schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-v528-7hrm-frqp
2023-02-15T18:39:26Z
2021-06-16T18:03:47Z
null
['CVE-2021-27568']
Improper Check for Unusual or Exceptional Conditions in json-smart
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart-mini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27568'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/60'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/62'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/pull/72'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/netplex/json-smart-v2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:30:13Z', 'nvd_published_at': '2021-02-23T02:15:00Z'}
1.4.0
GHSA-jwhm-9cjm-4493
2023-05-24T14:40:36Z
2021-06-16T17:24:41Z
null
['CVE-2021-21649']
Cross-site Scripting in Jenkins Dashboard View Plugin
Jenkins Dashboard View Plugin prior to 2.16 and 2.12.1 does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission. As part of this fix, the property for image URLs was changed from `url` to `imageUrl`. Existing [Configuration as Code](https://plugins.jenkins.io/configuration-as-code/) configurations are still supported, but exports will emit the new property.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13'}, {'fixed': '2.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21649'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21649.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2233'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:16:07Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-wpgh-hmv4-r3v5
2021-05-20T21:52:15Z
2021-06-21T17:18:20Z
null
['CVE-2021-25928']
Prototype pollution in safe-obj
Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'safe-obj'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25928'}, {'type': 'WEB', 'url': 'https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:52:15Z', 'nvd_published_at': '2021-04-26T11:15:00Z'}
1.4.0
GHSA-vfvf-6gx5-mqv6
2021-06-23T20:38:29Z
2021-06-24T20:16:02Z
null
['CVE-2021-32701']
Incorrect Authorization in ORY Oathkeeper
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/oathkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0-beta.2'}, {'fixed': '0.38.12-beta.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.38.11-beta.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32701'}, {'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/pull/424'}, {'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T20:38:29Z', 'nvd_published_at': '2021-06-22T20:15:00Z'}
1.4.0
GHSA-j858-xp5v-f8xx
2023-08-25T21:02:50Z
2021-06-02T21:42:49Z
null
['CVE-2021-33564']
Dragonfly contains remote code execution vulnerability
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the `verify_url` option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/513'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j858-xp5v-f8xx'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0'}, {'type': 'WEB', 'url': 'https://github.com/mlr0p/CVE-2021-33564'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/dragonfly/CVE-2021-33564.yml'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml'}, {'type': 'WEB', 'url': 'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/'}]
{'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T16:59:54Z', 'nvd_published_at': '2021-05-29T14:15:00Z'}
1.4.0
GHSA-rwv7-3v45-hg29
2021-12-02T15:30:22Z
2021-06-08T18:49:28Z
null
['CVE-2021-25288']
Out-of-bounds Read
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. This dates to Pillow 2.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.Image.open']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '8.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25288'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:36:38Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}
1.4.0
GHSA-r6rj-9ch6-g264
2021-06-16T19:58:45Z
2021-06-07T22:09:26Z
null
['CVE-2021-26707']
Prototype pollution in Merge-deep
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'merge-deep'}, 'ecosystem_specific': {'affected_functions': ['merge-deep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26707'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210716-0008/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/merge-deep'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:48:51Z', 'nvd_published_at': '2021-06-02T15:15:00Z'}
1.4.0
GHSA-r578-pj6f-r4ff
2021-06-16T21:25:21Z
2021-06-21T17:07:47Z
null
['CVE-2021-32691']
Auto-merging Person Records Compromised
### Impact New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). ### Patches We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details. ### Workarounds If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class. ```js create = async (profile) => { const rockUpdateFields = this.mapApollosFieldsToRock(profile); // auto-merge functionality is compromised // we are creating a new user and patching them with profile details const id = await this.post('/People', { Gender: 0, // required by Rock. Listed first so it can be overridden. IsSystem: false, // required by rock }); await this.patch(`/People/${id}`, { ...rockUpdateFields, }); return id; }; ``` ### For more information If you have any questions or comments about this advisory: * Email us at [support@apollos.app](mailto:support@apollos.app)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@apollosproject/data-connector-rock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32691'}, {'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2'}, {'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0'}]
{'cwe_ids': ['CWE-287', 'CWE-303'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T18:55:04Z', 'nvd_published_at': '2021-06-16T22:15:00Z'}
1.4.0
GHSA-mm8j-9x84-m9cv
2021-04-06T21:44:01Z
2021-06-16T17:34:18Z
null
['CVE-2021-23899']
Arbitrary code injection in json-sanitizer
OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mikesamuel:json-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:44:01Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}
1.4.0
GHSA-9hx4-qm7h-x84j
2021-05-20T16:31:56Z
2021-06-29T18:32:53Z
null
['CVE-2014-8683']
Cross-site Scripting in Gogs
Cross-site scripting (XSS) vulnerability in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.8 allows remote attackers to inject arbitrary web script or HTML via the text parameter to api/v1/markdown.
