schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-jm6p-wfjg-xm7x
2021-12-02T15:29:37Z
2021-12-01T18:26:48Z
null
['CVE-2021-4026']
bookstack is vulnerable to Improper Access Control
bookstack is vulnerable to Improper Access Control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4026'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.2'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d'}]
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-01T15:23:39Z', 'nvd_published_at': '2021-11-30T20:15:00Z'}
1.4.0
GHSA-vx6j-pjrh-vgjh
2021-12-15T22:27:31Z
2021-12-15T22:54:20Z
null
['CVE-2021-43836']
PHP file inclusion in the Sulu admin panel
### Impact _What kind of vulnerability is it? Who is impacted?_ An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution. * Compromised components: Arbitrary file read on the server, (Potential) Remote code execution * Exploitation pre-requisite: User account on the backend ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.44'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-RC1'}, {'fixed': '2.4.0'}]}], 'versions': ['2.4.0-RC1']}]
[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-15T22:27:31Z', 'nvd_published_at': '2021-12-15T20:15:00Z'}
1.4.0
GHSA-xmc8-26q4-qjhx
2023-03-27T15:11:51Z
2021-12-09T19:17:21Z
null
['CVE-2020-28491']
Denial of Service (DoS) in Jackson Dataformat CBOR
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 2.8.0-rc1 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0rc1'}, {'fixed': '2.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.dataformat:jackson-dataformat-cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0rc1'}, {'fixed': '2.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/issues/186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/commit/3d7de83423f8f68f8e9a0c8250084e11818544c7'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-dataformats-binary'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:43:00Z', 'nvd_published_at': '2021-02-18T16:15:00Z'}
1.4.0
GHSA-6pqm-xvfc-w7p4
2021-12-03T15:18:52Z
2021-12-03T20:42:35Z
null
['CVE-2021-3993']
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3993'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-02T21:17:10Z', 'nvd_published_at': '2021-12-01T11:15:00Z'}
1.4.0
GHSA-2fqw-684c-pvp7
2022-01-04T18:59:02Z
2021-12-17T20:40:50Z
null
['CVE-2020-35213']
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.atomix:atomix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35213'}, {'type': 'WEB', 'url': 'https://docs.google.com/presentation/d/1i8tVVGE8z9Rtl9UTwktOJpkZwT4kBVLgIk307qMiw_8/edit?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/atomix/atomix'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-12-17T18:42:16Z', 'nvd_published_at': '2021-12-16T20:15:00Z'}
1.4.0
GHSA-qphc-hf5q-v8fc
2023-08-08T16:59:42Z
2021-12-14T21:19:08Z
null
['CVE-2021-44528']
actionpack Open Redirect in Host Authorization Middleware
Specially crafted "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this: ``` config.hosts << '.EXAMPLE.com' ``` When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website. This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942. Releases -------- The fixed releases are available at the normal locations. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series * 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series * 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.4.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5372'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-14T21:12:06Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}
1.4.0
GHSA-9jp8-cwwx-p64q
2021-11-29T20:55:01Z
2021-12-01T18:28:38Z
null
[]
XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext
The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.25.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.25'}}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-9jp8-cwwx-p64q'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:53:06Z', 'nvd_published_at': None}
1.4.0
GHSA-qc22-qwm9-j8rx
2021-12-20T16:57:06Z
2021-12-20T16:59:31Z
null
[]
Remote Code Execution in npm-groovy-lint
Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable.
[]
[{'package': {'ecosystem': 'npm', 'name': 'npm-groovy-lint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/issues/194'}, {'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/pull/195'}, {'type': 'WEB', 'url': 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvuillam/npm-groovy-lint'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-12-20T16:57:06Z', 'nvd_published_at': None}
1.4.0
GHSA-6g8v-hpgw-h2v7
2023-09-12T20:56:09Z
2021-01-20T21:21:50Z
null
['CVE-2020-28478']
Prototype pollution in gsap
There is a prototype pollution vulnerability in gsap which affects all versions before 3.6.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'gsap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28478'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js#L150'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js%23L147'}, {'type': 'WEB', 'url': 'https://github.com/greensock/GSAP/releases/tag/3.6.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GSAP-1054614'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gsap/v/3.6.0'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T05:34:02Z', 'nvd_published_at': '2021-01-19T11:15:00Z'}
1.4.0
GHSA-h3gg-7wx2-cq3h
2021-01-26T20:41:58Z
2021-01-29T18:13:41Z
null
['CVE-2021-21283']
XSS in Flarum Sticky extension
### Impact A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit. Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed. Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned. On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited. Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted. ### Patches The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension. ### Workarounds Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled. ### References - [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151) - [Pull Request](https://github.com/flarum/sticky/pull/24) ### For more information If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support). If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/sticky'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0-beta.14'}, {'fixed': '0.1.0-beta.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.0-beta.15'}}]
[{'type': 'WEB', 'url': 'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283'}, {'type': 'WEB', 'url': 'https://github.com/flarum/sticky/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'}, {'type': 'WEB', 'url': 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-26T20:41:58Z', 'nvd_published_at': '2021-01-26T21:15:00Z'}
1.4.0
GHSA-3crj-w4f5-gwh4
2021-02-16T17:35:25Z
2021-01-29T20:51:37Z
null
['CVE-2021-21316']
Processing untrusted theming resources might execute arbitrary code (ACE)
### Impact When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process. While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development. Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat: An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files. This is an example of inline JavaScript in a Less file: ```less .rule { @var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`; color: @var; } ``` Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3. Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it: ```less .rule { @var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`"; color: @var; } ``` ### Patches We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork. This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0) ### Workarounds Only process trusted theming resources. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/SAP/less-openui5 * Email us at secure@sap.com
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'less-openui5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316'}, {'type': 'WEB', 'url': 'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'}, {'type': 'WEB', 'url': 'https://github.com/SAP/less-openui5/releases/tag/v0.10.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/less-openui5'}, {'type': 'WEB', 'url': 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T20:50:46Z', 'nvd_published_at': '2021-02-16T18:15:00Z'}
1.4.0
GHSA-395w-qhqr-9fr6
2021-01-06T20:01:15Z
2021-01-06T20:01:34Z
null
['CVE-2020-17519']
Path Traversal in Apache Flink
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-runtime_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-runtime_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17519'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/01/05/2'}]
{'cwe_ids': ['CWE-22', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T20:01:15Z', 'nvd_published_at': '2021-01-05T12:15:00Z'}
1.4.0
GHSA-vhhw-xjvf-wprr
2022-05-31T21:40:49Z
2021-01-29T18:13:14Z
null
['CVE-2021-23326']
Command Injection in @graphql-tools/git-loader
This affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@graphql-tools/git-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23326'}, {'type': 'WEB', 'url': 'https://github.com/ardatan/graphql-tools/pull/2470'}, {'type': 'WEB', 'url': 'https://github.com/ardatan/graphql-tools/commit/6a966beee8ca8b2f4adfe93318b96e4a5c501eac'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4300'}, {'type': 'WEB', 'url': 'https://github.com/ardatan/graphql-tools/releases/tag/%40graphql-tools%2Fgit-loader%406.2.6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GRAPHQLTOOLSGITLOADER-1062543'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-22T18:52:27Z', 'nvd_published_at': '2021-01-20T13:15:00Z'}
1.4.0
GHSA-5w74-jx7m-x6hv
2023-09-11T13:42:01Z
2021-01-19T21:16:17Z
null
['CVE-2018-8071']
XSS vulnerability in theme config file in Mautic
### Impact Mautic before v2.13.0 has stored XSS via a theme config file. ### Patches Update to 2.13.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-5w74-jx7m-x6hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8071'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/3add236e9cc00ea9b211b52cccc4660379b2ee8b'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.13.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:15:02Z', 'nvd_published_at': None}
1.4.0
GHSA-2ccx-2gf3-8xvv
2022-07-20T17:00:39Z
2021-01-14T19:15:19Z
null
['CVE-2020-26253']
Kirby .dev domains and some reverse proxy setups were treated as local
