAR projects that have been generated with the `de.averbis.textanalysis:pear-archetype ` version `2.0.0` have a maven dependency with scope `test` to` log4j 2.8.2` and might be affected by CVE-2021-44228.
### Patches
- The issue has been resolved in `de.averbis.textanalysis:pear-archetype ` version `2.0.1`. Please make sure to use `de.averbis.textanalysis:pear-archetype ` version >= `2.0.1` for generating new PEAR projects.
- Existing maven PEAR projects can be patched by manually upgrading to `log4j` >= `2.16.0` in `pom.xml`.
### References
https://www.lunasec.io/docs/blog/log4j-zero-day/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/averbis/pear-archetype/issues
| [] | [{'package': {'ecosystem': 'Maven', 'name': 'de.averbis.textanalysis:pear-archetype'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/averbis/pear-archetype/security/advisories/GHSA-j7c3-96rf-jrrp'}, {'type': 'WEB', 'url': 'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/averbis/pear-archetype'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T18:57:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2x32-jm95-2cpx | 2021-06-01T17:58:22Z | 2021-12-20T17:52:12Z | null | ['CVE-2020-27847'] | Authentication Bypass in dex | A vulnerability exists in the SAML connector of the github.com/dexidp/dex library used to process SAML Signature Validation. This flaw allows an attacker to bypass SAML authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects dex versions before 2.27.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27847'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1907732'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}] | {'cwe_ids': ['CWE-228', 'CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:58:22Z', 'nvd_published_at': '2021-05-28T11:15:00Z'} |
1.4.0 | GHSA-9x7m-9hpg-xxmw | 2021-07-19T15:44:57Z | 2021-12-10T17:24:16Z | null | ['CVE-2021-25953'] | Prototype Pollution in putil-merge | Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'putil-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25953'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25953'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:19:36Z', 'nvd_published_at': '2021-07-14T11:15:00Z'} |
1.4.0 | GHSA-95jp-77w6-qj52 | 2021-12-06T18:19:24Z | 2021-12-06T18:17:45Z | null | ['CVE-2009-4924'] | Cross-site Scripting in python-cjson | Python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-cjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4924'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/python-cjson/PYSEC-2010-26.yaml'}, {'type': 'WEB', 'url': 'http://pypi.python.org/pypi/python-cjson/'}, {'type': 'WEB', 'url': 'http://t3.dotgnu.info/blog/insecurity/quotes-dont-help.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T18:17:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3q9x-w53p-jg53 | 2023-09-13T21:57:41Z | 2021-12-09T19:52:03Z | null | ['CVE-2020-7634'] | OS Command Injection in heroku-addonpool | heroku-addonpool through 0.1.15 is vulnerable to Command Injection. The second parameter of the exported function `HerokuAddonPool(id, app, opt)` can be controlled by users without any sanitization.
**PoC**
```js
var Root = require("heroku-addonpool");
var root = Root("sss", "& touch JHU", {});
root.setup();
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'heroku-addonpool'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7634'}, {'type': 'WEB', 'url': 'https://github.com/nodef/heroku-addonpool/commit/b1a5b316473ac92d783f3d54ee048d54082da38d'}, {'type': 'WEB', 'url': 'https://github.com/nodef/heroku-addonpool/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HEROKUADDONPOOL-564428'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T22:14:43Z', 'nvd_published_at': '2020-04-06T13:15:00Z'} |
1.4.0 | GHSA-v95c-p5hm-xq8f | 2023-08-29T22:55:54Z | 2021-12-07T21:22:39Z | null | ['CVE-2021-43784'] | Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration in RunC | ### Impact
In runc, [netlink](https://www.man7.org/linux/man-pages/man7/netlink.7.html) is used internally as a serialization system for specifying the relevant container configuration to the C portion of our code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration.
This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces.
Prior to 9c444070ec7bb83995dbc0185da68284da71c554, in practice it was fairly difficult to specify an arbitrary-length netlink message with most container runtimes. The only user-controlled byte array was the namespace paths attributes which can be specified in runc's `config.json`, but as far as we can tell no container runtime gives raw access to that configuration setting -- and having raw access to that setting **would allow the attacker to disable namespace protections entirely anyway** (setting them to `/proc/1/ns/...` for instance). In addition, each namespace path is limited to 4096 bytes (with only 7 namespaces supported by runc at the moment) meaning that even with custom namespace paths it appears an attacker still cannot shove enough bytes into the netlink bytemsg in order to overflow the uint16 counter.
However, out of an abundance of caution (given how old this bug is) we decided to treat it as a potentially exploitable vulnerability with a low severity. After 9c444070ec7bb83995dbc0185da68284da71c554 (which was not present in any release of runc prior to the discovery of this bug), all mount paths are included as a giant netlink message which means that this bug becomes significantly more exploitable in more reasonable threat scenarios.
The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure), though as mentioned above it appears this bug was not practically exploitable on any released version of runc to date.
### Patches
The patch for this is d72d057ba794164c3cce9451a00b72a78b25e1ae and runc 1.0.3 was released with this bug fixed.
### Workarounds
To the extent this is exploitable, disallowing untrusted namespace paths in container configuration should eliminate all practical ways of exploiting this bug. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.
