schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-jm6p-wfjg-xm7x | 2021-12-02T15:29:37Z | 2021-12-01T18:26:48Z | null | ['CVE-2021-4026'] | bookstack is vulnerable to Improper Access Control | bookstack is vulnerable to Improper Access Control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4026'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.2'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d'}] | {'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T15:23:39Z', 'nvd_published_at': '2021-11-30T20:15:00Z'} |
1.4.0 | GHSA-vx6j-pjrh-vgjh | 2021-12-15T22:27:31Z | 2021-12-15T22:54:20Z | null | ['CVE-2021-43836'] | PHP file inclusion in the Sulu admin panel | ### Impact
_What kind of vulnerability is it? Who is impacted?_
An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.
* Compromised components: Arbitrary file read on the server, (Potential) Remote code execution
* Exploitation pre-requisite: User account on the backend
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.44'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-RC1'}, {'fixed': '2.4.0'}]}], 'versions': ['2.4.0-RC1']}] | [{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T22:27:31Z', 'nvd_published_at': '2021-12-15T20:15:00Z'} |
1.4.0 | GHSA-xmc8-26q4-qjhx | 2023-03-27T15:11:51Z | 2021-12-09T19:17:21Z | null | ['CVE-2020-28491'] | Denial of Service (DoS) in Jackson Dataformat CBOR | This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 2.8.0-rc1 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0rc1'}, {'fixed': '2.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0rc1'}, {'fixed': '2.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/issues/186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/commit/3d7de83423f8f68f8e9a0c8250084e11818544c7'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:43:00Z', 'nvd_published_at': '2021-02-18T16:15:00Z'} |
1.4.0 | GHSA-6pqm-xvfc-w7p4 | 2021-12-03T15:18:52Z | 2021-12-03T20:42:35Z | null | ['CVE-2021-3993'] | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3993'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:17:10Z', 'nvd_published_at': '2021-12-01T11:15:00Z'} |
1.4.0 | GHSA-2fqw-684c-pvp7 | 2022-01-04T18:59:02Z | 2021-12-17T20:40:50Z | null | ['CVE-2020-35213'] | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node. | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35213'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1i8tVVGE8z9Rtl9UTwktOJpkZwT4kBVLgIk307qMiw_8/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:42:16Z', 'nvd_published_at': '2021-12-16T20:15:00Z'} |
1.4.0 | GHSA-qphc-hf5q-v8fc | 2023-08-08T16:59:42Z | 2021-12-14T21:19:08Z | null | ['CVE-2021-44528'] | actionpack Open Redirect in Host Authorization Middleware | Specially crafted "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this:
```
config.hosts << '.EXAMPLE.com'
```
When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website.
This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942.
Releases
--------
The fixed releases are available at the normal locations.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series
* 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series
* 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T21:12:06Z', 'nvd_published_at': '2022-01-10T14:10:00Z'} |
1.4.0 | GHSA-9jp8-cwwx-p64q | 2021-11-29T20:55:01Z | 2021-12-01T18:28:38Z | null | [] | XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext | The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.25.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.25'}}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-9jp8-cwwx-p64q'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:53:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qc22-qwm9-j8rx | 2021-12-20T16:57:06Z | 2021-12-20T16:59:31Z | null | [] | Remote Code Execution in npm-groovy-lint | Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable. | [] | [{'package': {'ecosystem': 'npm', 'name': 'npm-groovy-lint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/issues/194'}, {'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/pull/195'}, {'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvuillam/npm-groovy-lint'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-20T16:57:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6g8v-hpgw-h2v7 | 2023-09-12T20:56:09Z | 2021-01-20T21:21:50Z | null | ['CVE-2020-28478'] | Prototype pollution in gsap | There is a prototype pollution vulnerability in gsap which affects all versions before 3.6.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'gsap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28478'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js#L150'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js%23L147'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/releases/tag/3.6.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GSAP-1054614'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gsap/v/3.6.0'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T05:34:02Z', 'nvd_published_at': '2021-01-19T11:15:00Z'} |
1.4.0 | GHSA-h3gg-7wx2-cq3h | 2021-01-26T20:41:58Z | 2021-01-29T18:13:41Z | null | ['CVE-2021-21283'] | XSS in Flarum Sticky extension | ### Impact
A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit.
Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed.
Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned.
On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited.
Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted.
### Patches
The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension.
### Workarounds
Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled.
### References
- [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)
- [Pull Request](https://github.com/flarum/sticky/pull/24)
### For more information
If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support).
If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy). | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'flarum/sticky'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0-beta.14'}, {'fixed': '0.1.0-beta.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.0-beta.15'}}] | [{'type': 'WEB', 'url': 'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283'}, {'type': 'WEB', 'url': 'https://github.com/flarum/sticky/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'}, {'type': 'WEB', 'url': 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-26T20:41:58Z', 'nvd_published_at': '2021-01-26T21:15:00Z'} |
1.4.0 | GHSA-3crj-w4f5-gwh4 | 2021-02-16T17:35:25Z | 2021-01-29T20:51:37Z | null | ['CVE-2021-21316'] | Processing untrusted theming resources might execute arbitrary code (ACE) | ### Impact
When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process.
While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development.
Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat:
An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files.
This is an example of inline JavaScript in a Less file:
```less
.rule {
@var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`;
color: @var;
}
```
Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3.
Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it:
```less
.rule {
@var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`";
color: @var;
}
```
### Patches
We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork.
This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0)
### Workarounds
Only process trusted theming resources.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/SAP/less-openui5
* Email us at secure@sap.com | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'less-openui5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316'}, {'type': 'WEB', 'url': 'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'}, {'type': 'WEB', 'url': 'https://github.com/SAP/less-openui5/releases/tag/v0.10.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/less-openui5'}, {'type': 'WEB', 'url': 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T20:50:46Z', 'nvd_published_at': '2021-02-16T18:15:00Z'} |
1.4.0 | GHSA-395w-qhqr-9fr6 | 2021-01-06T20:01:15Z | 2021-01-06T20:01:34Z | null | ['CVE-2020-17519'] | Path Traversal in Apache Flink | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-runtime_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-runtime_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17519'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/01/05/2'}] | {'cwe_ids': ['CWE-22', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T20:01:15Z', 'nvd_published_at': '2021-01-05T12:15:00Z'} |
1.4.0 | GHSA-vhhw-xjvf-wprr | 2022-05-31T21:40:49Z | 2021-01-29T18:13:14Z | null | ['CVE-2021-23326'] | Command Injection in @graphql-tools/git-loader | This affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@graphql-tools/git-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23326'}, {'type': 'WEB', 'url': 'https://github.com/ardatan/graphql-tools/pull/2470'}, {'type': 'WEB', 'url': 'https://github.com/ardatan/graphql-tools/commit/6a966beee8ca8b2f4adfe93318b96e4a5c501eac'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4300'}, {'type': 'WEB', 'url': 'https://github.com/ardatan/graphql-tools/releases/tag/%40graphql-tools%2Fgit-loader%406.2.6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GRAPHQLTOOLSGITLOADER-1062543'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-22T18:52:27Z', 'nvd_published_at': '2021-01-20T13:15:00Z'} |
1.4.0 | GHSA-5w74-jx7m-x6hv | 2023-09-11T13:42:01Z | 2021-01-19T21:16:17Z | null | ['CVE-2018-8071'] | XSS vulnerability in theme config file in Mautic | ### Impact
Mautic before v2.13.0 has stored XSS via a theme config file.
### Patches
Update to 2.13.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-5w74-jx7m-x6hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8071'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/3add236e9cc00ea9b211b52cccc4660379b2ee8b'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.13.0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:15:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2ccx-2gf3-8xvv | 2022-07-20T17:00:39Z | 2021-01-14T19:15:19Z | null | ['CVE-2020-26253'] | Kirby .dev domains and some reverse proxy setups were treated as local | ### Impact
#### About our registration block
In order to protect new installations on public servers that don't have an admin account for the Panel yet, we block account registration there by default. This is a security feature, which we implemented years ago in Kirby 2. It helps to avoid that you forget registering your first admin account on a public server.
In this case – without our security block – someone else might theoretically be able to find your site, find out it's running on Kirby, find the Panel and then register the account first. It's an unlikely situation, but it's still a certain risk.
To be able to register the first Panel account on a public server, you have to enforce the installer via a config setting. This helps to push all users to the best practice of registering your first Panel account on your local machine and upload it together with the rest of the site.
#### The issue
As noted by [Jukka Rautanen](https://github.com/jukra), this installation block implementation in Kirby versions before 3.3.6 still assumed that .dev domains are local domains, which is no longer true. In the meantime, those domains became publicly available. This means that our installation block is no longer working as expected if you use a .dev domain for your Kirby site.
In fixing this issue, we've also found out that the local installation check may also fail if your site is behind a reverse proxy.
#### Am I affected?
You are only affected if:
1. you use a .dev domain or your site is behind a reverse proxy &
2. you have not yet registered your first Panel account on the public server &
3. someone finds your site and tries to login at `yourdomain.dev/panel` before you register your first account.