### Impact #### About our registration block In order to protect new installations on public servers that don't have an admin account for the Panel yet, we block account registration there by default. This is a security feature, which we implemented years ago in Kirby 2. It helps to avoid that you forget registering your first admin account on a public server. In this case – without our security block – someone else might theoretically be able to find your site, find out it's running on Kirby, find the Panel and then register the account first. It's an unlikely situation, but it's still a certain risk. To be able to register the first Panel account on a public server, you have to enforce the installer via a config setting. This helps to push all users to the best practice of registering your first Panel account on your local machine and upload it together with the rest of the site. #### The issue As noted by [Jukka Rautanen](https://github.com/jukra), this installation block implementation in Kirby versions before 3.3.6 still assumed that .dev domains are local domains, which is no longer true. In the meantime, those domains became publicly available. This means that our installation block is no longer working as expected if you use a .dev domain for your Kirby site. In fixing this issue, we've also found out that the local installation check may also fail if your site is behind a reverse proxy. #### Am I affected? You are only affected if: 1. you use a .dev domain or your site is behind a reverse proxy & 2. you have not yet registered your first Panel account on the public server & 3. someone finds your site and tries to login at `yourdomain.dev/panel` before you register your first account. You are not affected if you have already created one or multiple Panel accounts (no matter if on a .dev domain or behind a reverse proxy). ### Patches The problem has been patched in [Kirby 2.5.14](https://github.com/getkirby-v2/panel/releases/tag/2.5.14) and [Kirby 3.3.6](https://github.com/getkirby/kirby/releases/tag/3.3.6). Please update to one of these or a [later version](https://github.com/getkirby/kirby/releases) to fix the vulnerability. **Note:** Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14. ### Workarounds Kirby 2 sites on older releases can also be patched by applying the [changes from this commit](https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-2ccx-2gf3-8xvv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26253'}, {'type': 'WEB', 'url': 'https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.3.6'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/getkirby/cms'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/getkirby/panel'}]
{'cwe_ids': ['CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-14T17:55:05Z', 'nvd_published_at': '2020-12-08T02:15:00Z'}
1.4.0
GHSA-qjhr-c23f-w76q
2021-01-19T21:14:13Z
2021-01-19T21:16:24Z
null
['CVE-2017-1000488']
Inline JS XSS vulnerability in Mautic
### Impact Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form. ### Patches Upgrade to 2.12.0 or later. ### Workarounds None ### References https://github.com/mautic/mautic/releases/tag/2.12.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.12.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:14:13Z', 'nvd_published_at': '2018-01-03T16:29:00Z'}
1.4.0
GHSA-6x98-fx9j-7c78
2023-09-11T13:39:35Z
2021-01-19T21:16:19Z
null
['CVE-2017-1000489']
Disabled users able to log in with third party SSO plugin
### Impact Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address ### Patches Upgrade to 2.12.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.12.0'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:44Z', 'nvd_published_at': '2018-01-03T17:29:00Z'}
1.4.0
GHSA-xcf7-cj8q-pcjm
2023-09-11T13:41:18Z
2021-01-19T21:16:14Z
null
['CVE-2018-11198']
XSS vulnerability in Author URL of themes in Mautic
### Impact An XSS vulnerability was discovered in Mautic 2.13.1 in the Author URL of themes. ### Patches Update to 2.14 or later ### Workarounds None ### References https://github.com/mautic/mautic/releases/tag/2.14.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.1'}, {'fixed': '2.14.0'}]}], 'versions': ['2.13.1']}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-xcf7-cj8q-pcjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11198'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.14.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:15:40Z', 'nvd_published_at': '2019-09-06T21:15:00Z'}
1.4.0
GHSA-w8fh-pvq2-x8c4
2021-01-29T18:10:59Z
2021-01-29T18:11:20Z
null
[]
Malicious npm package: sonatype
The npm `sonatype` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
[{'package': {'ecosystem': 'npm', 'name': 'sonatype'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1596'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T18:10:59Z', 'nvd_published_at': None}
1.4.0
GHSA-9hx7-rg7w-xm79
2021-01-19T21:13:14Z
2021-01-19T21:16:26Z
null
['CVE-2018-11200']
XSS vulnerability in company name field in Mautic
### Impact Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code. ### Patches Update to 2.14.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.11.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-9hx7-rg7w-xm79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11200'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.14.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:14Z', 'nvd_published_at': None}
1.4.0
GHSA-2cwj-8chv-9pp9
2021-08-25T20:55:11Z
2021-01-29T19:47:23Z
null
['CVE-2018-1285']
XML External Entity attack in log4net
Apache log4net before 2.0.10 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'log4net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1285'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4net'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4NET-575'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d@%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220909-0001/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-LOG4NET-568897'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/log4net/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2018-1285'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T19:47:10Z', 'nvd_published_at': '2020-05-11T17:15:00Z'}
1.4.0
GHSA-q3wr-qw3g-3p4h
2022-10-07T20:41:40Z
2021-01-11T19:06:10Z
null
['CVE-2020-26298']
Injection/XSS in Redcarpet
Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. This is fixed in version 3.5.1 by the referenced commit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'redcarpet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26298'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q3wr-qw3g-3p4h'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/redcarpet/CVE-2020-26298.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmg/redcarpet'}, {'type': 'WEB', 'url': 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFMYDIONVWATY7EB6EARDVXT47AYCRNM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNO4ZZUPGAEUXKQL4G2HRIH7CUZKPCT6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXNNWHHAPREDM3XJDACYRTK7DBMUONBI/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/redcarpet'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4831'}]
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-11T19:05:42Z', 'nvd_published_at': '2021-01-11T19:15:00Z'}
1.4.0
GHSA-487w-pqcm-63hq
2023-09-08T22:44:01Z
2021-01-13T18:22:13Z
null
['CVE-2020-7794']
Command injection in buns
There is a command injection vulnerability in all versions of package buns. The injection point is located in line 678 in index file lib/index.js in the exported function install(requestedModule).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buns'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7794'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BUNS-1050389'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-12T23:52:20Z', 'nvd_published_at': '2021-01-08T13:15:00Z'}
1.4.0
GHSA-523c-xh4g-mh5m
2022-11-17T20:57:31Z
2021-01-14T19:18:22Z
null
['CVE-2017-12626']
Denial of Service in Apache POI
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: - Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294) - Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12626'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/poi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102879'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-11-06T18:56:32Z', 'nvd_published_at': '2018-01-29T17:29:00Z'}
1.4.0
GHSA-39wj-j3jc-858m
2021-01-19T20:43:12Z
2021-01-19T20:43:56Z
null
['CVE-2020-35124']
XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic
### Impact This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic. This vulnerability was reported by Naveen Sunkavally at Horizon3.ai. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35124'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'}, {'type': 'WEB', 'url': 'https://forum.mautic.org/c/announcements/16'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/mautic/core'}, {'type': 'WEB', 'url': 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce'}, {'type': 'WEB', 'url': 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T20:43:12Z', 'nvd_published_at': '2021-01-28T06:15:00Z'}
1.4.0
GHSA-29v9-2fpx-j5g9
2021-01-19T21:13:01Z
2021-01-19T21:16:29Z
null
['CVE-2018-8092']
CSV Injection vulnerability with exported contact lists in Mautic
### Impact Mautic versions before 2.13.0 had a vulnerability that allowed a CSV injection with exported contact lists - https://www.owasp.org/index.php/CSV_Injection. ### Patches Update to 2.13.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-29v9-2fpx-j5g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8092'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/cbc49f0ac4cc7e3acc07f2a85c079b2f85225a6b'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.13.0'}]
{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:01Z', 'nvd_published_at': None}
1.4.0
GHSA-p7v4-gm6j-cw9m
2021-01-29T20:31:59Z
2021-01-29T20:51:20Z
null
['CVE-2021-3142']
XSS in Mautic
### Impact This is a cross-site scripting vulnerability relating to creating/editing a company which requires the user to be logged in as an administrator to be executed. This vulnerability was reported by Dardan Prebreza at Bishop Fox. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### References https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4 ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-p7v4-gm6j-cw9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3142'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/3.2.4'}, {'type': 'WEB', 'url': 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T20:31:59Z', 'nvd_published_at': '2021-01-28T06:15:00Z'}
1.4.0
GHSA-p4q6-qxjx-8jgp
2021-01-07T22:28:53Z
2021-01-05T17:29:40Z
null
['CVE-2021-21234']
Directory Traversal in spring-boot-actuator-logview
### Impact The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). ### Patches The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. ### Workarounds There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [github repo](https://github.com/lukashinsch/spring-boot-actuator-logview)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'eu.hinsch:spring-boot-actuator-logview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/lukashinsch/spring-boot-actuator-logview/security/advisories/GHSA-p4q6-qxjx-8jgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21234'}, {'type': 'WEB', 'url': 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6'}, {'type': 'WEB', 'url': 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772'}, {'type': 'WEB', 'url': 'https://search.maven.org/artifact/eu.hinsch/spring-boot-actuator-logview'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-05T17:28:54Z', 'nvd_published_at': '2021-01-05T18:15:00Z'}
1.4.0
GHSA-hq37-853p-g5cf
2021-01-06T19:12:20Z
2021-01-06T16:57:50Z
null
['CVE-2021-21236']
Regular Expression Denial of Service in CairoSVG