### References
* commit d72d057ba794 ("runc init: avoid netlink message length overflows")
* https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
### Credits
Thanks to Felix Wilhelm from Google Project Zero for discovering and reporting this vulnerability. In particular, the fact they found this vulnerability so quickly, before we made a 1.1 release of runc (which would've been vulnerable) was quite impressive.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/opencontainers/runc)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-v95c-p5hm-xq8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43784'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/d72d057ba794164c3cce9451a00b72a78b25e1ae'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/project-zero/issues/detail?id=2241'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/runc'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00005.html'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0274'}] | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:09:36Z', 'nvd_published_at': '2021-12-06T18:15:00Z'} |
1.4.0 | GHSA-6r7c-6w96-8pvw | 2022-01-04T18:56:03Z | 2021-12-07T21:21:49Z | null | [] | Remote Code Execution in AjaxNetProfessional | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
### Description
Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.
Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.
Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.
An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.
Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).
### Releases
Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.
### Workarounds
There is no workaround available that addresses all issues except updating to latest version from GitHub.
### References
Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971
Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this GitHub repository
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.29.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.11.29'}}] | [{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}, {'type': 'PACKAGE', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:20:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gjrj-9rj4-pgwx | 2021-12-17T19:33:49Z | 2021-12-15T22:51:07Z | null | [] | DoS Vulnerability from Upstream Actix Web Issues | ### Impact
This vulnerability affects all users of the `perseus deploy` functionality who have not exported their sites to static files. If you are using the inbuilt Perseus server in production, there is a memory leak in Actix Web stemming from [this upstream issue](https://github.com/actix/actix-web/issues/1780) which can allow even a single user to cause the process to exhaust its memory on low-memory servers by continuously reloading the page. Note that this issue does not affect all Actix Web applications, but rather results from certain usage patterns which appear to be present in Perseus' server mechanics.
### Patches
This vulnerability is addressed in all versions after Perseus `v0.3.0-beta.21`, which temporarily discontinues the use of `perseus-actix-web` (until the upstream bug is fixed) and switches to `perseus-warp` instead, which utilizes [Warp](https://github.com/seanmonstar/warp).
Additionally, as of Perseus `v0.3.0-beta.22`, the Actix Web integration has been upgraded to use the latest unstable beta version of Actix Web, which appears to partially resolve this issue (the severity of the memory leak is reduced). However, due to the instability of this version, the default integration will remain Warp for now, and a warning will appear if you attempt to use the Actix Web integration.
<details>
<summary>Using the Actix Web integration</summary>
If the instability of the latest beta version of Actix Web is not a concern for you, you can use this integration by adding `-i actix-web` to `perseus serve` and the like. This will print a warning about instability, and will then operate with the beta version. Please report any failures in functionality that are not security-related to the Perseus team by [opening an issue on the repository](https://github.com/arctic-hen7/perseus/issues/new/choose).
Note however that switching to the Warp integration requires no code changes whatsoever unless you've ejected, so there are very few disadvantages to this change.
</details>
### Workarounds
Due to significant infrastructural changes within other Perseus packages that were needed to support Warp, this integration is not backward-compatible with any previous version of Perseus, meaning there are no easily feasible workarounds. If you're only in development though, this vulnerability is irrelevant until you push to production.
### CVE Status
Due to GitHub's requirements, a CVE can't be issued for this security advisory because the issue is technically one with Actix Web (though it's only in combination with certain mechanics in the Perseus server that this problem arises).
### References
See [this upstream issue](https://github.com/actix/actix-web/issues/1780) in Actix Web.
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this repository
* Email me at [arctic_hen7@pm.me](mailto:arctic_hen7@pm.me)
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'perseus-actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0-beta.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0-beta.21'}}] | [{'type': 'WEB', 'url': 'https://github.com/arctic-hen7/perseus/security/advisories/GHSA-gjrj-9rj4-pgwx'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/1780'}, {'type': 'PACKAGE', 'url': 'https://github.com/arctic-hen7/perseus'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T21:42:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g6vq-wc8w-4g69 | 2021-12-03T15:19:23Z | 2021-12-06T17:19:18Z | null | ['CVE-2021-4015'] | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4015'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/518b4ba5a7a56760902758ae0a2c6a392c2f4d37'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.6.5'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:22:54Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-f3w5-v9xx-rp8p | 2021-05-20T20:10:47Z | 2021-12-20T18:17:41Z | null | [] | Signature verification failure in Tendermint | _The root cause of this security vulnerability is in the Tendermint specification, and this advisory is a duplicate of https://github.com/tendermint/spec/security/advisories/GHSA-jqfc-687g-59pw._
### Impact
Tendermint light clients running versions 0.34.0 to 0.34.8 are unable to detect and punish a new kind of attack. We’re calling this a “forward lunatic attack,” or FLA. The severity of this vulnerability is _moderate_.
Note that an FLA cannot be successfully executed unless there are already ⅓+ Byzantine validators, and therefore outside of Tendermint’s security model; however, it is important to be able to detect and punish these kinds of attacks in order to incentivize correct behavior.
In an FLA, an attacking validator (with ⅓+ voting power) signs commit messages for arbitrary application state associated with a block height that hasn’t been seen yet, hence the name “forward lunatic attacks.” A malicious validator effectively executes a [lunatic attack](https://docs.tendermint.com/master/spec/light-client/accountability/#the-misbehavior-of-faulty-validators), but signs messages for a target block that is higher than the current block. This can be dangerous: Typically, misbehavior evidence is only created when there are conflicting blocks at the same height, but by targeting a block height that is far “ahead” of the current chain height, it’s possible that the chain will not produce a (conflicting) block at the target height in time to create evidence.