You are not affected if you have already created one or multiple Panel accounts (no matter if on a .dev domain or behind a reverse proxy).
### Patches
The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.3.6](https://github.com/getkirby/kirby/releases/tag/3.3.6). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability.
**Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.
### Workarounds
Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-2ccx-2gf3-8xvv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26253'}, {'type': 'WEB', 'url': 'https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.3.6'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/getkirby/cms'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/getkirby/panel'}] | {'cwe_ids': ['CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-14T17:55:05Z', 'nvd_published_at': '2020-12-08T02:15:00Z'} |
1.4.0 | GHSA-qjhr-c23f-w76q | 2021-01-19T21:14:13Z | 2021-01-19T21:16:24Z | null | ['CVE-2017-1000488'] | Inline JS XSS vulnerability in Mautic | ### Impact
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form.
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.12.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.12.0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:14:13Z', 'nvd_published_at': '2018-01-03T16:29:00Z'} |
1.4.0 | GHSA-6x98-fx9j-7c78 | 2023-09-11T13:39:35Z | 2021-01-19T21:16:19Z | null | ['CVE-2017-1000489'] | Disabled users able to log in with third party SSO plugin | ### Impact
Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.12.0'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:44Z', 'nvd_published_at': '2018-01-03T17:29:00Z'} |
1.4.0 | GHSA-xcf7-cj8q-pcjm | 2023-09-11T13:41:18Z | 2021-01-19T21:16:14Z | null | ['CVE-2018-11198'] | XSS vulnerability in Author URL of themes in Mautic | ### Impact
An XSS vulnerability was discovered in Mautic 2.13.1 in the Author URL of themes.
### Patches
Update to 2.14 or later
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.14.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.1'}, {'fixed': '2.14.0'}]}], 'versions': ['2.13.1']}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-xcf7-cj8q-pcjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11198'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.14.0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:15:40Z', 'nvd_published_at': '2019-09-06T21:15:00Z'} |
1.4.0 | GHSA-w8fh-pvq2-x8c4 | 2021-01-29T18:10:59Z | 2021-01-29T18:11:20Z | null | [] | Malicious npm package: sonatype | The npm `sonatype` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | [{'package': {'ecosystem': 'npm', 'name': 'sonatype'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1596'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T18:10:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9hx7-rg7w-xm79 | 2021-01-19T21:13:14Z | 2021-01-19T21:16:26Z | null | ['CVE-2018-11200'] | XSS vulnerability in company name field in Mautic | ### Impact
Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code.
### Patches
Update to 2.14.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.11.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-9hx7-rg7w-xm79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11200'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.14.0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2cwj-8chv-9pp9 | 2021-08-25T20:55:11Z | 2021-01-29T19:47:23Z | null | ['CVE-2018-1285'] | XML External Entity attack in log4net | Apache log4net before 2.0.10 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'log4net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1285'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4net'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4NET-575'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220909-0001/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-LOG4NET-568897'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/log4net/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2018-1285'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T19:47:10Z', 'nvd_published_at': '2020-05-11T17:15:00Z'} |
1.4.0 | GHSA-q3wr-qw3g-3p4h | 2022-10-07T20:41:40Z | 2021-01-11T19:06:10Z | null | ['CVE-2020-26298'] | Injection/XSS in Redcarpet | Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. This is fixed in version 3.5.1 by the referenced commit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'redcarpet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26298'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q3wr-qw3g-3p4h'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/redcarpet/CVE-2020-26298.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmg/redcarpet'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFMYDIONVWATY7EB6EARDVXT47AYCRNM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNO4ZZUPGAEUXKQL4G2HRIH7CUZKPCT6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXNNWHHAPREDM3XJDACYRTK7DBMUONBI/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/redcarpet'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4831'}] | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-11T19:05:42Z', 'nvd_published_at': '2021-01-11T19:15:00Z'} |
1.4.0 | GHSA-487w-pqcm-63hq | 2023-09-08T22:44:01Z | 2021-01-13T18:22:13Z | null | ['CVE-2020-7794'] | Command injection in buns | There is a command injection vulnerability in all versions of package buns. The injection point is located in line 678 in index file lib/index.js in the exported function install(requestedModule). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buns'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7794'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BUNS-1050389'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-12T23:52:20Z', 'nvd_published_at': '2021-01-08T13:15:00Z'} |
1.4.0 | GHSA-523c-xh4g-mh5m | 2022-11-17T20:57:31Z | 2021-01-14T19:18:22Z | null | ['CVE-2017-12626'] | Denial of Service in Apache POI | Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks:
- Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294)
- Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12626'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/poi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102879'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-06T18:56:32Z', 'nvd_published_at': '2018-01-29T17:29:00Z'} |
1.4.0 | GHSA-39wj-j3jc-858m | 2021-01-19T20:43:12Z | 2021-01-19T20:43:56Z | null | ['CVE-2020-35124'] | XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic | ### Impact
This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic.
This vulnerability was reported by Naveen Sunkavally at Horizon3.ai.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff
Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Post in https://forum.mautic.org/c/support
* Email us at security@mautic.org | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35124'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'}, {'type': 'WEB', 'url': 'https://forum.mautic.org/c/announcements/16'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/mautic/core'}, {'type': 'WEB', 'url': 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce'}, {'type': 'WEB', 'url': 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T20:43:12Z', 'nvd_published_at': '2021-01-28T06:15:00Z'} |
1.4.0 | GHSA-29v9-2fpx-j5g9 | 2021-01-19T21:13:01Z | 2021-01-19T21:16:29Z | null | ['CVE-2018-8092'] | CSV Injection vulnerability with exported contact lists in Mautic | ### Impact
Mautic versions before 2.13.0 had a vulnerability that allowed a CSV injection with exported contact lists - https://www.owasp.org/index.php/CSV_Injection.
### Patches
Update to 2.13.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-29v9-2fpx-j5g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8092'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/cbc49f0ac4cc7e3acc07f2a85c079b2f85225a6b'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.13.0'}] | {'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p7v4-gm6j-cw9m | 2021-01-29T20:31:59Z | 2021-01-29T20:51:20Z | null | ['CVE-2021-3142'] | XSS in Mautic | ### Impact
This is a cross-site scripting vulnerability relating to creating/editing a company which requires the user to be logged in as an administrator to be executed.
This vulnerability was reported by Dardan Prebreza at Bishop Fox.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff
Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff
### Workarounds
None
### References
https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4
### For more information
If you have any questions or comments about this advisory:
* Post in https://forum.mautic.org/c/support
* Email us at security@mautic.org | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-p7v4-gm6j-cw9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3142'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/3.2.4'}, {'type': 'WEB', 'url': 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T20:31:59Z', 'nvd_published_at': '2021-01-28T06:15:00Z'} |
1.4.0 | GHSA-p4q6-qxjx-8jgp | 2021-01-07T22:28:53Z | 2021-01-05T17:29:40Z | null | ['CVE-2021-21234'] | Directory Traversal in spring-boot-actuator-logview | ### Impact
The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory).
### Patches
The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release.
### Workarounds
There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [github repo](https://github.com/lukashinsch/spring-boot-actuator-logview) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'eu.hinsch:spring-boot-actuator-logview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/lukashinsch/spring-boot-actuator-logview/security/advisories/GHSA-p4q6-qxjx-8jgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21234'}, {'type': 'WEB', 'url': 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6'}, {'type': 'WEB', 'url': 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772'}, {'type': 'WEB', 'url': 'https://search.maven.org/artifact/eu.hinsch/spring-boot-actuator-logview'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-05T17:28:54Z', 'nvd_published_at': '2021-01-05T18:15:00Z'} |
1.4.0 | GHSA-hq37-853p-g5cf | 2021-01-06T19:12:20Z | 2021-01-06T16:57:50Z | null | ['CVE-2021-21236'] | Regular Expression Denial of Service in CairoSVG | # Doyensec Vulnerability Advisory
* Regular Expression Denial of Service (REDoS) in cairosvg
* Affected Product: CairoSVG v2.0.0+
* Vendor: https://github.com/Kozea
* Severity: Medium
* Vulnerability Class: Denial of Service
* Author(s): Ben Caller ([Doyensec](https://doyensec.com))
## Summary
When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS).
If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time.
## Technical description
The vulnerable regular expressions are
https://github.com/Kozea/CairoSVG/blob/9c4a982b9a021280ad90e89707eacc1d114e4ac4/cairosvg/colors.py#L190-L191
The section between 'rgb(' and the final ')' contains multiple overlapping groups.
Since all three infinitely repeating groups accept spaces, a long string of spaces causes catastrophic backtracking when it is not followed by a closing parenthesis.
The complexity is cubic, so doubling the length of the malicious string of spaces makes processing take 8 times as long.