# Doyensec Vulnerability Advisory * Regular Expression Denial of Service (REDoS) in cairosvg * Affected Product: CairoSVG v2.0.0+ * Vendor: https://github.com/Kozea * Severity: Medium * Vulnerability Class: Denial of Service * Author(s): Ben Caller ([Doyensec](https://doyensec.com)) ## Summary When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. ## Technical description The vulnerable regular expressions are https://github.com/Kozea/CairoSVG/blob/9c4a982b9a021280ad90e89707eacc1d114e4ac4/cairosvg/colors.py#L190-L191 The section between 'rgb(' and the final ')' contains multiple overlapping groups. Since all three infinitely repeating groups accept spaces, a long string of spaces causes catastrophic backtracking when it is not followed by a closing parenthesis. The complexity is cubic, so doubling the length of the malicious string of spaces makes processing take 8 times as long. ## Reproduction steps Create a malicious SVG of the form: <svg width="1" height="1"><rect fill="rgb( ;"/></svg> with the following code: '<svg width="1" height="1"><rect fill="rgb(' + (' ' * 3456) + ';"/></svg>' Note that there is no closing parenthesis before the semi-colon. Run cairosvg e.g.: cairosvg cairo-redos.svg -o x.png and notice that it hangs at 100% CPU. Increasing the number of spaces increases the processing time with cubic complexity. ## Remediation Fix the regexes to avoid overlapping parts. Perhaps remove the [ \n\r\t]* groups from the regex, and use .strip() on the returned capture group. ## Disclosure timeline - 2020-12-30: Vulnerability disclosed via email to CourtBouillon
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'CairoSVG'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/security/advisories/GHSA-hq37-853p-g5cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21236'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/commit/cfc9175e590531d90384aa88845052de53d94bf3'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/CairoSVG/releases/tag/2.5.1'}, {'type': 'WEB', 'url': 'https://pypi.org/project/CairoSVG/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T16:57:38Z', 'nvd_published_at': '2021-01-06T17:15:00Z'}
1.4.0
GHSA-hgmg-hhc8-g5wr
2022-08-11T18:16:15Z
2021-01-29T21:51:22Z
null
['CVE-2021-21254']
CKEditor 5 Markdown plugin Regular expression Denial of Service
### Impact A regular expression denial of service (ReDoS) vulnerability has been discovered in the CKEditor 5 Markdown plugin code. The vulnerability allowed to abuse a link recognition regular expression, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 Markdown plugin at version <= 24.0.0. ### Patches The problem has been recognized and patched. The fix will be available in version 25.0.0. ### Workarounds The user can work around the issue by: - Upgrading CKEditor 5 to version 25.0.0. - Disabling the Markdown plugin. ### More information If you have any questions or comments about this advisory: * Email us at [security@cksource.com](mailto:security@cksource.com) ### Acknowledgements The CKEditor 5 team would like to thank Erik Krogh Kristensen from the GitHub team for recognizing this vulnerability and Alvaro Muñoz from GitHub for reporting it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-markdown-gfm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '25.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 24.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21254'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor5'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T21:50:43Z', 'nvd_published_at': '2021-01-29T22:15:00Z'}
1.4.0
GHSA-7jh9-6cpf-h4m7
2023-09-12T18:13:25Z
2021-01-13T19:07:01Z
null
['CVE-2020-7741']
XSS in hello.js
This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as `javascript:alert(1)`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hellojs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'}, {'type': 'WEB', 'url': 'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-13T19:06:37Z', 'nvd_published_at': '2020-10-06T15:15:00Z'}
1.4.0
GHSA-hhw9-35p2-q2c5
2021-01-29T20:39:56Z
2021-01-29T20:51:30Z
null
[]
Steam Socialite Provider v1 does not correctly validate openid server
### Impact The outdated version 1 of the Steam Socialite Provider doesn't check properly if the login comes from `steamcommunity.com`, allowing a malicious actor to substitute their own openID server. ### Patches This vulnerability only affects the outdated v1.x versions of the package. These are no longer maintained, users should upgrade to v3 or v4, which use a hardcoded endpoint to verify the login. ### For more information If you have any questions or comments about this advisory: * Open an issue in [SocialiteProviders/Providers](https://github.com/SocialiteProviders/Providers) * Email us at [socialite@atymic.dev](mailto:socialite@atymic.dev)
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'socialiteproviders/steam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/SocialiteProviders/Steam/security/advisories/GHSA-hhw9-35p2-q2c5'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/socialiteproviders/steam'}]
{'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T20:39:56Z', 'nvd_published_at': None}
1.4.0
GHSA-43hg-g44q-474q
2021-01-22T18:46:09Z
2021-01-29T18:13:03Z
null
['CVE-2021-3137']
Cross Site Scripting (XSS) in XWiki
XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3137'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49437'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-22T18:46:09Z', 'nvd_published_at': '2021-01-20T04:15:00Z'}
1.4.0
GHSA-ww4j-c2rq-47q8
2023-09-08T20:18:49Z
2021-01-13T18:22:28Z
null
['CVE-2020-7784']
Command injection in ts-process-promises
This affects all versions of package ts-process-promises. The injection point is located in line 45 in main entry of package in lib/process-promises.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ts-process-promises'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.2']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7784'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-12T23:54:52Z', 'nvd_published_at': '2021-01-08T13:15:00Z'}
1.4.0
GHSA-5949-rw7g-wx7w
2023-09-14T16:14:09Z
2021-01-20T21:20:15Z
null
['CVE-2021-20190']
Deserialization of untrusted data in jackson-databind
A flaw was found in jackson-databind before 2.9.10.7 and 2.6.7.5. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2854'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1916633'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T04:44:51Z', 'nvd_published_at': '2021-01-19T17:15:00Z'}
1.4.0
GHSA-jxwx-85vp-gvwm
2023-08-31T18:34:36Z
2021-01-13T18:21:54Z
null
['CVE-2021-21252']
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation. The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service) This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-validation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.Validation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21252'}, {'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/pull/2371'}, {'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery-validation/jquery-validation'}, {'type': 'WEB', 'url': 'https://jqueryvalidation.org/#installation-via-package-managers'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0005/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-294-redos-jquery-validation/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jquery-validation'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/jquery.validation'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-13T18:21:42Z', 'nvd_published_at': '2021-01-13T19:15:00Z'}
1.4.0
GHSA-hh7m-rx4f-4vpv
2021-01-11T20:32:44Z
2021-01-11T20:38:28Z
null
['CVE-2021-21241']
CSRF can expose users authentication token
### Issue The /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token. ### Patches Version 3.4.5 and soon to be released 4.0.0 are patched. ### Workarounds If you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to "0" (seconds) which should make the token unusable. ### References None
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.4.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-hh7m-rx4f-4vpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21241'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/pull/422'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a'}, {'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/releases/tag/3.4.5'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Flask-Security-Too'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-11T20:32:44Z', 'nvd_published_at': '2021-01-11T21:15:00Z'}
1.4.0
GHSA-qv2g-99x4-45x6
2021-01-29T18:11:36Z
2021-01-29T18:12:07Z
null
[]
Malicious npm package: discord-fix
The npm `discord-fix` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
[{'package': {'ecosystem': 'npm', 'name': 'discord-fix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1597'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T18:11:36Z', 'nvd_published_at': None}
1.4.0
GHSA-5p3x-r448-pc62
2022-08-22T19:39:40Z
2021-01-21T14:12:18Z
null
['CVE-2021-21239']
Improper Verification of Cryptographic Signature in PySAML2
### Impact All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not ensure that a signed SAML document is correctly signed. The default `CryptoBackendXmlSec1` backend is using the `xmlsec1` binary to verify the signature of signed SAML documents, but by default, `xmlsec1` accepts any type of key found within the given document. `xmlsec1` needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature. ### Patches Users should upgrade to pysaml2 `v6.5.0`. ### Workarounds No workaround provided at this point. ### References This issue has been reported in the past at the xmlsec1 mailing list: https://www.aleksey.com/pipermail/xmlsec/2013/009717.html ### Credits - Brian Wolff ### For more information If you have any questions or comments about this advisory: * Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2) * Email us at [the incident-response address](mailto:incident-response@idpy.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21239'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99'}, {'type': 'PACKAGE', 'url': 'https://github.com/IdentityPython/pysaml2'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html'}, {'type': 'WEB', 'url': 'https://pypi.org/project/pysaml2'}, {'type': 'WEB', 'url': 'https://www.aleksey.com/pipermail/xmlsec/2013/009717.html'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-21T14:11:58Z', 'nvd_published_at': '2021-01-21T15:15:00Z'}
1.4.0
GHSA-wjx2-7hqq-8h7m
2023-07-03T21:56:16Z
2021-01-14T19:17:16Z
null
['CVE-2020-36190']
rails_admin ruby gem XSS vulnerability
RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails_admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190'}, {'type': 'WEB', 'url': 'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'}, {'type': 'PACKAGE', 'url': 'https://github.com/railsadminteam/rails_admin/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml'}, {'type': 'WEB', 'url': 'https://github.com/sferik/rails_admin/blob/master/README.md'}, {'type': 'WEB', 'url': 'https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-14T19:15:02Z', 'nvd_published_at': '2021-01-12T20:15:00Z'}
1.4.0
GHSA-4w2v-q235-vp99
2022-09-14T20:36:52Z
2021-01-04T20:59:40Z
null
['CVE-2020-28168']
Axios vulnerable to Server-Side Request Forgery
Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'axios'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28168'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/issues/3369'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AXIOS-1038255'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1594'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/axios'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-04T20:57:20Z', 'nvd_published_at': '2020-11-06T20:15:00Z'}
1.4.0
GHSA-fxwf-4rqh-v8g3
2023-09-11T22:46:42Z
2021-01-20T21:22:37Z
null
['CVE-2020-28481']