[]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8683'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98693'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://gogs.io/docs/intro/change_log.html'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/34'}, {'type': 'WEB', 'url': 'https://www.securityfocus.com/archive/1/533996/100/0/threaded'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:31:56Z', 'nvd_published_at': None}
1.4.0
GHSA-6rg3-8h8x-5xfv
2021-10-05T17:24:11Z
2021-06-23T18:04:50Z
null
[]
Unchecked hostname resolution could allow access to local network resources by users outside the local network
### Impact A newly implemented route allowing users to download files from remote endpoints was not properly verifying the destination hostname for user provided URLs. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. This vulnerability requires valid authentication credentials and is therefore **not exploitable by unauthenticated users**. If you are running an instance for yourself or other trusted individuals this impact is unlikely to be of major concern to you. However, you should still upgrade for security sake. ### Patches Users should upgrade to the latest version of Wings. ### Workarounds There is no workaround available that does not involve modifying Panel or Wings code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}]
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}]
{'cwe_ids': ['CWE-284', 'CWE-441'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T18:04:30Z', 'nvd_published_at': None}
1.4.0
GHSA-cjjc-xp8v-855w
2023-08-30T00:21:00Z
2021-06-23T18:02:39Z
null
['CVE-2020-7919']
Helm uses crypto package vulnerable to panic from malformed X.509 certificate
The Helm core maintainers have identified a high severity security vulnerability in Go's `crypto` package affecting all versions prior to Helm 2.16.8 and Helm 3.1.0. Thanks to @ravin9249 for identifying the vulnerability. ### Impact Go before 1.12.16 and 1.13.x before 1.13.7 (and the `crypto/cryptobyte` package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients resulting in a panic via a malformed X.509 certificate. This may allow a remote attacker to cause a denial of service. ### Patches A patch to compile Helm against Go 1.14.4 has been provided for Helm 2 and is available in Helm 2.16.8. Helm 3.1.0 and newer are compiled against Go 1.13.7+. ### Workarounds No workaround is available. Users are urged to upgrade. ### References - https://nvd.nist.gov/vuln/detail/CVE-2020-7919 - https://github.com/helm/helm/pull/8288 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Helm repository](https://github.com/helm/helm/issues) * For security-specific issues, email us at <cncf-helm-security@lists.cncf.io>
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/helm/helm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/helm/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20200124225646-8b5121be2f68'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7919'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://go.dev/cl/216677'}, {'type': 'WEB', 'url': 'https://go.dev/cl/216680'}, {'type': 'WEB', 'url': 'https://go.dev/issue/36837'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/golang-announce'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/Hsw4mHYc470'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/Hsw4mHYc470'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0229'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4848'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T22:07:33Z', 'nvd_published_at': '2020-03-16T21:15:00Z'}
1.4.0
GHSA-fg5w-w99f-rj6w
2022-06-29T20:41:05Z
2021-06-08T23:15:35Z
null
['CVE-2021-29300']
Command Injection in @ronomon/opened
The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@ronomon/opened'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300'}, {'type': 'WEB', 'url': 'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4775'}, {'type': 'PACKAGE', 'url': 'https://github.com/ronomon/opened'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T16:56:53Z', 'nvd_published_at': '2021-05-24T16:15:00Z'}
1.4.0
GHSA-mh82-55cm-6gfh
2022-06-29T20:42:39Z
2021-06-08T23:16:03Z
null
['CVE-2021-25945']
Prototype pollution vulnerability in js-extend
Prototype pollution vulnerability in 'js-extend' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25945'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmattos/js-extend'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25945'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T23:04:49Z', 'nvd_published_at': '2021-05-26T15:15:00Z'}
1.4.0
GHSA-p55x-7x9v-q8m4
2021-05-20T20:59:20Z
2021-06-29T21:45:07Z
null
['CVE-2017-15133']
Denial of Service in miekg-dns
A denial of service flaw was found in miekg-dns before 1.0.4. A remote attacker could use carefully timed TCP packets to block the DNS server from accepting new connections.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/miekg/dns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15133'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/issues/627'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/pull/631'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1538763'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0006'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:59:20Z', 'nvd_published_at': None}
1.4.0
GHSA-m45g-f45x-vv22
2021-05-20T21:19:40Z
2021-06-23T17:20:38Z
null
['CVE-2021-31232']
Improper input validation in CNCF Cortex
The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31232'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/pull/4129/files'}, {'type': 'WEB', 'url': 'https://community.grafana.com/c/security-announcements'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex'}, {'type': 'WEB', 'url': 'https://lists.cncf.io/g/cortex-users/message/50'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:19:40Z', 'nvd_published_at': '2021-04-30T13:15:00Z'}
1.4.0
GHSA-c56f-grv3-gpfr
2021-06-02T19:27:50Z
2021-06-07T22:10:13Z
null
['CVE-2021-23388']
Regular expression denial of service in forms
The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'forms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23388'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/pull/214'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FORMS-1296389'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:27:50Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-gxcm-36qw-j29v
2021-05-07T16:03:29Z
2021-06-08T20:12:02Z
null
['CVE-2021-27672']
SQL Injection in tribalsystems/zenario
SQL Injection in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the "cID" parameter when creating a new HTML component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.53370'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27672'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}, {'type': 'WEB', 'url': 'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T16:03:29Z', 'nvd_published_at': '2021-04-15T14:15:00Z'}
1.4.0
GHSA-px9f-597f-wmcf
2021-03-26T23:09:59Z
2021-06-16T17:43:36Z
null
['CVE-2021-27576']
Uncontrolled Resource Consumption in Apache OpenMeetings server
If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27576'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2551'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E'}, {'type': 'WEB', 'url': 'https://openmeetings.apache.org/security.html#cve-2021-27576---apache-openmeetings-bandwidth-can'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T23:09:59Z', 'nvd_published_at': '2021-03-15T09:15:00Z'}
1.4.0
GHSA-49q3-8867-5wmp
2021-06-08T15:31:31Z
2021-06-08T18:47:06Z
null
['CVE-2021-32673']
Remote Command Execution in reg-keygen-git-hash-plugin
### Impact `reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands. ### Patches Upgrade to version 0.10.16 or later. ### For more information If you have any questions or comments about this advisory: - Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-suit)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'reg-keygen-git-hash-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32673'}, {'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'}, {'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/releases/tag/v0.10.16'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin'}]
{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T15:31:31Z', 'nvd_published_at': '2021-06-08T17:15:00Z'}
1.4.0
GHSA-29qj-rvv6-qrmv
2021-06-01T20:09:20Z
2021-06-15T16:05:22Z
null
['CVE-2020-10688']
Cross-site scripting in RESTEasy
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10688'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/issues/7248'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1814974'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-2519'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0008/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:09:20Z', 'nvd_published_at': '2021-05-27T19:15:00Z'}