Prior to Tendermint v0.34.9, the light client could accept a bad header from its primary witness, and would not be able to form evidence of this deception, even if all the secondary witnesses were correct. Because the light client is responsible for verifying cross-chain state for IBC, a successful FLA could result in loss of funds. However, it is important to note that FLAs are only possible outside the Tendermint security model.
All FLAs, attempted and successful, leave traces of provable misbehavior on-chain. A faulty header contains signatures from the faulty validator, and even in unpatched versions of Tendermint Core, networks could use social consensus (off-chain action) to recover the network. The patches introduced in Tendermint Core v0.34.9 handle all evidence automatically and on-chain.
Note that this fix also allows for successful automatic reporting of FLAs, even after a chain halt. By adding a time to FetchBlock, light clients effectively have a backup way to determine if a halted chain should have continued, and it will be able to submit evidence as soon as the chain resumes.
### Patches
This problem has been patched in Tendermint Core v0.34.9.
### Workarounds
There are no workarounds. All users are recommended to upgrade to Tendermint Core v0.34.9 at their earliest possible convenience.
### Credits
Thank you to @MaximilianDiez for originally surfacing this issue, and to @cmwaters, @josef-widder, and @milosevic for creating fixes at both the implementation and specification level.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)
* Email us at [security@tendermint.com](mailto:security@tendermint.com) | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.34.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-f3w5-v9xx-rp8p'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:10:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2589-w6xf-983r | 2021-07-01T21:48:39Z | 2021-12-10T18:58:49Z | null | ['CVE-2021-23398'] | Cross-site scripting in react-bootstrap-table | All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'react-bootstrap-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23398'}, {'type': 'WEB', 'url': 'https://github.com/AllenFang/react-bootstrap-table/issues/2071'}, {'type': 'WEB', 'url': 'https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T13:08:06Z', 'nvd_published_at': '2021-06-24T15:15:00Z'} |
1.4.0 | GHSA-74r6-grj9-8rq6 | 2021-12-06T22:06:15Z | 2021-12-16T15:27:55Z | null | ['CVE-2021-23758'] | Remote Code Execution in AjaxNetProfessional | All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.29.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.11.29'}}] | [{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}, {'type': 'PACKAGE', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:06:15Z', 'nvd_published_at': '2021-12-03T20:15:00Z'} |
1.4.0 | GHSA-49vv-6q7q-w5cf | 2021-09-01T19:36:25Z | 2021-12-10T17:22:12Z | null | ['CVE-2019-19609'] | OS Command Injection in Strapi | The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19609'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4636'}, {'type': 'WEB', 'url': 'https://bittherapy.net/post/strapi-framework-remote-code-execution/'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163940/Strapi-3.0.0-beta.17.7-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:24:09Z', 'nvd_published_at': '2019-12-05T20:15:00Z'} |
1.4.0 | GHSA-wp4h-pvgw-5727 | 2021-12-02T14:45:03Z | 2021-12-02T14:50:51Z | null | ['CVE-2019-0230'] | Improperly Controlled Modification of Dynamically-Determined Object Attributes in Apache Struts | Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0230'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/ww/s2-059'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://launchpad.support.sap.com/#/notes/2982840'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T14:45:03Z', 'nvd_published_at': '2020-09-14T17:15:00Z'} |
1.4.0 | GHSA-627p-rr78-99rj | 2021-05-24T17:56:03Z | 2021-12-20T17:56:03Z | null | ['CVE-2020-5415'] | GitLab auth uses full name instead of username as user ID, allowing impersonation | ### Impact
Installations which use the GitLab auth connector are vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another GitLab user who is granted access to a Concourse team by having their full name listed under `users` in the team configuration or given to the `--gitlab-user` flag.
See the [GitLab auth docs](https://concourse-ci.org/gitlab-auth.html) for details.
Concourse installations which do not configure the GitLab auth connector are not affected.
### Patches
Concourse [v6.3.1](https://github.com/concourse/concourse/releases/tag/v6.3.1) and [v6.4.1](https://github.com/concourse/concourse/releases/tag/v6.4.1) were both released with a fix on August 4th, 2020.
Both versions change the GitLab connector to use the username, rather than the full name. This was always the intent, and the previous behavior was originally reported as a bug (concourse/dex#7) prior to being reported as a security issue.
Any Concourse teams which configure GitLab users will have to switch each user from their full name to their username upon upgrading to these versions.
### Workarounds
GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.
### References
* concourse/dex#12: PR with the fix
### For more information
If you have any questions or comments about this advisory, you may reach us privately at [concourseteam+security@gmail.com](mailto:concourseteam+security@gmail.com). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.1'}]}], 'versions': ['6.4.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}], 'versions': ['6.3.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.1'}]}], 'versions': ['6.4.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}], 'versions': ['6.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/concourse/concourse/security/advisories/GHSA-627p-rr78-99rj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5415'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5415'}] | {'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:56:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xq58-69h2-765m | 2021-12-06T21:52:30Z | 2021-12-16T15:27:06Z | null | ['CVE-2021-44227'] | Cross Site Request Forgery in mailman | In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.38'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44227'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/mailman/+bug/1952384'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/mailman'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/06/msg00011.html'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:52:30Z', 'nvd_published_at': '2021-12-02T03:15:00Z'} |
1.4.0 | GHSA-q34h-97wf-8r8j | 2022-01-04T19:42:10Z | 2021-12-16T21:02:12Z | null | ['CVE-2021-43837'] | vault-cli contains possible RCE when reading user-defined data | ### Impact
_What kind of vulnerability is it? Who is impacted?_
vault-cli features the ability for rendering templated values (as explained in the [documentation](https://github.com/peopledoc/vault-cli/blob/2.2.1/docs/howto/templated_secrets.rst)). When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template.