CORS misconfiguration in socket.io
The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'socket.io'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28481'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/issues/3671'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io/commit/f78a575f66ab693c3ea96ea88429ddb1a44c86c7'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859'}]
{'cwe_ids': ['CWE-346', 'CWE-453'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T05:39:24Z', 'nvd_published_at': '2021-01-19T15:15:00Z'}
1.4.0
GHSA-hvf8-h2qh-37m9
2021-01-28T19:11:05Z
2021-01-28T19:11:34Z
null
['CVE-2020-26272']
IPC messages delivered to the wrong frame in Electron
### Impact IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame. If your app does ANY of the following, then it is impacted by this issue: - Uses `remote` - Calls `webContents.sendToFrame` - Calls `event.reply` in an IPC message handler ### Patches This has been fixed in the following versions: - 9.4.0 - 10.2.0 - 11.1.0 - 12.0.0-beta.9 ### Workarounds There are no workarounds for this issue. ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26272'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/26875'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/releases/tag/v9.4.0'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?version=9#9.4.0'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-28T19:11:05Z', 'nvd_published_at': '2021-01-28T19:15:00Z'}
1.4.0
GHSA-8j9v-h2vp-2hhv
2021-01-07T22:32:04Z
2021-01-04T18:22:11Z
null
['CVE-2020-26293']
XSS in HtmlSanitizer
### Impact If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. ### Patches The problem has been fixed in version 5.0.372. ### Workarounds Remove the `<style>` tag from the set of allowed tags. ### For more information If you have any questions or comments about this advisory open an issue in https://github.com/mganss/HtmlSanitizer ### Credits This issue was discovered by Michal Bentkowski of Securitum.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'HtmlSanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.372'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293'}, {'type': 'WEB', 'url': 'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'}, {'type': 'WEB', 'url': 'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/HtmlSanitizer/'}]
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-04T18:21:52Z', 'nvd_published_at': '2021-01-04T19:15:00Z'}
1.4.0
GHSA-w7jx-j77m-wp65
2021-01-06T19:27:46Z
2021-01-06T19:27:54Z
null
[]
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs. This impacts all users who are using TinyMCE 5.5.1 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.6.0 by improved URL sanitization logic. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.6.0 or higher - Manually sanitize `iframe`, `object` and `embed` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter). - Disable `iframe`, `object`, and `embed` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting. #### Example: Sanitizing using a node filter ```js editor.parser.addNodeFilter('iframe,object,embed', function(nodes) { nodes.forEach(function(node) { if (node.attributes) { node.attributes.forEach(function(attr) { var name = attr.name; var value = attr.value; // Sanitize the attribute value here or remove it entirely var sanitizedValue = ...; node.attr(name, santizedValue); }); } }); }); ``` #### Example: Using invalid_elements ```js invalid_elements: 'iframe,object,embed' ``` ### Acknowledgements Tiny Technologies would like to thank Aaron Bishop at SecurityMetrics for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
[]
[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-w7jx-j77m-wp65'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T19:27:46Z', 'nvd_published_at': None}
1.4.0
GHSA-vfxj-qg93-7wwc
2023-09-11T15:06:08Z
2021-01-19T21:16:21Z
null
['CVE-2018-10189']
Mautic Sessions could be hijacked due to tracking contacts by an auto-incremented ID
### Impact An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled. ### Patches Update to 2.13.0 or later ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-vfxj-qg93-7wwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10189'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.13.0'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T21:13:34Z', 'nvd_published_at': None}
1.4.0
GHSA-7xcv-wvr7-4h6p
2021-01-29T18:11:48Z
2021-01-29T18:12:19Z
null
[]
Malicious npm package: an0n-chat-lib
The npm `an0n-chat-lib` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
[{'package': {'ecosystem': 'npm', 'name': 'an0n-chat-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1598'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-29T18:11:48Z', 'nvd_published_at': None}
1.4.0
GHSA-49wp-qq6x-g2rf
2022-06-29T21:54:32Z
2021-01-20T21:30:34Z
null
['CVE-2020-28482']
Cross-site Request Forgery in fastify-csrf
The package fastify-csrf before 3.0.0 has a set of issues that affect its ability to do CSRF protection. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: `cookieOpts: { path: '/', sameSite: true }` 2. The CSRF token was available in the GET query parameter
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastify-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28482'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-csrf/pull/26'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-csrf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/fastify-csrf'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T19:49:01Z', 'nvd_published_at': '2021-01-19T15:15:00Z'}
1.4.0
GHSA-pgww-xf46-h92r
2023-09-05T14:36:43Z
2021-01-07T21:54:01Z
null
['CVE-2020-27783']
lxml vulnerable to Cross-site Scripting
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27783'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4286'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1901633'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/lxml/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210521-0003/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4810'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'PACKAGE', 'url': ' https://github.com/lxml/lxml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-07T21:53:43Z', 'nvd_published_at': '2020-12-03T17:15:00Z'}
1.4.0
GHSA-5v44-7647-xfw9
2022-01-07T16:07:46Z
2021-01-20T21:33:53Z
null
['CVE-2020-26248']
Blind SQL injection in PrestaShop productcomments module
### Impact An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. ### Patches The problem is fixed in 4.2.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/productcomments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-5v44-7647-xfw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26248'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/productcomments'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/releases/tag/v4.2.1'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/productcomments'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160539/PrestaShop-ProductComments-4.2.0-SQL-Injection.html'}]
{'cwe_ids': ['CWE-89'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T21:33:26Z', 'nvd_published_at': '2020-12-03T21:15:00Z'}
1.4.0
GHSA-cghx-9gcr-r42x
2022-10-07T20:36:09Z
2021-01-29T18:12:54Z
null
['CVE-2020-8570']
Path Traversal in the Java Kubernetes Client
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.kubernetes:client-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.kubernetes:client-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.1'}]}], 'versions': ['10.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/issues/1491'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/pull/1450'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes-client/java'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-22T18:25:27Z', 'nvd_published_at': '2021-01-21T17:15:00Z'}
1.4.0
GHSA-6c3f-p5wp-34mh
2022-05-03T02:56:05Z
2021-01-29T18:14:00Z
null
['CVE-2021-3190']
OS Command Injection in async-git
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'async-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3190'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/13'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/14'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4772'}, {'type': 'PACKAGE', 'url': 'https://github.com/omrilotan/async-git'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/async-git'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-01-27T23:33:04Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}
1.4.0
GHSA-qwp9-52h8-xgg8
2021-01-20T05:24:47Z
2021-01-20T21:21:16Z
null
['CVE-2020-28480']
Prototype pollution in JointJS
The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28480'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/pull/1406'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T05:24:47Z', 'nvd_published_at': '2021-01-19T15:15:00Z'}
1.4.0
GHSA-v5rv-hpxg-8x49
2021-01-13T19:12:58Z
2021-01-13T19:13:11Z
null
['CVE-2020-28042']
Signature validation bypass in ServiceStack
ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'ServiceStack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042'}, {'type': 'WEB', 'url': 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'}, {'type': 'WEB', 'url': 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/ServiceStack/'}, {'type': 'WEB', 'url': 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/'}, {'type': 'WEB', 'url': 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-13T19:12:58Z', 'nvd_published_at': '2020-11-02T21:15:00Z'}
1.4.0
GHSA-qpgw-2c72-4c89
2023-09-11T13:40:01Z
2021-01-19T20:50:38Z
null
['CVE-2017-1000490']
Mautic users able to download any files from server using filemanager
### Impact Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. ### Patches Update to 2.12.0 or later. ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-qpgw-2c72-4c89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000490'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/releases/tag/2.12.0'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T20:50:28Z', 'nvd_published_at': '2018-01-03T17:29:00Z'}
1.4.0
GHSA-f4g9-h89h-jgv9
2021-02-01T14:20:48Z
2021-01-21T14:12:16Z
null
['CVE-2021-21238']
SAML XML Signature wrapping in PySAML2
### Impact All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not validate the SAML document against an XML schema. This allows invalid XML documents to trick the verification process, by presenting elements with a valid signature inside elements whose content has been malformed. The verification is offloaded to `xmlsec1` and `xmlsec1` will not validate every signature in the given document, but only the first it finds in the given scope. ### Patches Users should upgrade to pysaml2 `v6.5.0`. ### Workarounds No workaround provided at this point. ### References No references provided at this point. ### Credits - Victor Schönfelder Garcia (isits AG International School of IT Security) - Juraj Somorovsky (Paderborn University) - Vladislav Mladenov (Ruhr University Bochum) ### For more information If you have any questions or comments about this advisory: * Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2) * Email us at [the incident-response address](mailto:incident-response@idpy.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pysaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-f4g9-h89h-jgv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21238'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14'}, {'type': 'WEB', 'url': 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/pysaml2'}]
{'cwe_ids': ['CWE-347'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-21T14:11:38Z', 'nvd_published_at': '2021-01-21T15:15:00Z'}