## Reproduction steps
Create a malicious SVG of the form:
<svg width="1" height="1"><rect fill="rgb( ;"/></svg>
with the following code:
'<svg width="1" height="1"><rect fill="rgb(' + (' ' * 3456) + ';"/></svg>'
Note that there is no closing parenthesis before the semi-colon.
Run cairosvg e.g.:
cairosvg cairo-redos.svg -o x.png
and notice that it hangs at 100% CPU. Increasing the number of spaces increases the processing time with cubic complexity.
## Remediation
Fix the regexes to avoid overlapping parts. Perhaps remove the [ \n\r\t]* groups from the regex, and use .strip() on the returned capture group.
## Disclosure timeline
- 2020-12-30: Vulnerability disclosed via email to CourtBouillon | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'CairoSVG'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21236'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/releases/tag/2.5.1'}, {'type': 'WEB', 'url': 'https://pypi.org/project/CairoSVG/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T16:57:38Z', 'nvd_published_at': '2021-01-06T17:15:00Z'} |
1.4.0 | GHSA-hgmg-hhc8-g5wr | 2022-08-11T18:16:15Z | 2021-01-29T21:51:22Z | null | ['CVE-2021-21254'] | CKEditor 5 Markdown plugin Regular expression Denial of Service | ### Impact
A regular expression denial of service (ReDoS) vulnerability has been discovered in the CKEditor 5 Markdown plugin code. The vulnerability allowed to abuse a link recognition regular expression, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 Markdown plugin at version <= 24.0.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 25.0.0.
### Workarounds
The user can work around the issue by:
- Upgrading CKEditor 5 to version 25.0.0.
- Disabling the Markdown plugin.
### More information
If you have any questions or comments about this advisory:
* Email us at [security@cksource.com](mailto:security@cksource.com)
### Acknowledgements
The CKEditor 5 team would like to thank Erik Krogh Kristensen from the GitHub team for recognizing this vulnerability and
Alvaro Muñoz from GitHub for reporting it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-markdown-gfm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '25.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 24.0.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21254'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor5'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T21:50:43Z', 'nvd_published_at': '2021-01-29T22:15:00Z'} |
1.4.0 | GHSA-7jh9-6cpf-h4m7 | 2023-09-12T18:13:25Z | 2021-01-13T19:07:01Z | null | ['CVE-2020-7741'] | XSS in hello.js | This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as `javascript:alert(1)`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hellojs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-13T19:06:37Z', 'nvd_published_at': '2020-10-06T15:15:00Z'} |
1.4.0 | GHSA-hhw9-35p2-q2c5 | 2021-01-29T20:39:56Z | 2021-01-29T20:51:30Z | null | [] | Steam Socialite Provider v1 does not correctly validate openid server | ### Impact
The outdated version 1 of the Steam Socialite Provider doesn't check properly if the login comes from `steamcommunity.com`, allowing a malicious actor to substitute their own openID server.
### Patches
This vulnerability only affects the outdated v1.x versions of the package. These are no longer maintained, users should upgrade to v3 or v4, which use a hardcoded endpoint to verify the login.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [SocialiteProviders/Providers](https://github.com/SocialiteProviders/Providers)
* Email us at [socialite@atymic.dev](mailto:socialite@atymic.dev) | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'socialiteproviders/steam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/SocialiteProviders/Steam/security/advisories/GHSA-hhw9-35p2-q2c5'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/socialiteproviders/steam'}] | {'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T20:39:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-43hg-g44q-474q | 2021-01-22T18:46:09Z | 2021-01-29T18:13:03Z | null | ['CVE-2021-3137'] | Cross Site Scripting (XSS) in XWiki | XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3137'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49437'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-22T18:46:09Z', 'nvd_published_at': '2021-01-20T04:15:00Z'} |
1.4.0 | GHSA-ww4j-c2rq-47q8 | 2023-09-08T20:18:49Z | 2021-01-13T18:22:28Z | null | ['CVE-2020-7784'] | Command injection in ts-process-promises | This affects all versions of package ts-process-promises. The injection point is located in line 45 in main entry of package in lib/process-promises.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ts-process-promises'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.2']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7784'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-12T23:54:52Z', 'nvd_published_at': '2021-01-08T13:15:00Z'} |
1.4.0 | GHSA-5949-rw7g-wx7w | 2023-09-14T16:14:09Z | 2021-01-20T21:20:15Z | null | ['CVE-2021-20190'] | Deserialization of untrusted data in jackson-databind | A flaw was found in jackson-databind before 2.9.10.7 and 2.6.7.5. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2854'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1916633'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T04:44:51Z', 'nvd_published_at': '2021-01-19T17:15:00Z'} |
1.4.0 | GHSA-jxwx-85vp-gvwm | 2023-08-31T18:34:36Z | 2021-01-13T18:21:54Z | null | ['CVE-2021-21252'] | Regular Expression Denial of Service in jquery-validation | The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.
The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)
This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-validation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.Validation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21252'}, {'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/pull/2371'}, {'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery-validation/jquery-validation'}, {'type': 'WEB', 'url': 'https://jqueryvalidation.org/#installation-via-package-managers'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0005/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-294-redos-jquery-validation/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jquery-validation'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/jquery.validation'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-13T18:21:42Z', 'nvd_published_at': '2021-01-13T19:15:00Z'} |
1.4.0 | GHSA-hh7m-rx4f-4vpv | 2021-01-11T20:32:44Z | 2021-01-11T20:38:28Z | null | ['CVE-2021-21241'] | CSRF can expose users authentication token | ### Issue
The /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token.
### Patches
Version 3.4.5 and soon to be released 4.0.0 are patched.
### Workarounds
If you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to "0" (seconds) which should make the token unusable.
### References
None | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.4.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-hh7m-rx4f-4vpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21241'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/pull/422'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/releases/tag/3.4.5'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Flask-Security-Too'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-11T20:32:44Z', 'nvd_published_at': '2021-01-11T21:15:00Z'} |
1.4.0 | GHSA-qv2g-99x4-45x6 | 2021-01-29T18:11:36Z | 2021-01-29T18:12:07Z | null | [] | Malicious npm package: discord-fix | The npm `discord-fix` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | [{'package': {'ecosystem': 'npm', 'name': 'discord-fix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1597'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T18:11:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5p3x-r448-pc62 | 2022-08-22T19:39:40Z | 2021-01-21T14:12:18Z | null | ['CVE-2021-21239'] | Improper Verification of Cryptographic Signature in PySAML2 | ### Impact
All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not ensure that a signed SAML document is correctly signed. The default `CryptoBackendXmlSec1` backend is using the `xmlsec1` binary to verify the signature of signed SAML documents, but by default, `xmlsec1` accepts any type of key found within the given document. `xmlsec1` needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature.
### Patches
Users should upgrade to pysaml2 `v6.5.0`.
### Workarounds
No workaround provided at this point.
### References
This issue has been reported in the past at the xmlsec1 mailing list:
https://www.aleksey.com/pipermail/xmlsec/2013/009717.html
### Credits
- Brian Wolff
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2)
* Email us at [the incident-response address](mailto:incident-response@idpy.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21239'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99'}, {'type': 'PACKAGE', 'url': 'https://github.com/IdentityPython/pysaml2'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html'}, {'type': 'WEB', 'url': 'https://pypi.org/project/pysaml2'}, {'type': 'WEB', 'url': 'https://www.aleksey.com/pipermail/xmlsec/2013/009717.html'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-21T14:11:58Z', 'nvd_published_at': '2021-01-21T15:15:00Z'} |
1.4.0 | GHSA-wjx2-7hqq-8h7m | 2023-07-03T21:56:16Z | 2021-01-14T19:17:16Z | null | ['CVE-2020-36190'] | rails_admin ruby gem XSS vulnerability | RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190'}, {'type': 'WEB', 'url': 'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'}, {'type': 'PACKAGE', 'url': 'https://github.com/railsadminteam/rails_admin/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml'}, {'type': 'WEB', 'url': 'https://github.com/sferik/rails_admin/blob/master/README.md'}, {'type': 'WEB', 'url': 'https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-14T19:15:02Z', 'nvd_published_at': '2021-01-12T20:15:00Z'} |
1.4.0 | GHSA-4w2v-q235-vp99 | 2022-09-14T20:36:52Z | 2021-01-04T20:59:40Z | null | ['CVE-2020-28168'] | Axios vulnerable to Server-Side Request Forgery | Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'axios'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28168'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/issues/3369'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AXIOS-1038255'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1594'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/axios'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-04T20:57:20Z', 'nvd_published_at': '2020-11-06T20:15:00Z'} |
1.4.0 | GHSA-fxwf-4rqh-v8g3 | 2023-09-11T22:46:42Z | 2021-01-20T21:22:37Z | null | ['CVE-2020-28481'] | CORS misconfiguration in socket.io | The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'socket.io'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28481'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/issues/3671'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/commit/f78a575f66ab693c3ea96ea88429ddb1a44c86c7'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859'}] | {'cwe_ids': ['CWE-346', 'CWE-453'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T05:39:24Z', 'nvd_published_at': '2021-01-19T15:15:00Z'} |
1.4.0 | GHSA-hvf8-h2qh-37m9 | 2021-01-28T19:11:05Z | 2021-01-28T19:11:34Z | null | ['CVE-2020-26272'] | IPC messages delivered to the wrong frame in Electron | ### Impact
IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame.