Jinja2 is a powerful templating engine and it's not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk.
If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you.
This does not impact `vault` itself, except for the fact that the attacker, having an RCE on the machine that executes `vault-cli`, may abuse the token that `vault-cli` uses, to read, write or delete other data from the vault.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability.
Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely.
### References
_Are there any links users can visit to find out more?_
Here's an article explaining how jinja2 templates might be exploited to have side effects: https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the vault-cli repo](https://github.com/peopledoc/vault-cli/issues/new)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vault-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/security/advisories/GHSA-q34h-97wf-8r8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43837'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/pull/198'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/commit/3ba3955887fd6b7d4d646c8b260f21cebf5db852'}, {'type': 'PACKAGE', 'url': 'https://github.com/peopledoc/vault-cli'}, {'type': 'WEB', 'url': 'https://github.com/peopledoc/vault-cli/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://podalirius.net/en/publications/grehack-2021-optimizing-ssti-payloads-for-jinja2/'}] | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T19:28:49Z', 'nvd_published_at': '2021-12-16T19:15:00Z'} |
1.4.0 | GHSA-f545-vpwp-r9j7 | 2021-12-03T15:18:14Z | 2021-12-03T20:41:35Z | null | ['CVE-2021-3989'] | showdoc is vulnerable to URL Redirection to Untrusted Site | showdoc is vulnerable to URL Redirection to Untrusted Site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T20:39:26Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-qqxw-m5fj-f7gv | 2021-05-24T21:20:17Z | 2021-12-20T18:02:38Z | null | ['CVE-2020-5233'] | The pattern '/\domain.com' is not disallowed when redirecting, allowing for open redirect | ### Impact
An open redirect vulnerability has been found in `oauth2_proxy`. Anyone who uses `oauth2_proxy` may potentially be impacted.
For a context [detectify] have an in depth blog post about the potential impact of an open redirect. Particularly see the OAuth section.
**tl;dr**: People's authentication tokens could be silently harvested by an attacker. e.g:
`facebook.com/oauth.php?clientid=123&state=abc&redirect_url=https://yourdomain.com/red.php?url%3dhttps://attacker.com/`
### Patches
@sauyon found the issue, and has submitted a patch.
```
diff --git a/oauthproxy.go b/oauthproxy.go
index 72ab580..f420df6 100644
--- a/oauthproxy.go
+++ b/oauthproxy.go
@@ -517,7 +517,7 @@ func (p *OAuthProxy) GetRedirect(req *http.Request) (redirect string, err error)
// IsValidRedirect checks whether the redirect URL is whitelisted
func (p *OAuthProxy) IsValidRedirect(redirect string) bool {
switch {
- case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//"):
+ case strings.HasPrefix(redirect, "/") && !strings.HasPrefix(redirect, "//") && !strings.HasPrefix(redirect, "/\\"):
return true
case strings.HasPrefix(redirect, "http://") || strings.HasPrefix(redirect, "https://"):
redirectURL, err := url.Parse(redirect)
```
This patch will be applied to the next release, which is scheduled for when this is publicly disclosed.
### Workarounds
At this stage there is no work around. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/oauth2-proxy/oauth2-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-qqxw-m5fj-f7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5233'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a06f3c0ca2b5fc5fa18a91781b313607b2'}, {'type': 'WEB', 'url': 'https://blog.detectify.com/2019/05/16/the-real-impact-of-an-open-redirect/'}, {'type': 'WEB', 'url': 'https://github.com/oauth2-proxy/oauth2_proxy/releases/tag/v5.0.0'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T21:20:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x949-7cm6-fm6p | 2021-12-15T15:22:46Z | 2021-12-16T14:34:40Z | null | ['CVE-2021-23639'] | Code Injection in md-to-pdf. | The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'md-to-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639'}, {'type': 'WEB', 'url': 'https://github.com/simonhaenisch/md-to-pdf/issues/99'}, {'type': 'WEB', 'url': 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonhaenisch/md-to-pdf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T14:31:35Z', 'nvd_published_at': '2021-12-10T20:15:00Z'} |
1.4.0 | GHSA-67c7-5v9j-227r | 2021-12-03T15:16:39Z | 2021-12-03T20:43:06Z | null | ['CVE-2021-3983'] | Cross-site Scripting in kimai2 | kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3983'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T19:29:53Z', 'nvd_published_at': '2021-12-01T12:15:00Z'} |
1.4.0 | GHSA-g7p8-r2ch-4rmf | 2022-01-04T18:56:53Z | 2021-12-17T20:41:45Z | null | ['CVE-2020-35215'] | Malicious Atomix node queries expose sensitive information | An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35215'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1pRRLfdSUqUZ688CZ9e9AyceuXPGp9oyGj7j4bdSsBcw/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}] | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T19:00:58Z', 'nvd_published_at': '2021-12-16T20:15:00Z'} |