1.4.0
GHSA-2f88-5hg8-9x2x
2023-08-15T17:39:29Z
2021-06-16T17:32:49Z
null
['CVE-2021-26291']
Origin Validation Error in Apache Maven
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven:maven-compat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven:maven-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26291'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven/commit/899465aeec03753ea91e15a79579eab76369c016'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven/commit/fa79cb22e456cc65522b5bab8c4240fe08c5775f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/maven'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MNG-7116'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MNG-7117'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0556ce5db7231025785477739ee416b169d8aff5ee9bac7854d64736@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06db4057b74e0598a412734f693a34a8836ac6f06d16d139e5e1027c@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07a89b32783f73bda6903c1f9aadeb859e5bef0a4daed6d87db8e4a9@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a401f8c98a99f68d061fde6e6659d695f28d60fe4f0413bcb355b0@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a5e4ff2a7ca7ad8595d7683afbaeb3b8788ba974681907f97e7dc8e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d083314aa3934dd4b6e6970d1f6ee50f6eaa9d867deb2cd96788478@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30e9fcba679d164158cc26236704c351954909c18cb2485d11038aa6@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r340e75c9bb6e8661b89e1cf2c52f4638a18312e57bd884722bc28f52@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r39fa6ec4b7e912d3e04ea68efd23e554ec9c8efa2c96f5b45104fc61@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f0450dcab7e63b5f233ccfbc6fca5f1867a75c8aa2493ea82732381@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r52c6cda14dc6315dc79e72d30109f4589e9c6300ef6dc1a019da32d4@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r53cd5de57aaa126038c5301d8f518f3defab3c5b1c7e17c97bad08d8@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5ae6aaa8a2ce86145225c3516bb45d315c0454e3765d651527e5df8a@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71bc13669be84c2ff45b74a67929bc2da905c152e12a39b406e3c2a0@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7212b874e575e59d648980d91bc22e684906aee9b211ab92da9591f5@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74329c671df713f61ae4620ee2452a0443ccad7f33c60e8ed7d21ff9@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78fb6d2cf0ca332cfa43abd4471e75fa6c517ed9cdfcb950bff48d40@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86aebd0387ae19b740b3eb28bad83fe6aceca0d6257eaa810a6e0002@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86e1c81e03f441855f127980e9b3d41939d04a7caea2b7ab718e2288@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96cc126d3ee9aa42af9d3bb4baa94828b0a5f656584a50dcc594125f@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00%40%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00@%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra88a0eba7f84658cefcecc0143fd8bbad52c229ee5dfcbfdde7b6457@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9d984eccfd2ae7726671e025f0296bf03786e5cdf872138110ac29b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7ae2530063d1cd1cf8e9fa130d10940760f927168d4063d23b8cd0a@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd6c3a36f1dbc130da1b89d0f320db7040de71661a512695a8d513ac@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re75f8b3dbc5faa1640908f87e644d373e00f8b4e6ba3e2ba4bd2c80b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red3bf6cbfd99e36b0c0a4fa1cea1eef1eb300c6bd8f372f497341265@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://maven.apache.org/docs/3.8.1/release-notes.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/23/5'}]
{'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T22:21:03Z', 'nvd_published_at': '2021-04-23T15:15:00Z'}
1.4.0
GHSA-7gfg-6934-mqq2
2023-02-14T00:18:06Z
2021-06-29T21:34:57Z
null
['CVE-2019-20786']
Improper Authenication in Pion DTLS
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20786'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/compare/v1.5.1...v1.5.2'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0038'}, {'type': 'WEB', 'url': 'https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean'}, {'type': 'WEB', 'url': 'https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:54:18Z', 'nvd_published_at': None}
1.4.0
GHSA-x3wr-v4wx-5qpc
2022-06-29T20:41:54Z
2021-06-21T17:14:01Z
null
['CVE-2021-25948']
Prototype Pollution
Prototype pollution vulnerability in ‘expand-hash’ versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'expand-hash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25948'}, {'type': 'PACKAGE', 'url': 'https://github.com/doowb/expand-hash'}, {'type': 'WEB', 'url': 'https://github.com/doowb/expand-hash/blob/556913f6c2f05848110b5b8261cfc78e5ce3dc77/index.js#L19'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:29:17Z', 'nvd_published_at': '2021-06-10T12:15:00Z'}
1.4.0
GHSA-339j-hqgx-qrrx
2023-08-08T19:57:23Z
2021-06-21T17:13:06Z
null
['CVE-2021-23395']
Prototype Pollution in nedb
This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'nedb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23395'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NEDB-1305279'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:12:32Z', 'nvd_published_at': '2021-06-15T20:15:00Z'}
1.4.0
GHSA-pwhf-39xg-4rxw
2021-06-04T19:23:33Z
2021-06-04T19:09:35Z
null
['CVE-2021-32660']
Script injection
### Impact A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. ### Patches The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@backstage/techdocs-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03'}]
{'cwe_ids': ['CWE-434', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:02:53Z', 'nvd_published_at': '2021-06-03T17:15:00Z'}
1.4.0
GHSA-jmgg-wx67-7qfv
2021-05-20T22:17:17Z
2021-06-22T15:23:33Z
null
['CVE-2020-13252']
Command Injection in Centreon
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.04.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13252'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/8467'}, {'type': 'WEB', 'url': 'https://engindemirbilek.github.io/centreon-19.10-rce'}, {'type': 'WEB', 'url': 'https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/centreon-19.10-rce.html'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/compare/19.04.13...19.04.15'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:17:17Z', 'nvd_published_at': '2020-05-21T04:15:00Z'}
1.4.0
GHSA-qrg9-f472-qwfm
2021-06-24T19:46:19Z
2021-06-28T16:55:58Z
null
['CVE-2021-31412']
Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19
Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided. - https://vaadin.com/security/cve-2021-31412
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 14.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '19.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.8'}}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-qrg9-f472-qwfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31412'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/11107'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31412'}]
{'cwe_ids': ['CWE-1295', 'CWE-20', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:46:19Z', 'nvd_published_at': '2021-06-24T12:15:00Z'}
1.4.0
GHSA-67f6-c8mx-4q2m
2021-05-19T19:47:05Z
2021-06-16T17:21:11Z
null
['CVE-2021-32053']
Uncontrolled Resource Consumption in JPA Server in HAPI FHIR
JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:hapi-fhir-jpaserver-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32053'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/hapi-fhir/issues/2641'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/hapi-fhir/pull/2642'}, {'type': 'WEB', 'url': 'https://hapifhir.io'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:47:05Z', 'nvd_published_at': '2021-05-10T21:15:00Z'}
1.4.0
GHSA-xpxm-pf7g-2534
2021-05-03T16:41:32Z
2021-06-08T20:11:52Z
null
['CVE-2021-31778']
Cross-site scripting in media2click
The media2click (aka 2 Clicks for External Media) extension 1.x before 1.3.3 for TYPO3 allows XSS by a backend user account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'amazing/media2click'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31778'}, {'type': 'WEB', 'url': 'https://github.com/ghermens/media2click/commit/3c4e413fbc7d35c47212e754c24d5070637a11a3'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/amazing/media2click'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-004'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T16:41:32Z', 'nvd_published_at': '2021-04-28T07:15:00Z'}