If your app does ANY of the following, then it is impacted by this issue:
- Uses `remote`
- Calls `webContents.sendToFrame`
- Calls `event.reply` in an IPC message handler
### Patches
This has been fixed in the following versions:
- 9.4.0
- 10.2.0
- 11.1.0
- 12.0.0-beta.9
### Workarounds
There are no workarounds for this issue.
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26272'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/26875'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/releases/tag/v9.4.0'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?version=9#9.4.0'}] | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-28T19:11:05Z', 'nvd_published_at': '2021-01-28T19:15:00Z'} |
1.4.0 | GHSA-8j9v-h2vp-2hhv | 2021-01-07T22:32:04Z | 2021-01-04T18:22:11Z | null | ['CVE-2020-26293'] | XSS in HtmlSanitizer | ### Impact
If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag.
### Patches
The problem has been fixed in version 5.0.372.
### Workarounds
Remove the `<style>` tag from the set of allowed tags.
### For more information
If you have any questions or comments about this advisory open an issue in https://github.com/mganss/HtmlSanitizer
### Credits
This issue was discovered by Michal Bentkowski of Securitum. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'HtmlSanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.372'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293'}, {'type': 'WEB', 'url': 'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'}, {'type': 'WEB', 'url': 'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/HtmlSanitizer/'}] | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-04T18:21:52Z', 'nvd_published_at': '2021-01-04T19:15:00Z'} |
1.4.0 | GHSA-w7jx-j77m-wp65 | 2021-01-06T19:27:46Z | 2021-01-06T19:27:54Z | null | [] | Cross-site scripting vulnerability in TinyMCE | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs. This impacts all users who are using TinyMCE 5.5.1 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.6.0 by improved URL sanitization logic.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.6.0 or higher
- Manually sanitize `iframe`, `object` and `embed` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter).
- Disable `iframe`, `object`, and `embed` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting.
#### Example: Sanitizing using a node filter
```js
editor.parser.addNodeFilter('iframe,object,embed', function(nodes) {
nodes.forEach(function(node) {
if (node.attributes) {
node.attributes.forEach(function(attr) {
var name = attr.name;
var value = attr.value;
// Sanitize the attribute value here or remove it entirely
var sanitizedValue = ...;
node.attr(name, santizedValue);
});
}
});
});
```
#### Example: Using invalid_elements
```js
invalid_elements: 'iframe,object,embed'
```
### Acknowledgements
Tiny Technologies would like to thank Aaron Bishop at SecurityMetrics for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) | [] | [{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-w7jx-j77m-wp65'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T19:27:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vfxj-qg93-7wwc | 2023-09-11T15:06:08Z | 2021-01-19T21:16:21Z | null | ['CVE-2018-10189'] | Mautic Sessions could be hijacked due to tracking contacts by an auto-incremented ID | ### Impact
An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled.
### Patches
Update to 2.13.0 or later
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-vfxj-qg93-7wwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10189'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.13.0'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xcv-wvr7-4h6p | 2021-01-29T18:11:48Z | 2021-01-29T18:12:19Z | null | [] | Malicious npm package: an0n-chat-lib | The npm `an0n-chat-lib` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | [{'package': {'ecosystem': 'npm', 'name': 'an0n-chat-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1598'}] | {'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T18:11:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-49wp-qq6x-g2rf | 2022-06-29T21:54:32Z | 2021-01-20T21:30:34Z | null | ['CVE-2020-28482'] | Cross-site Request Forgery in fastify-csrf | The package fastify-csrf before 3.0.0 has a set of issues that affect its ability to do CSRF protection.
1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: `cookieOpts: { path: '/', sameSite: true }`
2. The CSRF token was available in the GET query parameter | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastify-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28482'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-csrf/pull/26'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-csrf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/fastify-csrf'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T19:49:01Z', 'nvd_published_at': '2021-01-19T15:15:00Z'} |
1.4.0 | GHSA-pgww-xf46-h92r | 2023-09-05T14:36:43Z | 2021-01-07T21:54:01Z | null | ['CVE-2020-27783'] | lxml vulnerable to Cross-site Scripting | A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27783'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4286'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1901633'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/lxml/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210521-0003/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4810'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'PACKAGE', 'url': ' https://github.com/lxml/lxml'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-07T21:53:43Z', 'nvd_published_at': '2020-12-03T17:15:00Z'} |
1.4.0 | GHSA-5v44-7647-xfw9 | 2022-01-07T16:07:46Z | 2021-01-20T21:33:53Z | null | ['CVE-2020-26248'] | Blind SQL injection in PrestaShop productcomments module | ### Impact
An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service.
### Patches
The problem is fixed in 4.2.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/productcomments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-5v44-7647-xfw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26248'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/productcomments'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/releases/tag/v4.2.1'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/productcomments'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html'}] | {'cwe_ids': ['CWE-89'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T21:33:26Z', 'nvd_published_at': '2020-12-03T21:15:00Z'} |
1.4.0 | GHSA-cghx-9gcr-r42x | 2022-10-07T20:36:09Z | 2021-01-29T18:12:54Z | null | ['CVE-2020-8570'] | Path Traversal in the Java Kubernetes Client | Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.kubernetes:client-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.kubernetes:client-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.1'}]}], 'versions': ['10.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/issues/1491'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/pull/1450'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes-client/java'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-22T18:25:27Z', 'nvd_published_at': '2021-01-21T17:15:00Z'} |
1.4.0 | GHSA-6c3f-p5wp-34mh | 2022-05-03T02:56:05Z | 2021-01-29T18:14:00Z | null | ['CVE-2021-3190'] | OS Command Injection in async-git | The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'async-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3190'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/13'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/14'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4772'}, {'type': 'PACKAGE', 'url': 'https://github.com/omrilotan/async-git'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/async-git'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-27T23:33:04Z', 'nvd_published_at': '2021-01-26T18:16:00Z'} |
1.4.0 | GHSA-qwp9-52h8-xgg8 | 2021-01-20T05:24:47Z | 2021-01-20T21:21:16Z | null | ['CVE-2020-28480'] | Prototype pollution in JointJS | The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28480'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/pull/1406'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T05:24:47Z', 'nvd_published_at': '2021-01-19T15:15:00Z'} |
1.4.0 | GHSA-v5rv-hpxg-8x49 | 2021-01-13T19:12:58Z | 2021-01-13T19:13:11Z | null | ['CVE-2020-28042'] | Signature validation bypass in ServiceStack | ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'ServiceStack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042'}, {'type': 'WEB', 'url': 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'}, {'type': 'WEB', 'url': 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/ServiceStack/'}, {'type': 'WEB', 'url': 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/'}, {'type': 'WEB', 'url': 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-13T19:12:58Z', 'nvd_published_at': '2020-11-02T21:15:00Z'} |
1.4.0 | GHSA-qpgw-2c72-4c89 | 2023-09-11T13:40:01Z | 2021-01-19T20:50:38Z | null | ['CVE-2017-1000490'] | Mautic users able to download any files from server using filemanager | ### Impact
Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to.
### Patches
Update to 2.12.0 or later.
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-qpgw-2c72-4c89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000490'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.12.0'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T20:50:28Z', 'nvd_published_at': '2018-01-03T17:29:00Z'} |
1.4.0 | GHSA-f4g9-h89h-jgv9 | 2021-02-01T14:20:48Z | 2021-01-21T14:12:16Z | null | ['CVE-2021-21238'] | SAML XML Signature wrapping in PySAML2 | ### Impact
All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not validate the SAML document against an XML schema. This allows invalid XML documents to trick the verification process, by presenting elements with a valid signature inside elements whose content has been malformed. The verification is offloaded to `xmlsec1` and `xmlsec1` will not validate every signature in the given document, but only the first it finds in the given scope.
### Patches
Users should upgrade to pysaml2 `v6.5.0`.
### Workarounds
No workaround provided at this point.
### References
No references provided at this point.
### Credits
- Victor Schönfelder Garcia (isits AG International School of IT Security)
- Juraj Somorovsky (Paderborn University)
- Vladislav Mladenov (Ruhr University Bochum)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2)
* Email us at [the incident-response address](mailto:incident-response@idpy.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-f4g9-h89h-jgv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21238'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/pysaml2'}] | {'cwe_ids': ['CWE-347'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-21T14:11:38Z', 'nvd_published_at': '2021-01-21T15:15:00Z'} |
1.4.0 | GHSA-3p32-j457-pg5x | 2021-03-29T17:41:17Z | 2021-01-19T19:36:51Z | null | ['CVE-2021-21263'] | Query Binding Exploitation | ### Description
Laravel versions <6.20.12, <7.30.3 & <8.22.1 contain a query binding exploitation.