1.4.0 | GHSA-33gc-6cw9-w3g4 | 2023-09-19T10:02:42Z | 2021-12-10T20:23:19Z | null | ['CVE-2021-36564'] | Deserialization of Untrusted Data in topthink/framework | ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36564'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2559'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T20:30:33Z', 'nvd_published_at': '2021-12-06T21:15:00Z'} |
1.4.0 | GHSA-2jhh-5xm2-j4gf | 2021-12-06T22:11:44Z | 2021-12-10T20:17:55Z | null | ['CVE-2021-43415'] | Improper Authentication in HashiCorp Nomad | HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. Fixed in 1.0.14, 1.1.8, and 1.2.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43415'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-31-nomad-qemu-task-driver-allowed-paths-bypass-with-job-args/32288'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:11:44Z', 'nvd_published_at': '2021-12-03T22:15:00Z'} |
1.4.0 | GHSA-h3cw-g4mq-c5x2 | 2022-04-22T18:19:50Z | 2021-12-09T19:14:51Z | null | ['CVE-2020-24616'] | Code Injection in jackson-databind | This project contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24616'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2814'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3d97153944f7de9c19c1b3637b33d3cf1fbbe4d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T17:38:11Z', 'nvd_published_at': '2020-08-25T18:15:00Z'} |
1.4.0 | GHSA-25f5-gc4h-hc22 | 2023-09-05T21:51:12Z | 2021-12-08T19:55:30Z | null | ['CVE-2021-28680'] | Improper Privilege Management in devise_masquerade | The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side `secret_key_base` value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When `devise_masquerade` is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'devise_masquerade'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28680'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/issues/83'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/pull/76'}, {'type': 'PACKAGE', 'url': 'https://github.com/oivoodoo/devise_masquerade'}, {'type': 'WEB', 'url': 'https://github.com/oivoodoo/devise_masquerade/releases/tag/v1.3.1'}, {'type': 'WEB', 'url': 'https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-08T19:36:08Z', 'nvd_published_at': '2021-12-07T21:15:00Z'} |
1.4.0 | GHSA-3p94-vj97-fm4q | 2021-05-25T16:28:38Z | 2021-12-09T19:56:44Z | null | ['CVE-2020-7615'] | OS Command Injection in fsa | fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7615'}, {'type': 'WEB', 'url': 'https://github.com/gregof/fsa/blob/master/lib/rep.js#L12'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FSA-564118'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T16:28:38Z', 'nvd_published_at': '2020-04-07T14:15:00Z'} |
1.4.0 | GHSA-vrgh-5w3c-ggf8 | 2021-12-03T15:18:33Z | 2021-12-03T20:38:50Z | null | ['CVE-2021-3990'] | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3990'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f'}] | {'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:16:12Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-fxwm-rx68-p5vx | 2021-11-29T20:55:04Z | 2021-12-01T18:28:29Z | null | [] | XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext | The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-richtext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-richtext/security/advisories/GHSA-fxwm-rx68-p5vx'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-richtext/commit/3cebfe2ae4c22e6590632a0ff71893854a16afc5'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-richtext'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:53:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f78f-353m-cf4j | 2021-07-29T16:13:17Z | 2021-12-10T20:05:37Z | null | ['CVE-2020-7609'] | Code Injection in node-rules | node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-rules'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7609'}, {'type': 'WEB', 'url': 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832'}, {'type': 'WEB', 'url': 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:34:33Z', 'nvd_published_at': '2020-04-27T22:15:00Z'} |
1.4.0 | GHSA-w7fj-336r-vw49 | 2021-12-01T14:35:30Z | 2021-12-01T18:29:21Z | null | ['CVE-2021-43776'] | Cross-Site Scripting vulnerability in @backstage/plugin-auth-backend | ### Impact
This vulnerability allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other secrets from the user's browser. The default CSP does prevent this attack, but it is expected that some deployments have these policies disabled due to incompatibilities.
### Patches
This is vulnerability is patched in version `0.4.9` of `@backstage/plugin-auth-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-auth-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-w7fj-336r-vw49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43776'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/tree/master/plugins/auth-backend'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:19:57Z', 'nvd_published_at': '2021-11-26T19:15:00Z'} |
1.4.0 | GHSA-xxfh-x98p-j8fr | 2021-12-11T21:25:16Z | 2021-12-10T20:15:37Z | null | [] | Remote code injection in Log4j (through pax-logging-log4j2) | ### Impact
Remote Code Execution.
### Patches
Users of pax-logging 1.11.9 should update to 1.11.10.
Users of pax-logging 2.0.10 should update to 2.0.11.