1.4.0
GHSA-3p32-j457-pg5x
2021-03-29T17:41:17Z
2021-01-19T19:36:51Z
null
['CVE-2021-21263']
Query Binding Exploitation
### Description Laravel versions <6.20.12, <7.30.3 & <8.22.1 contain a query binding exploitation. If a request is crafted where a field that is normally a non-array value is an array, and that input is not validated or cast to its expected type before being passed to the query builder, an unexpected number of query bindings can be added to the query. In some situations, this will simply lead to no results being returned by the query builder; however, it is possible certain queries could be affected in a way that causes the query to return unexpected results. This vulnerability was discovered by Tim Groenevelt (tim.g@foodbyus.com). ### References - https://github.com/laravel/framework/pull/35865
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.22.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.30.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.22.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-3p32-j457-pg5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21263'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/pull/35865'}, {'type': 'WEB', 'url': 'https://blog.laravel.com/security-laravel-62011-7302-8221-released'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framework'}]
{'cwe_ids': ['CWE-74', 'CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-19T19:36:31Z', 'nvd_published_at': '2021-01-19T20:15:00Z'}
1.4.0
GHSA-2hw7-mxvj-m455
2021-01-27T23:26:39Z
2021-01-29T18:13:52Z
null
['CVE-2021-3223']
Path traversal in Node-RED-Dashboard
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-red-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/issues/669'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/node-red-dashboard'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-27T23:26:39Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}
1.4.0
GHSA-h96f-fc7c-9r55
2021-01-06T19:25:24Z
2021-01-06T19:25:46Z
null
[]
Regex denial of service vulnerability in codesample plugin
### Impact A regex denial of service (ReDoS) vulnerability was discovered in a dependency of the `codesample` plugin. The vulnerability allowed poorly formed ruby code samples to lock up the browser while performing syntax highlighting. This impacts users of the `codesample` plugin using TinyMCE 5.5.1 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.6.0 by upgrading to a version of the dependency without the vulnerability. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.6.0 or higher - Disable the `codesample` plugin - Disable ruby code samples using the [codesample_languages](https://www.tiny.cloud/docs/plugins/opensource/codesample/#exampleusingcodesample_languages) setting - Override the PrismJS syntax highlighter to version 1.21.0 or higher using the [codesample_global_prismjs](https://www.tiny.cloud/docs/plugins/opensource/codesample/#codesample_global_prismjs) setting ### Acknowledgements Tiny Technologies would like to thank Erik Krogh Kristensen at GitHub for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](http://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
[]
[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-h96f-fc7c-9r55'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes'}]
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-01-06T19:25:24Z', 'nvd_published_at': None}
1.4.0
GHSA-9qmh-276g-x5pj
2023-09-11T22:48:36Z
2021-01-20T21:27:56Z
null
['CVE-2020-28477']
Prototype Pollution in immer
## Overview Affected versions of immer are vulnerable to Prototype Pollution. ## Proof of exploit ```js const {applyPatches, enablePatches} = require("immer"); enablePatches(); let obj = {}; console.log("Before : " + obj.polluted); applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]); // applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]); console.log("After : " + obj.polluted); ``` ## Remediation Version 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'immer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28477'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/issues/738'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMER-1019369'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/immer'}]
{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-01-20T19:37:58Z', 'nvd_published_at': '2021-01-19T11:15:00Z'}
1.4.0
GHSA-32wx-4gxx-h48f
2021-01-26T03:45:41Z
2021-01-29T18:13:32Z
null
[]
Users can edit the tags of any discussion
This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020. ### Impact This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API. Users were able to remove any existing tag, and add any tag in which they are allowed to create discussions. The chosen tags still had to match the configured Tags minimums and maximums. By moving the discussion to new tags, users were able to go around permissions applied to restricted tags. Depending on the setup, this can include publicly exposing content that was only visible to certain groups, or gain the ability to interact with content where such interaction was limited. The full impact varies depending on the configuration of permissions and restricted tags, and which community extensions are being used. All tag-scoped permissions offered by extensions are impacted by this ability to go around them. Forums that don't use restricted tags and don't use any extension that relies on tags for access control should not see any security impact. An update is still required to stop users from being able to change any discussion's tags. Forums that don't use the Tags extension are unaffected. ### Patches The fix will be available in version v0.1.0-beta.14 with Flarum beta 14. The fix has already been back-ported to Flarum beta 13 as version v0.1.0-beta.13.2 of the Tags extension. ### Workarounds Version v0.1.0-beta.13.2 of the Tags extension allows existing Flarum beta 13 forums to fix the issue without the need to update to beta 14. Forums that have not yet updated to Flarum beta 13 are encouraged to update as soon as possible. ### References - [Release announcement](https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132) - [GitHub issue](https://github.com/flarum/core/issues/2355) ### For more information If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support). If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/tags'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0-beta.13.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.0-beta.13'}}]
[{'type': 'WEB', 'url': 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f'}, {'type': 'WEB', 'url': 'https://github.com/flarum/core/issues/2355'}, {'type': 'WEB', 'url': 'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'}, {'type': 'WEB', 'url': 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/flarum/tags'}]
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-01-26T03:45:41Z', 'nvd_published_at': None}
1.4.0
GHSA-fvx8-v524-8579
2023-08-30T21:23:58Z
2021-06-04T21:46:52Z
null
['CVE-2020-17495']
django-celery-results Stores Sensitive Information In Cleartext
django-celery-results prior to 2.4.0 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database. In version 2.4.0 this is no longer the default behaviour but can be re-enabled with the `result_extended` flag in which case care should be taken to ensure any sensitive variables are scrubbed - see [here](https://github.com/celery/django-celery-results/issues/154#issuecomment-734706270) for an example.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-celery-results'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17495'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/issues/142'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/issues/154'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/pull/316'}, {'type': 'WEB', 'url': 'https://github.com/celery/django-celery-results/pull/316/commits/f4af2810dd2f70718a757f733b43225527f6aa3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/celery/django-celery-results'}]
{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:40:19Z', 'nvd_published_at': '2020-08-11T21:15:00Z'}
1.4.0
GHSA-9699-gm7f-cmjv
2021-06-04T18:57:52Z
2021-06-08T22:29:46Z
null
['CVE-2020-25724']
Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0-beta-2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0-beta-1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25724'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2020-25724'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1899354'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210702-0003/'}]
{'cwe_ids': ['CWE-567'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:34:48Z', 'nvd_published_at': '2021-05-26T21:15:00Z'}
1.4.0
GHSA-8fxc-qm65-vpxg
2021-06-03T21:08:32Z
2021-06-08T19:23:22Z
null
['CVE-2017-8761']
Temporary urls leaked via logging
In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8761'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/swift/+bug/1685798/comments/18'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1685798'}]
{'cwe_ids': ['CWE-117', 'CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:08:32Z', 'nvd_published_at': '2021-06-02T14:15:00Z'}
1.4.0
GHSA-wqvq-5m8c-6g24
2023-09-05T18:05:33Z
2021-06-18T18:46:43Z
null
['CVE-2020-26137']
CRLF injection in urllib3
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of `putrequest()`. NOTE: this is similar to CVE-2020-26116.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26137'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/pull/1800'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue39603'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4570-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T22:13:47Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}
1.4.0
GHSA-2x7v-w2mv-f3rx
2021-05-19T19:44:33Z
2021-06-16T17:23:12Z
null
['CVE-2021-26077']
Improper Authentication in Atlassian Connect Spring Boot
Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.atlassian.connect:atlassian-connect-spring-boot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.atlassian.connect:atlassian-connect-spring-boot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.4'}, {'fixed': '2.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26077'}, {'type': 'WEB', 'url': 'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072'}, {'type': 'WEB', 'url': 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:44:33Z', 'nvd_published_at': '2021-05-10T00:15:00Z'}
1.4.0
GHSA-hpr6-f4vq-mxch
2022-07-26T20:09:36Z
2021-06-18T18:38:00Z
null
['CVE-2021-32090']
Command injection in LocalStack
The dashboard component of StackLift LocalStack allows attackers to inject arbitrary shell commands via the functionName parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'localstack'}, 'ecosystem_specific': {'affected_functions': ['localstack.dashboard.infra.get_lambda_code', 'localstack.utils.bootstrap.run']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32090'}, {'type': 'WEB', 'url': 'https://github.com/localstack/localstack/commit/01cd169ae5d077693d4c1a4679a95e30b8d44d54'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/hack-the-stack-with-localstack'}, {'type': 'PACKAGE', 'url': 'https://github.com/localstack/localstack'}, {'type': 'WEB', 'url': 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:58:03Z', 'nvd_published_at': '2021-05-07T05:15:00Z'}