If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results.
This vulnerability was discovered by Tim Groenevelt (tim.g@foodbyus.com).
### References
- https://github.com/laravel/framework/pull/35865 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.22.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.22.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-3p32-j457-pg5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21263'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/35865'}, {'type': 'WEB', 'url': 'https://blog.laravel.com/security-laravel-62011-7302-8221-released'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framework'}] | {'cwe_ids': ['CWE-74', 'CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T19:36:31Z', 'nvd_published_at': '2021-01-19T20:15:00Z'} |
1.4.0 | GHSA-2hw7-mxvj-m455 | 2021-01-27T23:26:39Z | 2021-01-29T18:13:52Z | null | ['CVE-2021-3223'] | Path traversal in Node-RED-Dashboard | In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files. | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-red-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/issues/669'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/node-red-dashboard'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-27T23:26:39Z', 'nvd_published_at': '2021-01-26T18:16:00Z'} |
1.4.0 | GHSA-h96f-fc7c-9r55 | 2021-01-06T19:25:24Z | 2021-01-06T19:25:46Z | null | [] | Regex denial of service vulnerability in codesample plugin | ### Impact
A regex denial of service (ReDoS) vulnerability was discovered in a dependency of the `codesample` plugin. The vulnerability allowed poorly formed ruby code samples to lock up the browser while performing syntax highlighting. This impacts users of the `codesample` plugin using TinyMCE 5.5.1 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.6.0 by upgrading to a version of the dependency without the vulnerability.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.6.0 or higher
- Disable the `codesample` plugin
- Disable ruby code samples using the [codesample_languages](https://www.tiny.cloud/docs/plugins/opensource/codesample/#exampleusingcodesample_languages) setting
- Override the PrismJS syntax highlighter to version 1.21.0 or higher using the [codesample_global_prismjs](https://www.tiny.cloud/docs/plugins/opensource/codesample/#codesample_global_prismjs) setting
### Acknowledgements
Tiny Technologies would like to thank Erik Krogh Kristensen at GitHub for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](http://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) | [] | [{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-h96f-fc7c-9r55'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes'}] | {'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T19:25:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9qmh-276g-x5pj | 2023-09-11T22:48:36Z | 2021-01-20T21:27:56Z | null | ['CVE-2020-28477'] | Prototype Pollution in immer | ## Overview
Affected versions of immer are vulnerable to Prototype Pollution.
## Proof of exploit
```js
const {applyPatches, enablePatches} = require("immer");
enablePatches();
let obj = {};
console.log("Before : " + obj.polluted);
applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]);
// applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]);
console.log("After : " + obj.polluted);
```
## Remediation
Version 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'immer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28477'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/issues/738'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMER-1019369'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/immer'}] | {'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T19:37:58Z', 'nvd_published_at': '2021-01-19T11:15:00Z'} |
1.4.0 | GHSA-32wx-4gxx-h48f | 2021-01-26T03:45:41Z | 2021-01-29T18:13:32Z | null | [] | Users can edit the tags of any discussion | This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020.
### Impact
This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API.
Users were able to remove any existing tag, and add any tag in which they are allowed to create discussions. The chosen tags still had to match the configured Tags minimums and maximums.
By moving the discussion to new tags, users were able to go around permissions applied to restricted tags. Depending on the setup, this can include publicly exposing content that was only visible to certain groups, or gain the ability to interact with content where such interaction was limited.
The full impact varies depending on the configuration of permissions and restricted tags, and which community extensions are being used. All tag-scoped permissions offered by extensions are impacted by this ability to go around them.
Forums that don't use restricted tags and don't use any extension that relies on tags for access control should not see any security impact. An update is still required to stop users from being able to change any discussion's tags.
Forums that don't use the Tags extension are unaffected.
### Patches
The fix will be available in version v0.1.0-beta.14 with Flarum beta 14. The fix has already been back-ported to Flarum beta 13 as version v0.1.0-beta.13.2 of the Tags extension.
### Workarounds
Version v0.1.0-beta.13.2 of the Tags extension allows existing Flarum beta 13 forums to fix the issue without the need to update to beta 14.
Forums that have not yet updated to Flarum beta 13 are encouraged to update as soon as possible.
### References
- [Release announcement](https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132)
- [GitHub issue](https://github.com/flarum/core/issues/2355)
### For more information
If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support).
If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy). | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'flarum/tags'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0-beta.13.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.0-beta.13'}}] | [{'type': 'WEB', 'url': 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f'}, {'type': 'WEB', 'url': 'https://github.com/flarum/core/issues/2355'}, {'type': 'WEB', 'url': 'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'}, {'type': 'WEB', 'url': 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/flarum/tags'}] | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-26T03:45:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fvx8-v524-8579 | 2023-08-30T21:23:58Z | 2021-06-04T21:46:52Z | null | ['CVE-2020-17495'] | django-celery-results Stores Sensitive Information In Cleartext | django-celery-results prior to 2.4.0 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
In version 2.4.0 this is no longer the default behaviour but can be re-enabled with the `result_extended` flag in which case care should be taken to ensure any sensitive variables are scrubbed - see [here](https://github.com/celery/django-celery-results/issues/154#issuecomment-734706270) for an example. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-celery-results'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17495'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/issues/142'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/issues/154'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/pull/316'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/pull/316/commits/f4af2810dd2f70718a757f733b43225527f6aa3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/celery/django-celery-results'}] | {'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:40:19Z', 'nvd_published_at': '2020-08-11T21:15:00Z'} |
1.4.0 | GHSA-9699-gm7f-cmjv | 2021-06-04T18:57:52Z | 2021-06-08T22:29:46Z | null | ['CVE-2020-25724'] | Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy | A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0-beta-2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0-beta-1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25724'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2020-25724'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1899354'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210702-0003/'}] | {'cwe_ids': ['CWE-567'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:34:48Z', 'nvd_published_at': '2021-05-26T21:15:00Z'} |
1.4.0 | GHSA-8fxc-qm65-vpxg | 2021-06-03T21:08:32Z | 2021-06-08T19:23:22Z | null | ['CVE-2017-8761'] | Temporary urls leaked via logging | In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8761'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/swift/+bug/1685798/comments/18'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1685798'}] | {'cwe_ids': ['CWE-117', 'CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:08:32Z', 'nvd_published_at': '2021-06-02T14:15:00Z'} |
1.4.0 | GHSA-wqvq-5m8c-6g24 | 2023-09-05T18:05:33Z | 2021-06-18T18:46:43Z | null | ['CVE-2020-26137'] | CRLF injection in urllib3 | urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of `putrequest()`. NOTE: this is similar to CVE-2020-26116. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26137'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/pull/1800'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue39603'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4570-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T22:13:47Z', 'nvd_published_at': '2020-09-30T18:15:00Z'} |
1.4.0 | GHSA-2x7v-w2mv-f3rx | 2021-05-19T19:44:33Z | 2021-06-16T17:23:12Z | null | ['CVE-2021-26077'] | Improper Authentication in Atlassian Connect Spring Boot | Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.atlassian.connect:atlassian-connect-spring-boot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.atlassian.connect:atlassian-connect-spring-boot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.4'}, {'fixed': '2.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26077'}, {'type': 'WEB', 'url': 'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072'}, {'type': 'WEB', 'url': 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:44:33Z', 'nvd_published_at': '2021-05-10T00:15:00Z'} |
1.4.0 | GHSA-hpr6-f4vq-mxch | 2022-07-26T20:09:36Z | 2021-06-18T18:38:00Z | null | ['CVE-2021-32090'] | Command injection in LocalStack | The dashboard component of StackLift LocalStack allows attackers to inject arbitrary shell commands via the functionName parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'localstack'}, 'ecosystem_specific': {'affected_functions': ['localstack.dashboard.infra.get_lambda_code', 'localstack.utils.bootstrap.run']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32090'}, {'type': 'WEB', 'url': 'https://github.com/localstack/localstack/commit/01cd169ae5d077693d4c1a4679a95e30b8d44d54'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/hack-the-stack-with-localstack'}, {'type': 'PACKAGE', 'url': 'https://github.com/localstack/localstack'}, {'type': 'WEB', 'url': 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:58:03Z', 'nvd_published_at': '2021-05-07T05:15:00Z'} |
1.4.0 | GHSA-qm58-cvvm-c5qr | 2022-08-11T00:02:52Z | 2021-06-15T15:51:02Z | null | ['CVE-2021-23394'] | elFinder unsafe upload filtering leading to remote code execution | ### Impact
Before elFinder 2.1.58, the upload filter did not disallow the upload of `.phar` files. As several Linux distributions are now shipping Apache configured in a way it will process these files as PHP scripts, attackers could gain arbitrary code execution on the server hosting the PHP connector (even in minimal configuration).
### Patches
The issue has been addressed with https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1, associating `.phar` files to the right MIME type. Unless explicitly allowed in the configuration, such files cannot be uploaded anymore. This patch is part of the last release of elFinder, 2.1.58.