1.4.0
GHSA-g7w8-pp9w-7p32
2021-10-05T17:26:03Z
2021-06-28T16:57:32Z
null
[]
Creation of order credits was not validated by acl in admin orders
### Impact Creation of order credits was not validated by ACL in admin orders ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/download/#shopware-6'}]
{'cwe_ids': ['CWE-306'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:19:59Z', 'nvd_published_at': None}
1.4.0
GHSA-jq42-hfch-42f3
2021-10-05T17:22:08Z
2021-06-01T21:20:53Z
null
[]
Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint
# Impact Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. # Patches All users should upgrade to Singularity 3.7.4 or later. # Workarounds Users who only interact with the default remote endpoint or do not use the library:// url are not affected. Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected. # Acknowledgements This issue was found by Mike Frisch and brought to our attention by Sylabs. Sylabs is making a [coordinated disclosure](https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394). # For more information General questions about the impact of the advisory can be asked in the: [Singularity Slack Channel](https://join.slack.com/t/hpcng/shared_invite/zt-qda4h1ls-OP0Uouq6sSmVE6i_0NrWdw) [Singularity Mailing List](https://groups.google.com/a/lbl.gov/g/singularity) Any sensitive security concerns should be directed to: [singularity-security@hpcng.org](mailto:singularity-security@hpcng.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hpcng/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.2'}, {'fixed': '3.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394'}, {'type': 'PACKAGE', 'url': 'https://github.com/hpcng/singularity'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T20:04:38Z', 'nvd_published_at': None}
1.4.0
GHSA-px4h-xg32-q955
2021-10-27T17:04:15Z
2021-06-08T23:11:43Z
null
['CVE-2021-33502']
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33502'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/normalize-url'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0001/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T17:56:25Z', 'nvd_published_at': '2021-05-24T16:15:00Z'}
1.4.0
GHSA-7r96-8g3x-g36m
2022-01-04T19:36:52Z
2021-06-28T17:16:56Z
null
[]
Improper Verification of Cryptographic Signature
### Impact The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid. ### Patches Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verification method, the previous signatures are still valid. We highly recommend reverifying any signatures that were previously verified with the vulnerable `verifyWithMessage` method. ### Workarounds In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. For example, the return statement should start with `return this.verify(signed, password).verified && ` instead of `return this.verify(signed, password) && `. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/TogaTech/tEnvoy](https://github.com/TogaTech/tEnvoy)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tenvoy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'}, {'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'}, {'type': 'PACKAGE', 'url': 'https://github.com/TogaTech/tEnvoy'}]
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:14:25Z', 'nvd_published_at': None}
1.4.0
GHSA-rfcf-m67m-jcrq
2021-10-21T13:55:20Z
2021-06-21T17:03:44Z
null
['CVE-2021-32693']
Authentication granted to all firewalls instead of just one
Description ----------- When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on one part of the application is considered authenticated on the whole application. Resolution ---------- We now ensure that the authenticated token is only available for the firewall that generates it. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728) for branch 5.3. Credits ------- I would like to thank Bogdan, gndk, Paweł Warchoł, Warxcell, and Adrien Lamotte for reporting the issue and Wouter J for fixing the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693'}, {'type': 'WEB', 'url': 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/security-http'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T20:33:08Z', 'nvd_published_at': '2021-06-17T23:15:00Z'}
1.4.0
GHSA-4pwq-fj89-6rjc
2022-08-11T17:00:17Z
2021-06-18T18:29:54Z
null
['CVE-2020-13944']
Apache Airflow Cross-site Scripting
In Apache Airflow < 1.10.12, the `origin` parameter passed to some of the endpoints like `/trigger` and was vulnerable to a XSS exploit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13944'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/11/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/01/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T17:35:39Z', 'nvd_published_at': '2020-09-17T14:15:00Z'}
1.4.0
GHSA-g6xv-8q23-w2q3
2021-05-20T16:59:51Z
2021-06-29T18:32:48Z
null
['CVE-2014-8682']
SQL Injection in Gogs
Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8682'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/0c5ba4573aecc9eaed669e9431a70a5d9f184b8d'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98694'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/35238'}, {'type': 'WEB', 'url': 'http://gogs.io/docs/intro/change_log.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/33'}, {'type': 'WEB', 'url': 'http://www.exploit-db.com/exploits/35238'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/533995/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/71187'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:59:51Z', 'nvd_published_at': None}
1.4.0
GHSA-xw37-57qp-9mm4
2023-02-09T19:40:33Z
2021-06-29T21:14:16Z
null
['CVE-2020-26265']
Consensus flaw during block processing in github.com/ethereum/go-ethereum
### Impact A consensus-vulnerability in Geth could cause a chain split, where vulnerable versions refuse to accept the canonical chain. ### Description A flaw was repoted at 2020-08-11 by John Youngseok Yang (Software Platform Lab), where a particular sequence of transactions could cause a consensus failure. - Tx 1: - `sender` invokes `caller`. - `caller` invokes `0xaa`. `0xaa` has 3 wei, does a self-destruct-to-self - `caller` does a `1 wei` -call to `0xaa`, who thereby has 1 wei (the code in `0xaa` still executed, since the tx is still ongoing, but doesn't redo the selfdestruct, it takes a different path if callvalue is non-zero) - Tx 2: - `sender` does a 5-wei call to 0xaa. No exec (since no code). In geth, the result would be that `0xaa` had `6 wei`, whereas OE reported (correctly) `5` wei. Furthermore, in geth, if the second tx was not executed, the `0xaa` would be destructed, resulting in `0 wei`. Thus obviously wrong. It was determined that the root cause was this [commit](https://github.com/ethereum/go-ethereum/commit/223b950944f494a5b4e0957fd9f92c48b09037ad) from [this PR](https://github.com/ethereum/go-ethereum/pull/19953). The semantics of `createObject` was subtly changd, into returning a non-nil object (with `deleted=true`) where it previously did not if the account had been destructed. This return value caused the new object to inherit the old `balance`: ```golang func (s *StateDB) CreateAccount(addr common.Address) { newObj, prev := s.createObject(addr) if prev != nil { newObj.setBalance(prev.data.Balance) } } ``` It was determined that the minimal possible correct fix was ```diff +++ b/core/state/statedb.go @@ -589,7 +589,10 @@ func (s *StateDB) createObject(addr common.Address) (newobj, prev *stateObject) s.journal.append(resetObjectChange{prev: prev, prevdestruct: prevdestruct}) } s.setStateObject(newobj) - return newobj, prev + if prev != nil && !prev.deleted { + return newobj, prev + } + return newobj, nil ``` ### Patches See above. The fix was included in Geth `v1.9.20` "Paragade". ### Credits The bug was found by @johnyangk and reported via bounty@ethereum.org. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.4'}, {'fixed': '1.9.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26265'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21080'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21409'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0105'}]
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:15:07Z', 'nvd_published_at': None}
1.4.0
GHSA-7rg4-266c-jqw6
2022-06-29T20:41:29Z
2021-06-08T20:12:56Z
null
['CVE-2021-28055']
Predictable CSRF tokens in centreon/centreon
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.10.0'}, {'fixed': '20.10.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.04.0'}, {'fixed': '20.04.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.10.0'}, {'fixed': '19.10.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.37'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28055'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/9612'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/19.10.23'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/2.8.37'}]