1.4.0
GHSA-qm58-cvvm-c5qr
2022-08-11T00:02:52Z
2021-06-15T15:51:02Z
null
['CVE-2021-23394']
elFinder unsafe upload filtering leading to remote code execution
### Impact Before elFinder 2.1.58, the upload filter did not disallow the upload of `.phar` files. As several Linux distributions are now shipping Apache configured in a way it will process these files as PHP scripts, attackers could gain arbitrary code execution on the server hosting the PHP connector (even in minimal configuration). ### Patches The issue has been addressed with https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1, associating `.phar` files to the right MIME type. Unless explicitly allowed in the configuration, such files cannot be uploaded anymore. This patch is part of the last release of elFinder, 2.1.58. ### Workarounds If you can't update to 2.1.58, make sure your connector is not exposed without authentication. ### Important tips Server-side scripts can often be created as text files. Currently, elFinder has an appropriate MIME type set for file extensions that are generally runnable on a web server. However, the server has various settings. In some cases, the executable file may be judged as "text/plain". Therefore, elFinder installers should understand the extensions that can be executed on the web server where elFinder is installed, and check if there are any missing items in the elFinder settings. The elFinder PHP connector has an option "additionalMimeMap" that specifies the MIME type for each extension. See [#3295(comment)](https://github.com/Studio-42/elFinder/issues/3295#issuecomment-853042139) for more information. ### References - https://snyk.io/vuln/composer:studio-42%2Felfinder - https://github.com/Studio-42/elFinder/issues/3295 - Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to support [at] snyk.io or vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.58'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23394'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/issues/3295'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Studio-42/elFinder'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T22:14:26Z', 'nvd_published_at': '2021-06-13T11:15:00Z'}
1.4.0
GHSA-33rv-m2gp-mm2r
2021-05-20T21:34:56Z
2021-06-21T17:18:29Z
null
['CVE-2021-25927']
Prototype pollution in safe-flat
Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'safe-flat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927'}, {'type': 'WEB', 'url': 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:34:56Z', 'nvd_published_at': '2021-04-26T11:15:00Z'}
1.4.0
GHSA-rmrm-75hp-phr2
2021-05-11T17:51:21Z
2021-06-04T21:36:34Z
null
['CVE-2020-10693']
Improper Input Validation in Hibernate Validator
A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hibernate.validator:hibernate-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0.Final'}, {'fixed': '6.1.5.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.4.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.hibernate.validator:hibernate-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.20.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.19.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10693'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.ibm.com/support/pages/node/6348216'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:51:21Z', 'nvd_published_at': '2020-05-06T14:15:00Z'}
1.4.0
GHSA-xfrw-hxr5-ghqf
2021-06-18T20:32:37Z
2021-06-17T20:10:42Z
null
['CVE-2021-32681']
Cross-site Scripting in wagtail
### Impact When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin). ### Patches Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch). Site implementors who wish to retain the existing behaviour of allowing editors to insert HTML content in these blocks (and are willing to accept the risk of untrusted editors inserting arbitrary code) may disable the escaping by surrounding the relevant `{% include_block %}` tag in `{% autoescape off %}...{% endautoescape %}`. ### Workarounds Site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`. ### Acknowledgements Many thanks to Karen Tracey for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12'}, {'fixed': '2.12.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13'}, {'fixed': '2.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xfrw-hxr5-ghqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32681'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.11.8'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.12.5'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/releases/tag/v2.13.2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:56:56Z', 'nvd_published_at': '2021-06-17T17:15:00Z'}
1.4.0
GHSA-qxg5-2qff-p49r
2021-06-18T19:31:21Z
2021-06-18T19:31:35Z
null
['CVE-2021-32696']
Passing in a non-string 'html' argument can lead to unsanitized output
A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. ### Impact XSS ### Patches `3.2.0` ### Workarounds Ensure that the `html` parameter is a string before calling the function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'striptags'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696'}, {'type': 'WEB', 'url': 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'}, {'type': 'WEB', 'url': 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/striptags'}]
{'cwe_ids': ['CWE-241', 'CWE-79', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T19:31:21Z', 'nvd_published_at': '2021-06-18T20:15:00Z'}
1.4.0
GHSA-gg96-f8wr-p89f
2021-06-04T19:22:48Z
2021-06-04T19:09:26Z
null
['CVE-2021-32661']
Script injection
### Impact A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. ### Patches The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-techdocs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32661'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03'}]
{'cwe_ids': ['CWE-434', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:02:21Z', 'nvd_published_at': '2021-06-03T18:15:00Z'}
1.4.0
GHSA-8vfw-v2jv-9hwc
2021-06-24T19:39:30Z
2021-06-28T16:52:45Z
null
[]
Reflected cross-site scripting in development mode handler in Vaadin
URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser. - https://vaadin.com/security/cve-2021-33604
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '6.0.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.9'}}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-8vfw-v2jv-9hwc'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33604'}]
{'cwe_ids': ['CWE-172'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:39:30Z', 'nvd_published_at': None}
1.4.0
GHSA-gff3-739c-gxfq
2021-06-09T20:39:24Z
2021-06-10T17:22:59Z
null
['CVE-2021-32670']
Reflected cross-site scripting issue in Datasette
Datasette is an open source multi-tool for exploring and publishing data. The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. Datasette 0.57 and 0.56.1 both include patches for this issue. If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'datasette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.56.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32670'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette/issues/1360'}, {'type': 'WEB', 'url': 'https://datasette.io/plugins/datasette-auth-passwords'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks'}, {'type': 'WEB', 'url': 'https://pypi.org/project/datasette/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T20:39:24Z', 'nvd_published_at': '2021-06-07T22:15:00Z'}
1.4.0
GHSA-ww39-953v-wcq6
2022-08-02T21:17:45Z
2021-06-07T21:56:34Z
null
['CVE-2020-28469']
glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'glob-parent'}, 'ecosystem_specific': {'affected_functions': ['globParent']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28469'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/pull/36/commits/c6db86422a9731d4f3d332ce4a81c27ea6b0ee46'}, {'type': 'PACKAGE', 'url': 'https://github.com/gulpjs/glob-parent'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:30:45Z', 'nvd_published_at': '2021-06-03T16:15:00Z'}
1.4.0
GHSA-7grw-6pjh-jpc9
2022-02-08T21:22:18Z
2021-06-15T15:54:29Z
null
['CVE-2021-31812']
Infinite Loop in Apache PDFBox
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31812'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e%40%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf251f6c358087107f8c23473468b279d59d50a75db6b4768165c78d3@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/12/1'}]
{'cwe_ids': ['CWE-834', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:41:33Z', 'nvd_published_at': '2021-06-12T10:15:00Z'}
1.4.0
GHSA-gwcr-j4wh-j3cq
2022-02-08T21:23:08Z
2021-06-10T15:43:22Z
null
['CVE-2021-28169']
Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability
Requests to the `ConcatServlet` and `WelcomeFilter` are able to access protected resources within the `WEB-INF` directory. For example a request to the `ConcatServlet` with a URI of `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. This occurs because both `ConcatServlet` and `WelcomeFilter` decode the supplied path to verify it is not within the `WEB-INF` or `META-INF` directories. It then uses this decoded path to call `RequestDispatcher` which will also do decoding of the path. This double decoding allows paths with a doubly encoded `WEB-INF` to bypass this security check. ### Impact This affects all versions of `ConcatServlet` and `WelcomeFilter` in versions before 9.4.41, 10.0.3 and 11.0.3. ### Workarounds If you cannot update to the latest version of Jetty, you can instead deploy your own version of the [`ConcatServlet`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/ConcatServlet.java) and/or the [`WelcomeFilter`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/WelcomeFilter.java) by using the code from the latest version of Jetty.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-servlets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.41'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.40'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-servlets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-servlets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28169'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04a4b4553a23aff26f42635a6ae388c3b162aab30a88d12e59d05168@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r234f6452297065636356f43654cdacef565b8f9ceb0e0c07ffb8c73b@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r284de9c5399486dfff12ab9e7323ca720dd7019a9a3e11c8510a7140@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r29678972c3f8164b151fd7a5802785d402e530c09870a82ffc7681a4@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91e34ff61aff8fd25a3f2a21539597c6ef7589a31c199b0a9546477c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1292d30462b9baedea7c5d9594fc75990d9aa0ec223b48054ca9c25@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5b52362f5edf98e0dcab6541a381f571cccc05ad9188e793af688f3@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00017.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0009/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T20:02:50Z', 'nvd_published_at': '2021-06-09T02:15:00Z'}
1.4.0
GHSA-2h3j-m7gr-25xj
2021-10-21T17:32:03Z
2021-06-16T17:56:46Z
null