### Workarounds
Set system property `-Dlog4j2.formatMsgNoLookups=true`
### References
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
| [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.ops4j.pax.logging:pax-logging-log4j2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.ops4j.pax.logging:pax-logging-log4j2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ops4j/org.ops4j.pax.logging/security/advisories/GHSA-xxfh-x98p-j8fr'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'PACKAGE', 'url': 'https://github.com/ops4j/org.ops4j.pax.logging'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-10T18:54:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xxj-gcjq-wgf4 | 2021-12-08T19:28:53Z | 2021-12-07T21:23:17Z | null | ['CVE-2021-43789'] | SQL injection in prestashop/prestashop | ### Impact
Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters
### Patches
The problem is fixed in 1.7.8.2 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.5.0'}, {'fixed': '1.7.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.8.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/issues/26623'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/89.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T20:58:26Z', 'nvd_published_at': '2021-12-07T17:15:00Z'} |
1.4.0 | GHSA-4x2f-54wr-4hjg | 2021-11-29T19:15:58Z | 2021-12-01T18:29:32Z | null | ['CVE-2021-41279'] | Potential Zip Slip Vulnerability in baserCMS | There is a OS Command Injection Vulnerability on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
Target
baserCMS 4.5.3 and earlier versions
Vulnerability
OS Command Injection Vulnerability.
Countermeasures
Update to the latest version of baserCMS
Credits
Daniele Scanu @SoterItSecurity | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41279'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T19:15:58Z', 'nvd_published_at': '2021-11-26T18:15:00Z'} |
1.4.0 | GHSA-gwpx-q2h9-wxgx | 2021-12-03T15:16:06Z | 2021-12-03T20:43:25Z | null | ['CVE-2021-3964'] | elgg is vulnerable to Authorization Bypass Through User-Controlled Key | elgg is vulnerable to Authorization Bypass Through User-Controlled Key | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3964'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}, {'type': 'PACKAGE', 'url': 'https://github.com/elgg/elgg/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a'}] | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:20:04Z', 'nvd_published_at': '2021-12-01T12:15:00Z'} |
1.4.0 | GHSA-v3r2-3fp4-rp46 | 2023-09-06T20:14:32Z | 2021-12-10T20:05:57Z | null | ['CVE-2020-7643'] | Prototype pollution in paypal-adaptive | paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a `__proto__` payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'paypal-adaptive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7643'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs'}, {'type': 'WEB', 'url': 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs/blob/master/lib/paypal-adaptive.js#L31'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:14:36Z', 'nvd_published_at': '2020-04-23T15:15:00Z'} |
1.4.0 | GHSA-93j5-g845-9wqp | 2021-12-02T17:54:05Z | 2021-12-02T17:52:45Z | null | ['CVE-2021-27023'] | Unsafe HTTP Redirect in Puppet Agent and Puppet Server | A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.25.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27023'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2021-27023.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2021-27023'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:48Z', 'nvd_published_at': '2021-11-18T15:15:00Z'} |
1.4.0 | GHSA-5cqm-crxm-6qpv | 2022-07-29T14:18:05Z | 2021-12-14T21:36:20Z | null | ['CVE-2021-41816'] | Buffer overrun in CGI.escape_html | A buffer overrun vulnerability was discovered in CGI.escape_html. This can lead to a buffer overflow when a user passes a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41816'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/959ccf0b6a672bcc64aeaa60c6e1f9e728f1e87f'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/ad079c1cb5f58eba1ffac46da79995fcf94a3a6e'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/c6a37a671b556eb06140ea89cc465136b24207a6'}, {'type': 'WEB', 'url': 'https://github.com/ruby/cgi/commit/c728632c1c09d46cfd4ecbff9caaa3651dd1002a'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1328463'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/cgi'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-41816.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/4MQ568ZG47c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2021-41816'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220303-0006/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/'}] | {'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T21:34:08Z', 'nvd_published_at': '2022-02-06T21:15:00Z'} |
1.4.0 | GHSA-5vr6-hm68-5j9p | 2021-12-06T21:36:37Z | 2021-12-03T20:49:16Z | null | ['CVE-2021-44279'] | Cross-site Scripting in LibreNMS | LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T18:54:26Z', 'nvd_published_at': '2021-12-01T14:15:00Z'} |
1.4.0 | GHSA-gxjj-f44v-qm94 | 2021-12-14T18:14:54Z | 2021-12-14T18:14:04Z | 2021-05-27T19:07:52Z | [] | Open Redirect in Flask-Security-Too | # Withdrawn
Duplicate of GHSA-6qmf-fj6m-686c
# Original description
Flask-Security-Too allows redirects after many successful views (e.g. /login) by honoring the ?next query param. There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL.
This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com
will pass FS's relative URL check however many browsers will gladly convert this to http://github.com. Thus an attacker could send such a link to an unwitting user, using a legitimate site and have it redirect to whatever site they want.
This is considered a low severity due to the fact that if Werkzeug is used (which is very common with Flask applications) as the WSGI layer, it by default ALWAYS ensures that the Location header is absolute - thus making this attack vector mute. It is possible for application writers to modify this default behavior by setting the 'autocorrect_location_header=False`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32618'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/issues/486'}] | {'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:52:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j4mm-7pj3-jf7v | 2022-01-04T18:54:12Z | 2021-12-14T21:43:00Z | null | ['CVE-2021-43807'] | HTTP Method Spoofing | Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible.
### Impact
The vulnerability allows attackers to craft links or forms which may change the server state. For example, the following GET request would create a new user:
```sh
% curl -i -u admin:opencast \
'https://legacy.opencast.org/admin-ng/users/test.json?_method=PUT&username=test&password=attack'
HTTP/2 200
…
```
If an admin is logged in to legacy.opencast.org and accidentally clicks this link, a user will silently be created.
### Patches
This issue is fixed in Opencast 9.10 and 10.0.
### Workarounds
You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case.