{'cwe_ids': ['CWE-330', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T15:18:01Z', 'nvd_published_at': '2021-04-15T19:15:00Z'}
1.4.0
GHSA-9f46-5r25-5wfm
2021-09-21T14:55:38Z
2021-06-29T03:13:28Z
null
['CVE-2021-32708']
Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem
### Impact The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions: - A user is allowed to supply the path or filename of an uploaded file. - The supplied path or filename is not checked against unicode chars. - The supplied pathname checked against an extension deny-list, not an allow-list. - The supplied path or filename contains a unicode whitespace char in the extension. - The uploaded file is stored in a directory that allows PHP code to be executed. Given these conditions are met a user can upload and execute arbitrary code on the system under attack. ### Patches The unicode whitespace removal has been replaced with a rejection (exception). The library has been patched in: - 1.x: https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32 - 2.x: https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74 ### Workarounds For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'league/flysystem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'league/flysystem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32708'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32'}, {'type': 'PACKAGE', 'url': 'https://github.com/thephpleague/flysystem'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNZSWK4GOMJOOHKLZEOE5AQSLC4DNCRZ/'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/league/flysystem'}]
{'cwe_ids': ['CWE-367'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T18:03:15Z', 'nvd_published_at': '2021-06-24T17:15:00Z'}
1.4.0
GHSA-hwqm-x785-qh8p
2021-05-12T22:03:39Z
2021-06-23T17:52:33Z
null
['CVE-2020-12797']
Incorrect Permission Assignment for Critical Resource in Hashicorp Consul
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/structs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/structs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12797'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/5606'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/8047'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T22:03:39Z', 'nvd_published_at': '2020-06-11T20:15:00Z'}
1.4.0
GHSA-qpxw-6473-ppww
2021-05-25T20:45:01Z
2021-06-22T15:23:04Z
null
['CVE-2020-12467']
Session Fixation in Subrion CMS
Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12467'}, {'type': 'WEB', 'url': 'https://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Session%20Fixation'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:45:01Z', 'nvd_published_at': '2020-04-29T21:15:00Z'}
1.4.0
GHSA-qm57-vhq3-3fwf
2021-05-20T15:13:24Z
2021-06-09T17:14:51Z
null
['CVE-2021-32052']
Header injection possible in Django
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32052'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1944801'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0002/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/may/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/06/1'}]
{'cwe_ids': ['CWE-79', 'CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:12:45Z', 'nvd_published_at': '2021-05-06T16:15:00Z'}
1.4.0
GHSA-599h-8wpj-75xj
2021-05-20T21:24:49Z
2021-06-23T17:23:30Z
null
['CVE-2021-23365']
Authentication Bypass in tyk-identity-broker
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tyktechnologies/tyk-identity-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23365'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/pull/147'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:24:49Z', 'nvd_published_at': '2021-04-26T10:15:00Z'}
1.4.0
GHSA-4ffq-6g62-j4v4
2022-12-13T16:27:53Z
2021-06-16T17:29:43Z
null
['CVE-2021-21620']
Cross-Site Request Forgery in the Jenkins Claim plugin
Claim Plugin 2.18.1 and earlier does not require POST requests for the form submission endpoint assigning claims, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to change claims. Claim Plugin 2.18.2 requires POST requests for the affected HTTP endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:claim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21620'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/claim-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(2)'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:25:26Z', 'nvd_published_at': '2021-02-24T16:15:00Z'}
1.4.0
GHSA-hjfx-8p6c-g7gx
2023-09-04T16:28:23Z
2021-06-08T18:49:20Z
null
['CVE-2021-28678']
Insufficient Verification of Data Authenticity in Pillow
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '8.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28678'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377/commits/496245aa4365d0827390bd0b6fbd11287453b3a1'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:38:37Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}
1.4.0
GHSA-fh37-cx83-q542
2021-05-07T21:48:45Z
2021-06-18T18:30:11Z
null
['CVE-2021-26697']
Improper Authentication in Apache Airflow
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue only affects Apache Airflow 2.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26697'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/17/2'}]
{'cwe_ids': ['CWE-269', 'CWE-287', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:48:45Z', 'nvd_published_at': '2021-02-17T15:15:00Z'}
1.4.0
GHSA-qq3j-xp49-j73f
2021-05-24T20:57:17Z
2021-06-23T18:14:36Z
null
['CVE-2020-4053']
Plugin archive directory traversal in Helm
The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.2.3. ### Impact A traversal attack is possible when installing Helm plugins from a tar archive over HTTP. It is possible for a malicious plugin author to inject a relative path into a plugin archive, and copy a file outside of the intended directory. Traversal Attacks are a form of a Directory Traversal that can be exploited by extracting files from an archive. The premise of the Directory Traversal vulnerability is that an attacker can gain access to parts of the file system outside of the target folder in which they should reside. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving Remote Command Execution on the victim's machine. The vulnerability can also cause damage by overwriting configuration files or other sensitive resources, and can be exploited on both client (user) machines and servers. https://snyk.io/research/zip-slip-vulnerability ### Patches This issue has been fixed in Helm 3.2.4 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Helm repository](https://github.com/helm/helm/issues) * For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/plugin/installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-qq3j-xp49-j73f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/8317'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.2.4'}]
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:57:17Z', 'nvd_published_at': None}
1.4.0
GHSA-w5rh-j4g3-jr29
2023-05-24T14:45:31Z
2021-06-16T17:29:17Z
null
['CVE-2021-21651']
Missing Authorization in Jenkins S3 publisher Plugin
Jenkins S3 publisher Plugin prior to 0.11.7 and 0.11.5.1 does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to obtain the list of configured profiles. S3 publisher Plugin 0.11.7 and 0.11.5.1 performs permission checks when providing a list of configured profiles.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.6'}, {'fixed': '0.11.7'}]}], 'versions': ['0.11.6']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21651'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21651.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2201'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:59:06Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-q2q7-5pp4-w6pg
2021-10-21T16:39:49Z
2021-06-01T21:19:32Z
null
['CVE-2021-33503']
Catastrophic backtracking in URL authority parser when passed URL containing many @ characters
### Impact When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. ### Patches The issue has been fixed in urllib3 v1.26.5. ### References - [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503) - [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/) - [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/) - [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5) ### For more information If you have any questions or comments about this advisory: * Ask in our [community Discord](https://discord.gg/urllib3) * Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.4'}, {'fixed': '1.26.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33503'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/5b047b645f5f93900d5e2fc31230848c25eb1f5f#diff-52026d639119bf1e0364836b4e8a18bd9ed3c95c6ba39b26534a5057a65e35bbR65'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-36'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T22:09:12Z', 'nvd_published_at': '2021-06-29T11:15:00Z'}
1.4.0