['CVE-2021-27807']
Excessive Iteration Denial of Service in Apache PDFBox
A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27807'}, {'type': 'WEB', 'url': 'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pdfbox'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/PDFBOX-4892'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/'}, {'type': 'WEB', 'url': 'https://svn.apache.org/viewvc?view=revision&revision=1886911'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/19/9'}]
{'cwe_ids': ['CWE-834'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T18:45:15Z', 'nvd_published_at': '2021-03-19T16:15:00Z'}
1.4.0
GHSA-243q-g9j3-qf6r
2021-06-24T19:31:03Z
2021-06-28T18:21:01Z
null
[]
non-admin users can create integration role with administrator role
### Impact non-admin users can create integration role with administrator role ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-243q-g9j3-qf6r'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:31:03Z', 'nvd_published_at': None}
1.4.0
GHSA-8ch4-58qp-g3mp
2022-04-22T15:47:43Z
2021-06-11T17:43:14Z
null
['CVE-2021-33880']
Observable Timing Discrepancy in aaugustin websockets library
The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepancy on servers when HTTP Basic Authentication is enabled with basic_auth_protocol_factory(credentials=...). An attacker may be able to guess a password via a timing attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'websockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33880'}, {'type': 'WEB', 'url': 'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0'}, {'type': 'PACKAGE', 'url': 'https://github.com/aaugustin/websockets/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T16:24:45Z', 'nvd_published_at': '2021-06-06T15:15:00Z'}
1.4.0
GHSA-g5j6-r3x9-gf2m
2021-05-14T21:45:06Z
2021-06-18T18:32:20Z
null
['CVE-2020-13258']
Cross-site scripting in Contentful
Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'contentful'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13258'}, {'type': 'WEB', 'url': 'https://github.com/contentful/the-example-app.py/issues/44'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T21:45:06Z', 'nvd_published_at': '2020-05-21T17:15:00Z'}
1.4.0
GHSA-5h26-c766-g93v
2021-08-31T21:05:24Z
2021-06-15T15:59:27Z
null
['CVE-2021-20293']
Cross-Site Scripting
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.0.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.6.0.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20293'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1942819'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0005/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:27:56Z', 'nvd_published_at': '2021-06-10T12:15:00Z'}
1.4.0
GHSA-5qjq-69w6-fg57
2021-06-07T21:05:48Z
2021-06-07T21:48:17Z
null
['CVE-2021-32671']
XSS vulnerability with translator
Flarum's translation system allowed for string inputs to be converted into HTML DOM nodes when rendered. This change was made after v0.1.0-beta.16 (our last beta before v1.0.0) and was not noticed or documented. This allowed for any user to type malicious HTML markup within certain user input fields and have this execute on client browsers. The example which led to the discovery of this vulnerability was in the forum search box. Entering faux-malicious HTML markup, such as <script>alert('test')</script> resulted in an alert box appearing on the forum. This attack could also be modified to perform AJAX requests on behalf of a user, possibly deleting discussions, modifying their settings or profile, or even modifying settings on the Admin panel if the attack was targetted towards a privileged user. ### Impact All Flarum communities that run flarum v1.0.0 or v1.0.1 are impacted. ### Patches The vulnerability has been fixed and published as flarum/core v1.0.2. All communities running Flarum v1.0 have to upgrade as soon as possible to v1.0.2 using: ``` composer update --prefer-dist --no-dev -a -W ``` You can then confirm you run the latest version using: ``` composer show flarum/core ``` ### Workarounds __None.__ ### For more information For any questions or comments on this vulnerability please visit https://discuss.flarum.org/d/27558. For support questions create a discussion at https://discuss.flarum.org/t/support. A reminder that if you ever become aware of a security issue in Flarum, please report it to us privately by emailing security@flarum.org, and we will address it promptly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/flarum/core/security/advisories/GHSA-5qjq-69w6-fg57'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32671'}, {'type': 'WEB', 'url': 'https://github.com/flarum/core/commit/440bed81b8019dff00642c8f493b4909d505a28a'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/flarum/core'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-07T21:05:48Z', 'nvd_published_at': '2021-06-07T22:15:00Z'}
1.4.0
GHSA-fj67-w3m4-rfmp
2021-05-27T22:17:45Z
2021-06-08T23:19:28Z
null
['CVE-2021-33513']
Cross-site scripting in Plone
Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33513'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:17:45Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}
1.4.0
GHSA-jm5c-rv3w-w83m
2021-05-21T21:50:44Z
2021-06-29T21:13:20Z
null
['CVE-2020-26242']
Denial of service in geth
### Impact Denial-of-service (crash) during block processing ### Details Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library. The crash was in the `uint256` library, where a buffer [underflowed](https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L442). if `d == 0`, `dLen` remains `0` and https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2c30/uint256.go#L451 will try to access index `[-1]`. The `uint256` library was first merged in this [commit](https://github.com/ethereum/go-ethereum/commit/cf6674539c589f80031f3371a71c6a80addbe454), on 2020-06-08. Exploiting this vulnerabilty would cause all vulnerable nodes to drop off the network. The issue was brought to our attention through a [bug report](https://github.com/ethereum/go-ethereum/issues/21367), showing a `panic` occurring on sync from genesis on the Ropsten network. It was estimated that the least obvious way to fix this would be to merge the fix into `uint256`, make a new release of that library and then update the geth-dependency. - https://github.com/holiman/uint256/releases/tag/v1.1.1 was made the same day, - PR to address the issue: https://github.com/holiman/uint256/pull/80 - PR to update geth deps: https://github.com/ethereum/go-ethereum/pull/21368 ### Patches Upgrade to v1.9.18 or higher ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.16'}, {'fixed': '1.9.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/holiman/uint256'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26242'}, {'type': 'WEB', 'url': 'https://github.com/holiman/uint256/pull/80'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'}, {'type': 'WEB', 'url': 'https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d'}, {'type': 'WEB', 'url': 'https://blog.ethereum.org/2020/11/12/geth_security_release/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0103'}]
{'cwe_ids': ['CWE-125', 'CWE-191', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:50:44Z', 'nvd_published_at': None}
1.4.0
GHSA-jfvf-rfmq-qwf8
2021-05-25T20:19:02Z
2021-06-22T15:23:21Z
null
['CVE-2019-20789']
Croos-site scripting in Croogo
Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20789'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/940'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/compare/3.0.6...3.0.7'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:19:02Z', 'nvd_published_at': '2020-04-26T17:15:00Z'}
1.4.0
GHSA-35qp-xq9f-2rjx
2021-05-12T21:38:07Z
2021-06-24T20:28:28Z
null
['CVE-2021-3283']
Improper Privilege Management in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3283'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-01-nomad-s-exec-and-java-task-drivers-did-not-isolate-processes/20332'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:38:07Z', 'nvd_published_at': None}
1.4.0
GHSA-mj63-64x7-57xf
2023-08-07T11:19:15Z
2021-06-18T18:43:14Z
null
['CVE-2021-31800']
Path traversal in impacket
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket before 0.9.23. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'impacket'}, 'ecosystem_specific': {'affected_functions': ['impacket.smbserver.findFirst2', 'impacket.smbserver.queryPathInformation', 'impacket.smbserver.SMBCommands.smbComNtCreateAndX']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31800'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/commit/49c643bf66620646884ed141c94e5fdd85bcdd2f'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/commit/99bd29e3995c254e2d6f6c2e3454e4271665955a'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2008'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L2958'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L3485'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/blob/cb6d43a677c338db930bc4e9161620832c1ec624/impacket/smbserver.py#L876'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/releases'}, {'type': 'WEB', 'url': 'https://github.com/SecureAuthCorp/impacket/releases/tag/impacket_0_9_23'}, {'type': 'PACKAGE', 'url': 'https://github.com/fortra/impacket'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPXDPWCAPVX3UWYZ3N2T5OLBSBBUHJP6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRV2C5DATXBHG6TF6CEEX54KZ75THQS3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UF56LYB27LHEIFJTFHU3M75NMNNK2SCG/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:42:46Z', 'nvd_published_at': '2021-05-05T11:15:00Z'}
1.4.0
GHSA-wrqf-rrrw-w3mg
2021-04-05T21:52:53Z
2021-06-16T17:40:47Z
null
['CVE-2021-25646']
Code injection in Apache Druid
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25646'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r121abe8014d381943b63c60615149d40bde9dc1c868bcee90d0d0848@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20e0c3b10ae2c05a3aad40f1476713c45bdefc32c920b9986b941d8f@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4f84b542417ea46202867c0a8b3eaf3b4cfed30e09174a52122ba210@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5ef625076982aee7d23c23f07717e626b73f421fba5154d1e4de15e1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dff4790e7a5c697fc0360adf11f5aeb31cd6ad80644fffee690673c@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87aa94e28dd21ee2252d30c63f01ab9cb5474ee5bdd98dd8d7d734aa@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra4225912f501016bc5e0ac44e14b8d6779173a3a1dc7baacaabcc9ba@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc167d5e57f3120578718a7a458ce3e73b3830ac4efbb1b085bd06b92@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea9436a4063927a567d698431ddae55e760c3f876c22ac5b9813685f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfeb775822cd3baef1595b60f6860f5ca849eb1903236483f3297bd5c@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/01/29/6'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:52:53Z', 'nvd_published_at': '2021-01-29T20:15:00Z'}
1.4.0
GHSA-24wf-7vf2-pv59
2021-06-25T13:06:33Z
2021-06-28T16:38:29Z
null
['CVE-2021-29620']
XXE vulnerability on Launch import with externally-defined DTD file