### Workarounds
If you can't update to 2.1.58, make sure your connector is not exposed without authentication.
### Important tips
Server-side scripts can often be created as text files. Currently, elFinder has an appropriate MIME type set for file extensions that are generally runnable on a web server.
However, the server has various settings. In some cases, the executable file may be judged as "text/plain". Therefore, elFinder installers should understand the extensions that can be executed on the web server where elFinder is installed, and check if there are any missing items in the elFinder settings.
The elFinder PHP connector has an option "additionalMimeMap" that specifies the MIME type for each extension. See [#3295(comment)](https://github.com/Studio-42/elFinder/issues/3295#issuecomment-853042139) for more information.
### References
- https://snyk.io/vuln/composer:studio-42%2Felfinder
- https://github.com/Studio-42/elFinder/issues/3295
- Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time.
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to support [at] snyk.io or vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.58'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23394'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/issues/3295'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Studio-42/elFinder'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T22:14:26Z', 'nvd_published_at': '2021-06-13T11:15:00Z'} |
1.4.0 | GHSA-33rv-m2gp-mm2r | 2021-05-20T21:34:56Z | 2021-06-21T17:18:29Z | null | ['CVE-2021-25927'] | Prototype pollution in safe-flat | Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'safe-flat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927'}, {'type': 'WEB', 'url': 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:34:56Z', 'nvd_published_at': '2021-04-26T11:15:00Z'} |
1.4.0 | GHSA-rmrm-75hp-phr2 | 2021-05-11T17:51:21Z | 2021-06-04T21:36:34Z | null | ['CVE-2020-10693'] | Improper Input Validation in Hibernate Validator | A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hibernate.validator:hibernate-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0.Final'}, {'fixed': '6.1.5.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.hibernate.validator:hibernate-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.19.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10693'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.ibm.com/support/pages/node/6348216'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:51:21Z', 'nvd_published_at': '2020-05-06T14:15:00Z'} |
1.4.0 | GHSA-xfrw-hxr5-ghqf | 2021-06-18T20:32:37Z | 2021-06-17T20:10:42Z | null | ['CVE-2021-32681'] | Cross-site Scripting in wagtail | ### Impact
When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin).
### Patches
Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch).
Site implementors who wish to retain the existing behaviour of allowing editors to insert HTML content in these blocks (and are willing to accept the risk of untrusted editors inserting arbitrary code) may disable the escaping by surrounding the relevant `{% include_block %}` tag in `{% autoescape off %}...{% endautoescape %}`.
### Workarounds
Site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`.
### Acknowledgements
Many thanks to Karen Tracey for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12'}, {'fixed': '2.12.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13'}, {'fixed': '2.13.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xfrw-hxr5-ghqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32681'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.11.8'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.12.5'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.13.2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:56:56Z', 'nvd_published_at': '2021-06-17T17:15:00Z'} |
1.4.0 | GHSA-qxg5-2qff-p49r | 2021-06-18T19:31:21Z | 2021-06-18T19:31:35Z | null | ['CVE-2021-32696'] | Passing in a non-string 'html' argument can lead to unsanitized output | A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function.
### Impact
XSS
### Patches
`3.2.0`
### Workarounds
Ensure that the `html` parameter is a string before calling the function.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'striptags'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696'}, {'type': 'WEB', 'url': 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'}, {'type': 'WEB', 'url': 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/striptags'}] | {'cwe_ids': ['CWE-241', 'CWE-79', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T19:31:21Z', 'nvd_published_at': '2021-06-18T20:15:00Z'} |
1.4.0 | GHSA-gg96-f8wr-p89f | 2021-06-04T19:22:48Z | 2021-06-04T19:09:26Z | null | ['CVE-2021-32661'] | Script injection | ### Impact
A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page.
The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store.
### Patches
The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-techdocs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32661'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03'}] | {'cwe_ids': ['CWE-434', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:02:21Z', 'nvd_published_at': '2021-06-03T18:15:00Z'} |
1.4.0 | GHSA-8vfw-v2jv-9hwc | 2021-06-24T19:39:30Z | 2021-06-28T16:52:45Z | null | [] | Reflected cross-site scripting in development mode handler in Vaadin | URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.
- https://vaadin.com/security/cve-2021-33604 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '6.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.9'}}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-8vfw-v2jv-9hwc'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33604'}] | {'cwe_ids': ['CWE-172'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:39:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gff3-739c-gxfq | 2021-06-09T20:39:24Z | 2021-06-10T17:22:59Z | null | ['CVE-2021-32670'] | Reflected cross-site scripting issue in Datasette | Datasette is an open source multi-tool for exploring and publishing data. The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. Datasette 0.57 and 0.56.1 both include patches for this issue. If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'datasette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.56.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32670'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette/issues/1360'}, {'type': 'WEB', 'url': 'https://datasette.io/plugins/datasette-auth-passwords'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks'}, {'type': 'WEB', 'url': 'https://pypi.org/project/datasette/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T20:39:24Z', 'nvd_published_at': '2021-06-07T22:15:00Z'} |
1.4.0 | GHSA-ww39-953v-wcq6 | 2022-08-02T21:17:45Z | 2021-06-07T21:56:34Z | null | ['CVE-2020-28469'] | glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex | This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'glob-parent'}, 'ecosystem_specific': {'affected_functions': ['globParent']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28469'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/pull/36/commits/c6db86422a9731d4f3d332ce4a81c27ea6b0ee46'}, {'type': 'PACKAGE', 'url': 'https://github.com/gulpjs/glob-parent'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:30:45Z', 'nvd_published_at': '2021-06-03T16:15:00Z'} |
1.4.0 | GHSA-7grw-6pjh-jpc9 | 2022-02-08T21:22:18Z | 2021-06-15T15:54:29Z | null | ['CVE-2021-31812'] | Infinite Loop in Apache PDFBox | In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31812'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e%40%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf251f6c358087107f8c23473468b279d59d50a75db6b4768165c78d3@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/12/1'}] | {'cwe_ids': ['CWE-834', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:41:33Z', 'nvd_published_at': '2021-06-12T10:15:00Z'} |
1.4.0 | GHSA-gwcr-j4wh-j3cq | 2022-02-08T21:23:08Z | 2021-06-10T15:43:22Z | null | ['CVE-2021-28169'] | Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability | Requests to the `ConcatServlet` and `WelcomeFilter` are able to access protected resources within the `WEB-INF` directory. For example a request to the `ConcatServlet` with a URI of `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
This occurs because both `ConcatServlet` and `WelcomeFilter` decode the supplied path to verify it is not within the `WEB-INF` or `META-INF` directories. It then uses this decoded path to call `RequestDispatcher` which will also do decoding of the path. This double decoding allows paths with a doubly encoded `WEB-INF` to bypass this security check.
### Impact
This affects all versions of `ConcatServlet` and `WelcomeFilter` in versions before 9.4.41, 10.0.3 and 11.0.3.
### Workarounds
If you cannot update to the latest version of Jetty, you can instead deploy your own version of the [`ConcatServlet`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/ConcatServlet.java) and/or the [`WelcomeFilter`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/WelcomeFilter.java) by using the code from the latest version of Jetty.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-servlets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.41'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.40'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-servlets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-servlets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28169'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04a4b4553a23aff26f42635a6ae388c3b162aab30a88d12e59d05168@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r234f6452297065636356f43654cdacef565b8f9ceb0e0c07ffb8c73b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r284de9c5399486dfff12ab9e7323ca720dd7019a9a3e11c8510a7140@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r29678972c3f8164b151fd7a5802785d402e530c09870a82ffc7681a4@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91e34ff61aff8fd25a3f2a21539597c6ef7589a31c199b0a9546477c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1292d30462b9baedea7c5d9594fc75990d9aa0ec223b48054ca9c25@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5b52362f5edf98e0dcab6541a381f571cccc05ad9188e793af688f3@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00017.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0009/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T20:02:50Z', 'nvd_published_at': '2021-06-09T02:15:00Z'} |
1.4.0 | GHSA-2h3j-m7gr-25xj | 2021-10-21T17:32:03Z | 2021-06-16T17:56:46Z | null | ['CVE-2021-27807'] | Excessive Iteration Denial of Service in Apache PDFBox | A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27807'}, {'type': 'WEB', 'url': 'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pdfbox'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PDFBOX-4892'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1886911'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/19/9'}] | {'cwe_ids': ['CWE-834'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T18:45:15Z', 'nvd_published_at': '2021-03-19T16:15:00Z'} |
1.4.0 | GHSA-243q-g9j3-qf6r | 2021-06-24T19:31:03Z | 2021-06-28T18:21:01Z | null | [] | non-admin users can create integration role with administrator role | ### Impact
non-admin users can create integration role with administrator role
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-243q-g9j3-qf6r'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:31:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8ch4-58qp-g3mp | 2022-04-22T15:47:43Z | 2021-06-11T17:43:14Z | null | ['CVE-2021-33880'] | Observable Timing Discrepancy in aaugustin websockets library | The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepancy on servers when HTTP Basic Authentication is enabled with basic_auth_protocol_factory(credentials=...). An attacker may be able to guess a password via a timing attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'websockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33880'}, {'type': 'WEB', 'url': 'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0'}, {'type': 'PACKAGE', 'url': 'https://github.com/aaugustin/websockets/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T16:24:45Z', 'nvd_published_at': '2021-06-06T15:15:00Z'} |
1.4.0 | GHSA-g5j6-r3x9-gf2m | 2021-05-14T21:45:06Z | 2021-06-18T18:32:20Z | null | ['CVE-2020-13258'] | Cross-site scripting in Contentful | Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'contentful'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13258'}, {'type': 'WEB', 'url': 'https://github.com/contentful/the-example-app.py/issues/44'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T21:45:06Z', 'nvd_published_at': '2020-05-21T17:15:00Z'} |
1.4.0 | GHSA-5h26-c766-g93v | 2021-08-31T21:05:24Z | 2021-06-15T15:59:27Z | null | ['CVE-2021-20293'] | Cross-Site Scripting | A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.0.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.0.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20293'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1942819'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0005/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:27:56Z', 'nvd_published_at': '2021-06-10T12:15:00Z'} |
1.4.0 | GHSA-5qjq-69w6-fg57 | 2021-06-07T21:05:48Z | 2021-06-07T21:48:17Z | null | ['CVE-2021-32671'] | XSS vulnerability with translator | Flarum's translation system allowed for string inputs to be converted into HTML DOM nodes when rendered. This change was made after v0.1.0-beta.16 (our last beta before v1.0.0) and was not noticed or documented.