GHSA-mj8x-cpr8-x39h
2021-04-19T21:38:56Z
2021-06-16T17:33:19Z
null
['CVE-2021-27850']
Remote code execution in Apache Tapestry
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.2, upgrade to 5.6.3 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27850'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TAP5-2663'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0002/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/15/1'}]
{'cwe_ids': ['CWE-502', 'CWE-922'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:38:56Z', 'nvd_published_at': '2021-04-15T08:15:00Z'}
1.4.0
GHSA-39q4-p535-c852
2023-09-07T21:45:40Z
2021-06-10T17:25:05Z
null
['CVE-2021-23392']
Uncontrolled Resource Consumption in locutus
The package locutus before 2.0.15 is vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'locutus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392'}, {'type': 'WEB', 'url': 'https://github.com/locutusjs/locutus/pull/446'}, {'type': 'WEB', 'url': 'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T20:22:09Z', 'nvd_published_at': '2021-06-08T08:15:00Z'}
1.4.0
GHSA-rpcg-f9q6-2mq6
2021-06-08T17:17:21Z
2021-06-08T18:45:52Z
null
[]
Remote Code Execution via traversal in TAL expressions
This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. ### Impact Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. ### Patches The problem has been fixed in Zope 5.21 and 4.6.1. ### Workarounds The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. ### References * [The previous advisory (GHSA-5pr9-v234-jw36)](https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues) * Email us at [security@plone.org](mailto:security@plone.org)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T17:17:21Z', 'nvd_published_at': None}
1.4.0
GHSA-pjc4-3w99-j7v4
2022-01-10T21:33:30Z
2021-06-15T15:56:59Z
null
['CVE-2021-23393']
Open redirect in Flask-Unchained
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Unchained'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23393'}, {'type': 'WEB', 'url': 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'}, {'type': 'WEB', 'url': 'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:36:47Z', 'nvd_published_at': None}
1.4.0
GHSA-mrwr-2945-fr22
2021-06-23T18:44:29Z
2021-06-22T15:17:28Z
null
['CVE-2021-32245']
Cross-site scripting in PageKit
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32245'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/963'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T17:32:02Z', 'nvd_published_at': '2021-06-16T21:15:00Z'}
1.4.0
GHSA-24p5-x9f9-vvpx
2023-07-05T23:17:56Z
2021-06-08T20:10:27Z
null
['CVE-2021-20681']
Cross-site Scripting (XSS) in baserCMS
Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20681'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN64869876'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN64869876/index.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:39:01Z', 'nvd_published_at': '2021-03-26T09:15:00Z'}
1.4.0
GHSA-rvwf-54qp-4r6v
2022-08-11T21:47:32Z
2021-06-04T21:37:45Z
null
['CVE-2017-18640']
SnakeYAML Entity Expansion during load operation
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18640'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/asomov/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/wiki/Changes'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/377'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/wiki/Changes'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22ac2aa053b7d9c6b75a49db78125c9316499668d0f4a044f3402e2f@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r28c9009a48d52cf448f8b02cd823da0f8601d2dff4d66f387a35f1e0@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a5b84fdf59042dc398497e914b5bb1aed77328320b1438144ae1953@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b05744c0c2867daa5d1a96832965b7d6220328b0ead06c22a6e7854@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2db207a2431a5e9e95e899858ab1f5eabd9bcc790a6ca7193ae07e94@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r436988d2cfe8a770ae361c82b181c5b2bf48a249bad84d8a55a3b46e@%3Cdev.phoenix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r465d2553a31265b042cf5457ef649b71e0722ab89b6ea94a5d59529b@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c682fb8cf69dd14162439656a6ebdf42ea6ad0e4edba95907ea3f14@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d7f37da1bc2df90a5a0f56eb7629b5ea131bfe11eeeb4b4c193f64a@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5510f0125ba409fc1cabd098ab8b457741e5fa314cbd0e61e4339422@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55d807f31e64a080c54455897c20b1667ec792e5915132c7b7750533@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56805265475919252ba7fc10123f15b91097f3009bae86476624ca25@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r643ba53f002ae59068f9352fe1d82e1b6f375387ffb776f13efe8fda@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r666f29a7d0e1f98fa1425ca01efcfa86e6e3856e01d300828aa7c6ea@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c91e52b3cc9f4e64afe0f34f20507143fd1f756d12681a56a9b38da@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d54c2da792c74cc14b9b7665ea89e144c9e238ed478d37fd56292e6@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72a3588d62b2de1361dc9648f5d355385735e47f7ba49d089b0e680d@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8464b6ec951aace8c807bac9ea526d4f9e3116aa16d38be06f7c6524@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b57c57cffa01e418868a3c7535b987635ff1fb5ab534203bfa2d64a@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r900e020760c89f082df1c6e0d46320eba721e4e47bb9eb521e68cd95@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raebd2019b3da8c2f90f31e8b203b45353f78770ca93bfe5376f5532e@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb0e033d5ec8233360203431ad96580cf2ec56f47d9a425d894e279c2@%3Cpr.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb34d8d3269ad47a1400f5a1a2d8310e13a80b6576ebd7f512144198d@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5c33d0069c927fae16084f0605895b98d231d7c48527bcb822ac48c@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7b28ac741e32dd5edb2c22485d635275bead7290b056ee56baf8ce0@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaa1f513d903c89a08267c91d86811fa5bcc82e0596b6142c5cea7ea@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3211c71f7e0973a1825d1988a3921288c06cd9d793eae97ecd34948@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb2a7037366c58bac6aec6ce3df843a11ef97ae4eb049f05f410eaa5@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb4b61dbe2ed1c7a88781a9aff5a9e7342cc7ed026aec0418ee67596@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce5c93bba6e815fb62ad38e28ca1943b3019af1eddeb06507ad4e11a@%3Ccommits.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd582c64f66c354240290072f340505f5d026ca944ec417226bb0272e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd34c0479587e32a656d976649409487d51ca0d296b3e26b6b89c3f5@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re791a854001ec1f79cd4f47328b270e7a1d9d7056debb8f16d962722@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re851bbfbedd47c690b6e01942acb98ee08bd00df1a94910b905bc8cd@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb1751562ee5146d3aca654a2df76a2c13d8036645ce69946f9c219e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/recfe569f4f260328b0036f1c82b2956e864d519ab941a5e75d0d832d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf95bebee6dfcc55067cebe8482bd31e6f481d9f74ba8e03f860c3ec7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe0aab6c3bebbd9cbfdedb65ff3fdf420714bcb8acdfd346077e1263@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKN7VGIKTYBCAKYBRG55QHXAY5UDZ7HA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTVJC54XGX26UJVVYCXZ7D25X3R5T2G6/'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.yaml/snakeyaml/1.25/usages'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-28'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T21:34:16Z', 'nvd_published_at': '2019-12-12T03:15:00Z'}
1.4.0
GHSA-7q44-r25x-wm4q
2021-06-30T18:13:17Z
2021-06-22T15:17:51Z
null
['CVE-2021-34551']
Remote Code Execution vulnerability in PHPMailer 6.4.1 running on Windows