### References
- [Fix for 10.0](https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8)
- [Fix for 9.10](https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43807'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}] | {'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T18:49:26Z', 'nvd_published_at': '2021-12-14T18:15:00Z'} |
1.4.0 | GHSA-q5wr-fvpq-p67g | 2021-07-26T18:09:11Z | 2021-12-10T17:23:30Z | null | ['CVE-2020-28248'] | Integer Overflow in png-img | An integer overflow in the PngImg::InitStorage_() function of png-img before 3.1.0 leads to an under-allocation of heap memory and subsequently an exploitable heap-based buffer overflow when loading a crafted PNG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'png-img'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28248'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img'}, {'type': 'WEB', 'url': 'https://github.com/gemini-testing/png-img/compare/v3.0.0...v3.1.0'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-142-gemini-png-img'}] | {'cwe_ids': ['CWE-190', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:09:11Z', 'nvd_published_at': '2021-02-20T00:15:00Z'} |
1.4.0 | GHSA-m3fm-h5jp-q79p | 2023-02-03T20:37:11Z | 2021-12-20T16:58:14Z | null | ['CVE-2016-1906'] | Authorization bypass in Openshift | Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1906'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/issues/6556'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/pull/6576'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0070'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0351'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2016-1906'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1297916'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1906'}] | {'cwe_ids': ['CWE-285'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:01:34Z', 'nvd_published_at': '2016-02-03T18:59:00Z'} |
1.4.0 | GHSA-rp2c-jrgp-cvr8 | 2021-12-06T22:08:43Z | 2021-12-16T15:32:31Z | null | ['CVE-2021-23562'] | Code injection in plupload | This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'plupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/moxiecode/plupload'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909'}] | {'cwe_ids': ['CWE-434', 'CWE-75'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T22:08:43Z', 'nvd_published_at': '2021-12-03T20:15:00Z'} |
1.4.0 | GHSA-j96p-r523-8r3w | 2021-11-24T19:42:20Z | 2021-12-03T20:52:02Z | null | ['CVE-2021-43669'] | HTTP Request Smuggling in github.com/hyperledger/fabric | A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43669'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/2828'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperledger/fabric'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/releases/tag/v2.4.0-beta'}, {'type': 'WEB', 'url': 'https://jira.hyperledger.org/browse/FAB-18528'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T19:42:20Z', 'nvd_published_at': '2021-11-18T16:15:00Z'} |
1.4.0 | GHSA-wxc4-f4m6-wwqv | 2023-02-09T17:45:10Z | 2021-12-20T16:55:06Z | null | ['CVE-2019-11254'] | Excessive Platform Resource Consumption within a Loop in Kubernetes | The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-yaml/yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11254'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/89535'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/pull/555'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0036'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200413-0003/'}] | {'cwe_ids': ['CWE-1050'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:24:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ff45-7prw-58vj | 2021-11-30T14:50:39Z | 2021-12-02T17:51:22Z | 2021-11-29T18:17:00Z | ['CVE-2021-23732'] | OS Command injection in docker-cli-js | # Withdrawn
After reviewing this CVE, and [this response from the maintainer](https://github.com/Quobject/docker-cli-js/issues/22#issuecomment-967760940), we have withdrawn this advisory.
# Original CVE description
This affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system. | [] | [{'package': {'ecosystem': 'npm', 'name': 'docker-cli-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23732'}, {'type': 'WEB', 'url': 'https://github.com/Quobject/docker-cli-js/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/Quobject/docker-cli-js/issues/22#issuecomment-967760940'}, {'type': 'PACKAGE', 'url': 'https://github.com/Quobject/docker-cli-js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCKERCLIJS-1568516'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:50:39Z', 'nvd_published_at': '2021-11-22T17:15:00Z'} |
1.4.0 | GHSA-qrvj-274h-hfcg | 2022-03-25T20:42:58Z | 2021-12-07T00:00:27Z | null | ['CVE-2021-36567'] | Deserialization of Untrusted Data in topthink/framework | ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36567'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2561'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T20:42:58Z', 'nvd_published_at': '2021-12-06T21:15:00Z'} |
1.4.0 | GHSA-7v7w-f7c6-f829 | 2022-08-11T18:47:52Z | 2021-12-16T21:01:15Z | null | ['CVE-2021-4111'] | YetiForceCRM is vulnerable to Business Logic Errors because product amount can be a negative number | YetiForceCRM is vulnerable to Business Logic Errors because product amount can be a negative number. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-16T15:41:33Z', 'nvd_published_at': '2021-12-15T09:15:00Z'} |
1.4.0 | GHSA-wh8g-3j2c-rqj5 | 2022-02-08T22:00:53Z | 2021-12-09T19:15:00Z | null | ['CVE-2020-35490'] | Serialization gadgets exploit in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35490'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2986'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210122-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:06:39Z', 'nvd_published_at': '2020-12-17T19:15:00Z'} |
1.4.0 | GHSA-gp4j-w3vj-7299 | 2021-05-20T16:22:33Z | 2021-12-20T18:21:43Z | null | ['CVE-2016-9962'] | Information Exposure in RunC | RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9962'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/releases/tag/v1.12.6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-34'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0116.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0123.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0127.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jan/21'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Jan/29'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/540001/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95361'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:22:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-557g-r22w-9wvx | 2023-02-28T16:47:09Z | 2021-12-20T18:25:33Z | null | ['CVE-2019-11328'] | Incorrect Permission Assignment for Critical Resource in Singularity | An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11328'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/releases/tag/v3.2.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/16/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108360'}] | {'cwe_ids': ['CWE-269', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:50:05Z', 'nvd_published_at': '2019-05-14T21:29:00Z'} |
1.4.0 | GHSA-mg3m-f475-28hv | 2021-11-29T20:22:25Z | 2021-12-01T18:28:51Z | null | ['CVE-2021-43783'] | Path Traversal in @backstage/plugin-scaffolder-backend | ### Impact
A malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend host instance.