### Impact Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. ### Patches Fixed with: https://github.com/reportportal/service-api/pull/1392 ### Binaries `docker pull reportportal/service-api:5.4.0` https://github.com/reportportal/service-api/packages/846871?version=5.4.0 ### For more information If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '5.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29620'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/pull/1392'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T13:06:33Z', 'nvd_published_at': '2021-06-23T18:15:00Z'}
1.4.0
GHSA-rcp4-jm2v-mr3f
2021-05-28T18:38:54Z
2021-06-08T23:10:24Z
null
['CVE-2021-33561']
Cross-site scripting in Shopizer
A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:shopizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33561'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49901'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:38:54Z', 'nvd_published_at': '2021-05-24T23:15:00Z'}
1.4.0
GHSA-gc9g-67cq-p7v4
2021-05-27T21:47:01Z
2021-06-15T16:12:04Z
null
['CVE-2021-33511']
Server-Side Request Forgery in Plone
Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity TTW schemas, and modeleditors in plone.app.theming, plone.app.dexterity, and plone.supermodel.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33511'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-lxml-parser'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:47:01Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}
1.4.0
GHSA-9gwx-9cwp-5c2m
2021-10-21T13:40:37Z
2021-06-17T20:11:35Z
null
['CVE-2021-32623']
Billion laughs attack (XML bomb)
### Impact Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. Consider an XML file (`createMediaPackage.xml`) like this: ```xml <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <!DOCTYPE lolz [ <!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. "> <!ELEMENT title (#PCDATA)> <!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;"> <!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;"> <!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;"> <!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;"> <!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;"> ]> <mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z"> <title>&lol5;</title> <media/> <metadata/> <attachments/> <publications/> </mediapackage> ``` Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory: ```sh curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \ -F 'mediapackage=<createMediaPackage.xml' \ -F sourceFlavors="" \ -F sourceTags="" \ -F deleteExternal="" \ -F tagsAndFlavor='' \ -o out.xml ``` Additional notes: - You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text. - Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system. - To exploit this, users need to have ingest privileges, limiting the group of potential attackers ### Patches The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch. ### Workarounds There is no known workaround for this issue. ### References - [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack) - For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________ ### For more information If you have any questions or comments about this advisory: - Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) - Email us at [security@opencast.org](mailto:security@opencast.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencast/opencast'}]
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:07:19Z', 'nvd_published_at': '2021-06-16T00:15:00Z'}
1.4.0
GHSA-mg2g-8pwj-r2j2
2022-03-15T16:38:13Z
2021-06-10T17:21:33Z
null
['CVE-2020-26136']
Authentication bypass in SilverStripe GraphQL
The GraphQL module accepts basic-auth as an authentication method by default. This can be used to bypass MFA authentication if the silverstripe/mfa module is installed, which is now a commonly installed module. A users password is still required though. Basic-auth has been removed as a default authentication method. If desired, it can be re-enabled by adding it to the authenticators key of a schema, or on SilverStripe\Graphql\Auth\Handler
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha1'}, {'fixed': '4.0.0-alpha2'}]}], 'versions': ['4.0.0-alpha1']}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26136'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2020-26136'}]
{'cwe_ids': ['CWE-287', 'CWE-288'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:41:10Z', 'nvd_published_at': '2021-06-08T20:15:00Z'}
1.4.0
GHSA-c38g-469g-cmgx
2023-02-17T23:46:35Z
2021-06-23T18:14:40Z
null
['CVE-2021-21303']
Improper Neutralization of Special Elements in Output in helm.sh/helm/v3
Since Helm 2 was released, a well-documented aspect of Helm is that the Helm chart's version number MUST follow the SemVer2 specification. In the past, Helm would not permit charts with malformed versions. At some point, a patch was merged that changed this - On a version parse error, the version number was simply passed along as-is. This provided a vector for malicious data to be injected into Helm and potentially used in various ways. Core maintainers were able to send deceptive information to a terminal screen running the `helm` command, as well as obscure or alter information on the screen. In some cases, we could send codes that terminals used to execute higher-order logic, like clearing a terminal screen. Further, during evaluation, the Helm maintainers discovered a few other fields that were not properly sanitized when read out of repository index files. This fix remedies all such cases, and once again enforces SemVer2 policies on version fields. All users of the Helm 3 should upgrade. Those who use Helm as a library should verify that they either sanitize this data on their own, or use the proper Helm API calls to sanitize the data. ### Patches This issue has been resolved in Helm 3.5.2. While this fix does not constitute a breaking change, as all field formatting is now enforced as documented, it is possible that charts that were mistakenly allowed (but invalid) may no longer be available in search indexes. Specifically, **malformed SemVer versions are no longer supported**. This has always been the documented case, but it is true that malformed versions were allowed. Note that this is the first security release since Helm 2's final deprecation. Helm 2 was not audited for vulnerability to this issue, and should be assumed vulnerable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-c38g-469g-cmgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21303'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c38g-469g-cmgx'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.5.2'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1040'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:30:59Z', 'nvd_published_at': '2021-02-05T22:15:00Z'}
1.4.0
GHSA-v9w8-hq92-v39m
2021-03-29T22:34:30Z
2021-06-08T20:10:45Z
null
['CVE-2021-20683']
Cross-site Scripting (XSS) in baserCMS
Improper neutralization of JavaScript input in the blog article editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20683'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/88ccc61e5656b05dd13204d61de706efaa2cd0b1'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN64869876'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN64869876/index.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:34:30Z', 'nvd_published_at': '2021-03-26T09:15:00Z'}
1.4.0
GHSA-9cx9-x2gp-9qvh
2023-02-09T17:46:27Z
2021-06-29T21:24:28Z
null
['CVE-2020-15111']
CRLF vulnerability in Fiber
### Impact The filename that is given in [c.Attachment()](https://docs.gofiber.io/ctx#attachment) is not escaped, and therefore vulnerable for a CRLF injection attack. I.e. an attacker could upload a custom filename and then give the link to the victim. With this filename, the attacker can change the name of the downloaded file, redirect to another site, change the authorization header, etc. ### Steps to reproduce ```go package main import "github.com/gofiber/fiber" const badFileName = "another secret document.pdf\"\r\nLocation: google.com\r\nAuthorization: \"example_of_session_fixation" func splitTheResponse(c *fiber.Ctx) { c.Attachment(badFileName) } func main() { app := fiber.New() app.Get("/attack", splitTheResponse) app.Listen("127.0.0.1:8080") } ``` ``` HTTP/1.1 200 OK Date: Fri, 10 Jul 2020 19:47:04 GMT Content-Type: application/octet-stream Content-Length: 0 Content-Disposition: attachment; filename="another secret document.pdf" Location: google.com Authorization: "example_of_session_fixation" ``` ### Patches This issue has been patched in `v1.12.6` with commit [579](https://github.com/gofiber/fiber/pull/579/commits/f698b5d5066cfe594102ae252cd58a1fe57cf56f) escaping the filename by default. ### Workarounds You could of course serialize the input yourself before passing it to `ctx.Attachment()`, this is actually a good practice by default. But in case you forget, we got you covered 👍 ### References A CRLF injection attack is one of several types of injection attacks. It can be used to escalate to more malicious attacks such as Cross-site Scripting (XSS), page injection, web cache poisoning, cache-based defacement, and more. A CRLF injection vulnerability exists if an attacker can inject the CRLF characters into a web application, for example using a user input form or an HTTP request, [see acunetix](https://www.acunetix.com/websitesecurity/crlf-injection/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [gofiber/fiber](https://github.com/gofiber/fiber) * Join us on [Discord](https://gofiber.io/discord)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gofiber/fiber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gofiber/fiber/security/advisories/GHSA-9cx9-x2gp-9qvh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15111'}, {'type': 'WEB', 'url': 'https://github.com/gofiber/fiber/pull/579'}, {'type': 'WEB', 'url': 'https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f'}, {'type': 'PACKAGE', 'url': 'https://github.com/gofiber/fiber'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0108'}]
{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:14:18Z', 'nvd_published_at': '2020-07-20T18:15:00Z'}
1.4.0
GHSA-jxcc-g75x-qgw9
2023-09-07T20:15:39Z
2021-06-08T18:47:18Z
null
['CVE-2021-23391']
Calipso Arbitrary File Write via Archive Extraction (Zip Slip)
This affects all versions of package calipso. It is possible for a malicious module to overwrite files on an arbitrary file system through the module install functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'calipso'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.54'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23391'}, {'type': 'WEB', 'url': 'https://github.com/cliftonc/calipso'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555'}]
{'cwe_ids': ['CWE-29', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T16:15:33Z', 'nvd_published_at': '2021-06-07T21:15:00Z'}
1.4.0
GHSA-jr9p-r423-9m2r
2023-08-31T16:34:09Z
2021-06-02T21:44:28Z
null
['CVE-2021-26813']
markdown2 Regular Expression Denial of Service
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ecosystem_specific': {'affected_functions': ['markdown2.Markdown.convert']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1.18'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26813'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/pull/387'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY/'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:02:47Z', 'nvd_published_at': '2021-03-03T16:15:00Z'}