PHPMailer 6.4.1 contains a possible remote code execution vulnerability through the `$lang_path` parameter of the `setLanguage()` method. If the `$lang_path` parameter is passed unfiltered from user input, it can be set to [a UNC path](https://docs.microsoft.com/en-us/dotnet/standard/io/file-path-formats#unc-paths), and if an attacker is also able to create a remote mount on the server that the UNC path points to, a script file under their control may be executed. ### Impact Arbitrary code may be run by a remote attacker under the web server or PHP process running on Window hosts. ### Patches Mitigated in PHPMailer 6.5.0 by no longer treating translation files as PHP code, but by parsing their text content directly. This approach avoids the possibility of executing unknown code while retaining backward compatibility. This isn't ideal, so the current translation format is deprecated and will be replaced in the next major release. ### Workarounds Any of: * Ensure that calling code does not pass unfiltered user-supplied data to the `$lang_path` parameter of the `setLanguage()` method. * Block or filter the use of unknown UNC paths in this parameter (or altogether). * Ensure that unauthorised users do not have the ability to read from unknown remote servers via UNC paths. * Run on an OS that does not support UNC paths ### References [CVE-2021-34551](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34551). Reported by [listensec.com](https://listensec.com) via Tidelift. ### For more information If you have any questions or comments about this advisory: * Open an issue in [PHPMailer](https://github.com/PHPMailer/PHPMailer) * [Email the maintainers](mailto:phpmailer@synchromedia.co.uk)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7q44-r25x-wm4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34551'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/'}]
{'cwe_ids': ['CWE-434', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T19:50:57Z', 'nvd_published_at': '2021-06-16T18:15:00Z'}
1.4.0
GHSA-mw3r-pfmg-xp92
2021-10-21T18:58:58Z
2021-06-16T17:37:11Z
null
['CVE-2021-23926']
Improper Restriction of Recursive Entity References in Apache XMLBeans
The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlbeans:xmlbeans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23926'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/XMLBEANS-517'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html'}, {'type': 'WEB', 'url': 'https://poi.apache.org/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-776'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:33:29Z', 'nvd_published_at': '2021-01-14T15:15:00Z'}
1.4.0
GHSA-rmpv-rcp6-v8wc
2021-05-27T22:04:38Z
2021-06-08T23:20:11Z
null
['CVE-2021-33508']
Cross-site scripting in Plone
Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33508'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:04:38Z', 'nvd_published_at': '2021-05-21T22:15:00Z'}
1.4.0
GHSA-mr6h-chqp-p9g2
2023-02-09T20:01:35Z
2021-06-29T18:32:44Z
null
['CVE-2014-8681']
SQL Injection in gogs.io/gogs
SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gogits/gogs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8681'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogits/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0021'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150711111508/http://gogs.io/docs/intro/change_log.html#v0.5.8-%40-2014-11-19'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/35237'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/31'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:47:51Z', 'nvd_published_at': None}
1.4.0
GHSA-8wwf-2644-f8x4
2023-08-07T14:11:00Z
2021-06-15T15:49:01Z
null
['CVE-2021-34363']
The Fuck Arbitrary File Deletion via Path Traversal
The thefuck (aka _The Fuck_) is app that corrects errors in previous console commands. _The Fuck_ python package before 3.31 allows Path Traversal that leads to arbitrary file deletion via the `undo archive operation` feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'thefuck'}, 'ecosystem_specific': {'affected_functions': ['thefuck.rules.dirty_untar.side_effect', 'thefuck.rules.dirty_unzip.side_effect']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34363'}, {'type': 'WEB', 'url': 'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvbn/thefuck'}, {'type': 'WEB', 'url': 'https://github.com/nvbn/thefuck/releases/tag/3.31'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MEDDLBFVRUQHPYIBJ4MFM3M4NUJUXL5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YA6UNQSOY6M3NJDZLS6YJXTS4WGDMEEJ/'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/48'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:25:06Z', 'nvd_published_at': '2021-06-10T11:15:00Z'}
1.4.0
GHSA-gq5r-cc4w-g8xf
2023-08-30T18:52:39Z
2021-06-23T17:25:08Z
null
[]
gosaml2 is vulnerable to NULL Pointer Dereference from malformed XML signatures
This affects all versions less than 0.7.0 of package github.com/russellhaering/gosaml2. There is a crash on null pointer dereference caused by sending malformed XML signatures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7731'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/issues/59'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/pull/90'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/commit/66e3b7affd622b8b24ea1e18845f045e46b23424'}, {'type': 'PACKAGE', 'url': 'https://github.com/russellhaering/gosaml2'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/releases/tag/v0.7.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302'}]
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:39:22Z', 'nvd_published_at': '2021-04-30T16:15:00Z'}
1.4.0
GHSA-8h2j-cgx8-6xv7
2021-06-17T20:06:14Z
2021-06-10T15:43:54Z
null
['CVE-2021-32677']
Cross-Site Request Forgery (CSRF) in FastAPI
### Impact FastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack. In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `content-type` header sent was not set to `application/json` or a compatible JSON media type (e.g. `application/geo+json`). So, a request with a content type of `text/plain` containing JSON data would be accepted and the JSON data would be extracted. But requests with content type `text/plain` are exempt from [CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) preflights, for being considered [Simple requests](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests). So, the browser would execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application. ### Patches This is fixed in FastAPI `0.65.2`. The request data is now parsed as JSON only if the `content-type` header is `application/json` or another JSON compatible media type like `application/geo+json`. ### Workarounds It's best to upgrade to the latest FastAPI. But still, it would be possible to add a middleware or a dependency that checks the `content-type` header and aborts the request if it is not `application/json` or another JSON compatible content type. ### References * [CORS on Mozilla web docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) * [This answer on StackExchange](https://security.stackexchange.com/questions/157528/ways-to-bypass-browsers-cors-policy/157531#157531) * [OWASP CSRF](https://owasp.org/www-community/attacks/csrf) * Fixed in PR [#2118](https://github.com/tiangolo/fastapi/pull/2118) ### For more information If you have any questions or comments, write to [security@tiangolo.com](mailto:security@tiangolo.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'fastapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.65.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tiangolo/fastapi/security/advisories/GHSA-8h2j-cgx8-6xv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32677'}, {'type': 'WEB', 'url': 'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MATAWX25TYKNEKLDMKWNLYDB34UWTROA/'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T13:34:54Z', 'nvd_published_at': '2021-06-09T18:15:00Z'}
1.4.0
GHSA-rrvg-2c69-p9rf
2022-12-15T18:20:16Z
2021-06-16T17:28:58Z
null
['CVE-2021-21652']
CSRF vulnerability in Jenkins Xray - Test Management for Jira Plugin allows capturing credentials
Xray - Test Management for Jira Plugin 2.4.0 and earlier does not require POST requests for a connection test method, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Xray - Test Management for Jira Plugin 2.4.1 requires POST requests for the affected connection test method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xray-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21652'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xray-connector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(1)'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:12:26Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-8j34-9876-pvfq
2021-05-21T18:15:45Z
2021-06-23T17:28:26Z
null
['CVE-2020-26284']
Hugo can execute a binary from the current directory on Windows