This allowed for any user to type malicious HTML markup within certain user input fields and have this execute on client browsers. The example which led to the discovery of this vulnerability was in the forum search box. Entering faux-malicious HTML markup, such as <script>alert('test')</script> resulted in an alert box appearing on the forum. This attack could also be modified to perform AJAX requests on behalf of a user, possibly deleting discussions, modifying their settings or profile, or even modifying settings on the Admin panel if the attack was targetted towards a privileged user.
### Impact
All Flarum communities that run flarum v1.0.0 or v1.0.1 are impacted.
### Patches
The vulnerability has been fixed and published as flarum/core v1.0.2. All communities running Flarum v1.0 have to upgrade as soon as possible to v1.0.2 using:
```
composer update --prefer-dist --no-dev -a -W
```
You can then confirm you run the latest version using:
```
composer show flarum/core
```
### Workarounds
__None.__
### For more information
For any questions or comments on this vulnerability please visit https://discuss.flarum.org/d/27558.
For support questions create a discussion at https://discuss.flarum.org/t/support.
A reminder that if you ever become aware of a security issue in Flarum, please report it to us privately by emailing security@flarum.org, and we will address it promptly.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/flarum/core/security/advisories/GHSA-5qjq-69w6-fg57'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32671'}, {'type': 'WEB', 'url': 'https://github.com/flarum/core/commit/440bed81b8019dff00642c8f493b4909d505a28a'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/flarum/core'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-07T21:05:48Z', 'nvd_published_at': '2021-06-07T22:15:00Z'} |
1.4.0 | GHSA-fj67-w3m4-rfmp | 2021-05-27T22:17:45Z | 2021-06-08T23:19:28Z | null | ['CVE-2021-33513'] | Cross-site scripting in Plone | Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33513'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:17:45Z', 'nvd_published_at': '2021-05-21T22:15:00Z'} |
1.4.0 | GHSA-jm5c-rv3w-w83m | 2021-05-21T21:50:44Z | 2021-06-29T21:13:20Z | null | ['CVE-2020-26242'] | Denial of service in geth | ### Impact
Denial-of-service (crash) during block processing
### Details
Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library.
The crash was in the `uint256` library, where a buffer [underflowed](https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L442).
if `d == 0`, `dLen` remains `0`
and https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L451 will try to access index `[-1]`.
The `uint256` library was first merged in this [commit](https://github.com/ethereum/go-ethereum/commit/cf6674539c589f80031f3371a71c6a80addbe454), on 2020-06-08.
Exploiting this vulnerabilty would cause all vulnerable nodes to drop off the network.
The issue was brought to our attention through a [bug report](https://github.com/ethereum/go-ethereum/issues/21367), showing a `panic` occurring on sync from genesis on the Ropsten network.
It was estimated that the least obvious way to fix this would be to merge the fix into `uint256`, make a new release of that library and then update the geth-dependency.
- https://github.com/holiman/uint256/releases/tag/v1.1.1 was made the same day,
- PR to address the issue: https://github.com/holiman/uint256/pull/80
- PR to update geth deps: https://github.com/ethereum/go-ethereum/pull/21368
### Patches
Upgrade to v1.9.18 or higher
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.16'}, {'fixed': '1.9.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/holiman/uint256'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26242'}, {'type': 'WEB', 'url': 'https://github.com/holiman/uint256/pull/80'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'}, {'type': 'WEB', 'url': 'https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d'}, {'type': 'WEB', 'url': 'https://blog.ethereum.org/2020/11/12/geth_security_release/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0103'}] | {'cwe_ids': ['CWE-125', 'CWE-191', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:50:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jfvf-rfmq-qwf8 | 2021-05-25T20:19:02Z | 2021-06-22T15:23:21Z | null | ['CVE-2019-20789'] | Croos-site scripting in Croogo | Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20789'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/940'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/compare/3.0.6...3.0.7'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:19:02Z', 'nvd_published_at': '2020-04-26T17:15:00Z'} |
1.4.0 | GHSA-35qp-xq9f-2rjx | 2021-05-12T21:38:07Z | 2021-06-24T20:28:28Z | null | ['CVE-2021-3283'] | Improper Privilege Management in HashiCorp Nomad | HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3283'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-01-nomad-s-exec-and-java-task-drivers-did-not-isolate-processes/20332'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:38:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mj63-64x7-57xf | 2023-08-07T11:19:15Z | 2021-06-18T18:43:14Z | null | ['CVE-2021-31800'] | Path traversal in impacket | Multiple path traversal vulnerabilities exist in smbserver.py in Impacket before 0.9.23. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'impacket'}, 'ecosystem_specific': {'affected_functions': ['impacket.smbserver.findFirst2', 'impacket.smbserver.queryPathInformation', 'impacket.smbserver.SMBCommands.smbComNtCreateAndX']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31800'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/commit/99bd29e3995c254e2d6f6c2e3454e4271665955a'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2008'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2958'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L3485'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L876'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/releases'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/releases/tag/impacket_0_9_23'}, {'type': 'PACKAGE', 'url': 'https://github.com/fortra/impacket'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPXDPWCAPVX3UWYZ3N2T5OLBSBBUHJP6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRV2C5DATXBHG6TF6CEEX54KZ75THQS3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UF56LYB27LHEIFJTFHU3M75NMNNK2SCG/'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:42:46Z', 'nvd_published_at': '2021-05-05T11:15:00Z'} |
1.4.0 | GHSA-wrqf-rrrw-w3mg | 2021-04-05T21:52:53Z | 2021-06-16T17:40:47Z | null | ['CVE-2021-25646'] | Code injection in Apache Druid | Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25646'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r121abe8014d381943b63c60615149d40bde9dc1c868bcee90d0d0848@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20e0c3b10ae2c05a3aad40f1476713c45bdefc32c920b9986b941d8f@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4f84b542417ea46202867c0a8b3eaf3b4cfed30e09174a52122ba210@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5ef625076982aee7d23c23f07717e626b73f421fba5154d1e4de15e1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dff4790e7a5c697fc0360adf11f5aeb31cd6ad80644fffee690673c@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87aa94e28dd21ee2252d30c63f01ab9cb5474ee5bdd98dd8d7d734aa@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra4225912f501016bc5e0ac44e14b8d6779173a3a1dc7baacaabcc9ba@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc167d5e57f3120578718a7a458ce3e73b3830ac4efbb1b085bd06b92@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea9436a4063927a567d698431ddae55e760c3f876c22ac5b9813685f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfeb775822cd3baef1595b60f6860f5ca849eb1903236483f3297bd5c@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/01/29/6'}] | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:52:53Z', 'nvd_published_at': '2021-01-29T20:15:00Z'} |
1.4.0 | GHSA-24wf-7vf2-pv59 | 2021-06-25T13:06:33Z | 2021-06-28T16:38:29Z | null | ['CVE-2021-29620'] | XXE vulnerability on Launch import with externally-defined DTD file | ### Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.