This vulnerability can in some situation also be exploited through user input when executing a template, meaning you do not need write access to the templates. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents.
### Patches
This vulnerability is fixed in version `0.15.14` of the `@backstage/plugin-scaffolder-backend`.
### Workarounds
This attack is mitigated by restricting access and requiring reviews when registering or modifying scaffolder templates.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-mg3m-f475-28hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43783'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/f9352ab606367cd9efc6ff048915c70ed3013b7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:22:25Z', 'nvd_published_at': '2021-11-29T20:15:00Z'} |
1.4.0 | GHSA-66hf-2p6w-jqfw | 2022-08-11T19:19:57Z | 2021-12-08T19:57:36Z | null | ['CVE-2021-43808'] | Laravel Framework XSS in Blade templating engine | A security researcher has disclosed a possible XSS vulnerability in the Blade templating engine.
Given the following two Blade templates:
resources/views/parent.blade.php:
```html
@section('content')
<input value="{{ $value }}">
@show
```
resources/views/child.blade.php:
```html
@extends('parent')
@section('content')
<input value="{{ $value }}">
@endsection
```
And a route like the following:
```php
Route::get('/example', function() {
$value = '//localhost/###parent-placeholder-040f06fd774092478d450774f5ba30c5da78acc8## onclick=location.assign(this.value);//';
return view('child', ['value' => $value]);
});
```
The broken HTML element may be clicked and the user is taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed.
This vulnerability has been patched by determining the parent placeholder at runtime and using a random hash that is unique to each request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.42'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.75.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-66hf-2p6w-jqfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43808'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39906'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39908'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/39909'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/commit/b8174169b1807f36de1837751599e2828ceddb9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v6.20.42'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v7.30.6'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/releases/tag/v8.75.0'}] | {'cwe_ids': ['CWE-327', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-07T21:33:14Z', 'nvd_published_at': '2021-12-08T00:15:00Z'} |
1.4.0 | GHSA-8c9x-wfgj-v78w | 2021-12-06T21:57:44Z | 2021-12-16T15:31:58Z | null | ['CVE-2021-4000'] | Open Redirect in showdoc | showdoc is vulnerable to URL Redirection to Untrusted Site | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-06T21:57:44Z', 'nvd_published_at': '2021-12-03T11:15:00Z'} |
1.4.0 | GHSA-v26w-gcxh-v4r7 | 2022-06-29T20:42:16Z | 2021-12-10T18:50:40Z | null | ['CVE-2021-25952'] | Prototype polluation in just-safe-set | Prototype pollution vulnerability in ‘just-safe-set’ versions 1.0.0 through 2.2.1 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'just-safe-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25952'}, {'type': 'WEB', 'url': 'https://github.com/angus-c/just/pull/267'}, {'type': 'WEB', 'url': 'https://github.com/angus-c/just/commit/dd57a476f4bb9d78c6f60741898dc04c71d2eb53'}, {'type': 'PACKAGE', 'url': 'https://github.com/angus-c/just'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25952'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-08T14:23:30Z', 'nvd_published_at': '2021-07-07T12:15:00Z'} |
1.4.0 | GHSA-gv87-q66h-4277 | 2022-01-25T21:02:25Z | 2021-12-16T00:02:15Z | null | ['CVE-2021-43113'] | Command injection in itext7-core | iTextPDF in iText before 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itextpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.13.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43113'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/releases/tag/7.1.17'}, {'type': 'WEB', 'url': 'https://github.com/itext/itextpdf/releases/tag/5.5.13.3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00013.html'}, {'type': 'WEB', 'url': 'https://pastebin.com/BXnkY9YY'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5323'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:02:25Z', 'nvd_published_at': '2021-12-15T07:15:00Z'} |
1.4.0 | GHSA-q4g7-jrxv-67r9 | 2021-11-30T14:35:55Z | 2021-12-02T17:54:25Z | null | ['CVE-2021-27025'] | Silent Configuration Failure in Puppet Agent | A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.25.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27025'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2021-27025.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2021-27025'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:55Z', 'nvd_published_at': '2021-11-18T15:15:00Z'} |
1.4.0 | GHSA-89q5-mj78-pw5w | 2021-11-29T14:53:13Z | 2021-12-02T17:52:26Z | null | ['CVE-2021-23673'] | Cross-site Scripting in pekeupload | This affects all versions of package pekeupload. If an attacker induces a user to upload a file whose name contains javascript code, the javascript code will be executed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'pekeupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23673'}, {'type': 'PACKAGE', 'url': 'https://github.com/moxiecode/plupload'}, {'type': 'WEB', 'url': 'https://github.com/moxiecode/plupload/blob/120cc0b5dd3373d7181fd11b06ac2557c890d3f0/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T14:53:13Z', 'nvd_published_at': '2021-11-22T17:15:00Z'} |