### Patches
Fixed with: https://github.com/reportportal/service-api/pull/1392
### Binaries
`docker pull reportportal/service-api:5.4.0`
https://github.com/reportportal/service-api/packages/846871?version=5.4.0
### For more information
If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '5.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29620'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/pull/1392'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T13:06:33Z', 'nvd_published_at': '2021-06-23T18:15:00Z'} |
1.4.0 | GHSA-rcp4-jm2v-mr3f | 2021-05-28T18:38:54Z | 2021-06-08T23:10:24Z | null | ['CVE-2021-33561'] | Cross-site scripting in Shopizer | A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:shopizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33561'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49901'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:38:54Z', 'nvd_published_at': '2021-05-24T23:15:00Z'} |
1.4.0 | GHSA-gc9g-67cq-p7v4 | 2021-05-27T21:47:01Z | 2021-06-15T16:12:04Z | null | ['CVE-2021-33511'] | Server-Side Request Forgery in Plone | Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity TTW schemas, and modeleditors in plone.app.theming, plone.app.dexterity, and plone.supermodel. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33511'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-lxml-parser'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:47:01Z', 'nvd_published_at': '2021-05-21T22:15:00Z'} |
1.4.0 | GHSA-9gwx-9cwp-5c2m | 2021-10-21T13:40:37Z | 2021-06-17T20:11:35Z | null | ['CVE-2021-32623'] | Billion laughs attack (XML bomb) | ### Impact
Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request.
Consider an XML file (`createMediaPackage.xml`) like this:
```xml
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!DOCTYPE lolz [
<!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. ">
<!ELEMENT title (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
<!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">
<!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;">
<!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;">
]>
<mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z">
<title>&lol5;</title>
<media/>
<metadata/>
<attachments/>
<publications/>
</mediapackage>
```
Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory:
```sh
curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \
-F 'mediapackage=<createMediaPackage.xml' \
-F sourceFlavors="" \
-F sourceTags="" \
-F deleteExternal="" \
-F tagsAndFlavor='' \
-o out.xml
```
Additional notes:
- You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text.
- Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system.
- To exploit this, users need to have ingest privileges, limiting the group of potential attackers
### Patches
The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch.
### Workarounds
There is no known workaround for this issue.
### References
- [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack)
- For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
- Email us at [security@opencast.org](mailto:security@opencast.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}] | {'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:07:19Z', 'nvd_published_at': '2021-06-16T00:15:00Z'} |
1.4.0 | GHSA-mg2g-8pwj-r2j2 | 2022-03-15T16:38:13Z | 2021-06-10T17:21:33Z | null | ['CVE-2020-26136'] | Authentication bypass in SilverStripe GraphQL | The GraphQL module accepts basic-auth as an authentication method by default. This can be used to bypass MFA authentication if the silverstripe/mfa module is installed, which is now a commonly installed module. A users password is still required though.
Basic-auth has been removed as a default authentication method. If desired, it can be re-enabled by adding it to the authenticators key of a schema, or on SilverStripe\Graphql\Auth\Handler | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha1'}, {'fixed': '4.0.0-alpha2'}]}], 'versions': ['4.0.0-alpha1']}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26136'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2020-26136'}] | {'cwe_ids': ['CWE-287', 'CWE-288'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:41:10Z', 'nvd_published_at': '2021-06-08T20:15:00Z'} |
1.4.0 | GHSA-c38g-469g-cmgx | 2023-02-17T23:46:35Z | 2021-06-23T18:14:40Z | null | ['CVE-2021-21303'] | Improper Neutralization of Special Elements in Output in helm.sh/helm/v3 |
Since Helm 2 was released, a well-documented aspect of Helm is that the Helm chart's version number MUST follow the SemVer2 specification. In the past, Helm would not permit charts with malformed versions. At some point, a patch was merged that changed this - On a version parse error, the version number was simply passed along as-is. This provided a vector for malicious data to be injected into Helm and potentially used in various ways.
Core maintainers were able to send deceptive information to a terminal screen running the `helm` command, as well as obscure or alter information on the screen. In some cases, we could send codes that terminals used to execute higher-order logic, like clearing a terminal screen.
Further, during evaluation, the Helm maintainers discovered a few other fields that were not properly sanitized when read out of repository index files. This fix remedies all such cases, and once again enforces SemVer2 policies on version fields.
All users of the Helm 3 should upgrade.
Those who use Helm as a library should verify that they either sanitize this data on their own, or use the proper Helm API calls to sanitize the data.
### Patches
This issue has been resolved in Helm 3.5.2.
While this fix does not constitute a breaking change, as all field formatting is now enforced as documented, it is possible that charts that were mistakenly allowed (but invalid) may no longer be available in search indexes. Specifically, **malformed SemVer versions are no longer supported**. This has always been the documented case, but it is true that malformed versions were allowed.
Note that this is the first security release since Helm 2's final deprecation. Helm 2 was not audited for vulnerability to this issue, and should be assumed vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-c38g-469g-cmgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21303'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c38g-469g-cmgx'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.5.2'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1040'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:30:59Z', 'nvd_published_at': '2021-02-05T22:15:00Z'} |
1.4.0 | GHSA-v9w8-hq92-v39m | 2021-03-29T22:34:30Z | 2021-06-08T20:10:45Z | null | ['CVE-2021-20683'] | Cross-site Scripting (XSS) in baserCMS | Improper neutralization of JavaScript input in the blog article editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20683'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/88ccc61e5656b05dd13204d61de706efaa2cd0b1'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN64869876'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN64869876/index.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:34:30Z', 'nvd_published_at': '2021-03-26T09:15:00Z'} |
1.4.0 | GHSA-9cx9-x2gp-9qvh | 2023-02-09T17:46:27Z | 2021-06-29T21:24:28Z | null | ['CVE-2020-15111'] | CRLF vulnerability in Fiber | ### Impact
The filename that is given in [c.Attachment()](https://docs.gofiber.io/ctx#attachment) is not escaped, and therefore vulnerable for a CRLF injection attack. I.e. an attacker could upload a custom filename and then give the link to the victim. With this filename, the attacker can change the name of the downloaded file, redirect to another site, change the authorization header, etc.
### Steps to reproduce
```go
package main
import "github.com/gofiber/fiber"
const badFileName = "another secret document.pdf\"\r\nLocation: google.com\r\nAuthorization: \"example_of_session_fixation"
func splitTheResponse(c *fiber.Ctx) {
c.Attachment(badFileName)
}
func main() {
app := fiber.New()
app.Get("/attack", splitTheResponse)
app.Listen("127.0.0.1:8080")
}
```
```
HTTP/1.1 200 OK
Date: Fri, 10 Jul 2020 19:47:04 GMT
Content-Type: application/octet-stream
Content-Length: 0
Content-Disposition: attachment; filename="another secret document.pdf"
Location: google.com
Authorization: "example_of_session_fixation"
```
### Patches
This issue has been patched in `v1.12.6` with commit [579](https://github.com/gofiber/fiber/pull/579/commits/f698b5d5066cfe594102ae252cd58a1fe57cf56f) escaping the filename by default.
### Workarounds
You could of course serialize the input yourself before passing it to `ctx.Attachment()`, this is actually a good practice by default. But in case you forget, we got you covered 👍
### References
A CRLF injection attack is one of several types of injection attacks. It can be used to escalate to more malicious attacks such as Cross-site Scripting (XSS), page injection, web cache poisoning, cache-based defacement, and more. A CRLF injection vulnerability exists if an attacker can inject the CRLF characters into a web application, for example using a user input form or an HTTP request, [see acunetix](https://www.acunetix.com/websitesecurity/crlf-injection/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [gofiber/fiber](https://github.com/gofiber/fiber)
* Join us on [Discord](https://gofiber.io/discord) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gofiber/fiber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gofiber/fiber/security/advisories/GHSA-9cx9-x2gp-9qvh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15111'}, {'type': 'WEB', 'url': 'https://github.com/gofiber/fiber/pull/579'}, {'type': 'WEB', 'url': 'https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f'}, {'type': 'PACKAGE', 'url': 'https://github.com/gofiber/fiber'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0108'}] | {'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:14:18Z', 'nvd_published_at': '2020-07-20T18:15:00Z'} |
1.4.0 | GHSA-jxcc-g75x-qgw9 | 2023-09-07T20:15:39Z | 2021-06-08T18:47:18Z | null | ['CVE-2021-23391'] | Calipso Arbitrary File Write via Archive Extraction (Zip Slip) | This affects all versions of package calipso. It is possible for a malicious module to overwrite files on an arbitrary file system through the module install functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'calipso'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.54'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23391'}, {'type': 'WEB', 'url': 'https://github.com/cliftonc/calipso'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555'}] | {'cwe_ids': ['CWE-29', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T16:15:33Z', 'nvd_published_at': '2021-06-07T21:15:00Z'} |
1.4.0 | GHSA-jr9p-r423-9m2r | 2023-08-31T16:34:09Z | 2021-06-02T21:44:28Z | null | ['CVE-2021-26813'] | markdown2 Regular Expression Denial of Service | markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ecosystem_specific': {'affected_functions': ['markdown2.Markdown.convert']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1.18'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26813'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/pull/387'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY/'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:02:47Z', 'nvd_published_at': '2021-03-03T16:15:00Z'} |