## Impact Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. However, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one. Windows users who run `hugo` inside untrusted Hugo sites are affected. ## Patches Users should upgrade to Hugo v0.79.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gohugoio/hugo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.79.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26284'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/38736'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:15:45Z', 'nvd_published_at': '2020-12-21T23:15:00Z'}
1.4.0
GHSA-jv35-xqg7-f92r
2023-09-13T20:02:47Z
2021-06-21T17:16:09Z
null
['CVE-2021-25949']
set-getter Prototype Pollution Vulnerability
Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-getter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25949'}, {'type': 'WEB', 'url': 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4'}, {'type': 'PACKAGE', 'url': 'https://github.com/doowb/set-getter'}, {'type': 'WEB', 'url': 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210615022308/https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:22:58Z', 'nvd_published_at': '2021-06-10T12:15:00Z'}
1.4.0
GHSA-w942-gw6m-p62c
2023-08-30T11:40:58Z
2021-06-23T17:53:05Z
null
['CVE-2020-35380']
Denial of service in GJSON
GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON. Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35380'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/192'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0059'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:50:06Z', 'nvd_published_at': None}
1.4.0
GHSA-52qp-gwwh-qrg4
2021-06-16T20:15:07Z
2021-06-21T17:10:02Z
null
['CVE-2021-32684']
Missing Handler in @scandipwa/magento-scripts
### Impact After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable. ### Patches [Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above. ### Workarounds Upgrade to patched or latest (recommended) version `npm i @scandipwa/magento-scripts@1.5.3` or `npm i @scandipwa/magento-scripts@latest`. ### References New releases always available here: https://github.com/scandipwa/create-magento-app/releases ### For more information If you have any questions or comments about this advisory: * Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@scandipwa/magento-scripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.1'}, {'fixed': '1.5.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684'}, {'type': 'WEB', 'url': 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'}]
{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:15:07Z', 'nvd_published_at': '2021-06-14T23:15:00Z'}
1.4.0
GHSA-m7rg-8wvq-846v
2023-08-08T19:57:34Z
2021-06-07T21:49:14Z
null
['CVE-2021-25947']
Prototype pollution in nestie
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nestie'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947'}]
{'cwe_ids': ['CWE-1321', 'CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:32:41Z', 'nvd_published_at': '2021-06-03T20:15:00Z'}
1.4.0
GHSA-433w-mm6h-rv9p
2021-05-21T20:47:30Z
2021-06-23T17:29:06Z
null
[]
Auth bypass in SAML provider
### Impact The following vulnerabilities have been disclosed, which impact users leveraging the SAML auth provider: - [`goxmldsig` - Signature Validation Bypass](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) - [`gosaml2` - Authentication Bypass](https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg) ### Patches [Patch available](https://github.com/netlify/gotrue/pull/274) Please upgrade to v1.0.0 or commit hash `a2b4dd6bc4ef7562d1df044098b303f564eefa90` ### Workarounds No known workarounds. ### For more information If you have any questions or comments about this advisory: * Open an issue in [gotrue](https://github.com/netlify/gotrue/issues) * Email us at [security@netlify.com](mailto:security@netlify.com)
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/netlify/gotrue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/security/advisories/GHSA-433w-mm6h-rv9p'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:47:30Z', 'nvd_published_at': None}
1.4.0
GHSA-257v-vj4p-3w2h
2021-06-30T18:03:29Z
2021-06-22T01:14:09Z
null
['CVE-2021-29060']
Regular Expression Denial of Service (ReDOS)
In the npm package `color-string`, there is a ReDos (Regular Expression Denial of Service) vulnerability regarding an exponential time complexity for linearly increasing input lengths for `hwb()` color strings. Strings reaching more than 5000 characters would see several milliseconds of processing time; strings reaching more than 50,000 characters began seeing 1500ms (1.5s) of processing time. The cause was due to a the regular expression that parses hwb() strings - specifically, the hue value - where the integer portion of the hue value used a 0-or-more quantifier shortly thereafter followed by a 1-or-more quantifier. This caused excessive backtracking and a cartesian scan, resulting in exponential time complexity given a linear increase in input length.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'color-string'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29060'}, {'type': 'WEB', 'url': 'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3'}, {'type': 'WEB', 'url': 'https://github.com/Qix-/color-string/releases/tag/1.5.5'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/js/color-string.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/color-string'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-21T23:20:37Z', 'nvd_published_at': '2021-06-21T16:15:00Z'}
1.4.0
GHSA-4w4p-xwrr-9crh
2021-05-25T20:57:05Z
2021-06-16T17:18:49Z
null
['CVE-2020-1961']
Injection in Apache Syncope
Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1961'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:57:05Z', 'nvd_published_at': '2020-05-04T13:15:00Z'}
1.4.0
GHSA-c738-77x8-wmq5
2022-02-08T21:27:27Z
2021-06-08T22:29:29Z
null
['CVE-2020-14340']
Uncontrolled Resource Consumption in XNIO
A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0.Final'}, {'fixed': '3.8.2.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.1.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.7.9.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.8.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14340'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860218'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T20:32:00Z', 'nvd_published_at': '2021-06-02T13:15:00Z'}
1.4.0
GHSA-jj6m-r8jc-2gp7
2022-10-25T20:24:52Z
2021-06-23T18:03:18Z
null
['CVE-2021-32699']
Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings
### Impact All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding. ### Patches Users should upgrade to `1.4.4`. ### Workarounds There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created. ### For more information If you have any questions or comments about this advisory: * Contact us on [Discord](https://discord.gg/pterodactyl) * Email us at `dane ät pterodactyl dot io`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}]
{'cwe_ids': ['CWE-405', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T15:43:57Z', 'nvd_published_at': '2021-06-22T20:15:00Z'}
1.4.0
GHSA-7r7m-5h27-29hp
2021-09-15T18:25:52Z
2021-06-08T18:48:53Z
null
['CVE-2021-28676']
Potential infinite loop in Pillow
An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28676'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/bb6c11fb889e6c11b0ee122b828132ee763b5856'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:46:13Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}
1.4.0
GHSA-pgf8-28gg-vpr6
2021-06-07T18:55:30Z
2021-06-04T19:09:20Z
null
['CVE-2021-32662']
Path traversal
### Impact A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. ### Patches The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@backstage/techdocs-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32662'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-05-27'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:01:05Z', 'nvd_published_at': '2021-06-03T22:15:00Z'}
1.4.0
GHSA-5557-j87h-cvf4
2021-05-19T18:54:36Z
2021-06-16T17:29:26Z
null
['CVE-2021-21653']
Missing Authorization in jenkins xray-connector
Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xray-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21653'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(2)'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:54:36Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-3fx4-7f69-5mmg
2021-05-20T16:26:07Z
2021-06-23T17:14:12Z
null
['CVE-2016-9123']
Integer Overflow in go-jose
go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit architectures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/square/go-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9123'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/165170'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0009'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/11/03/1'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:26:07Z', 'nvd_published_at': None}
1.4.0
GHSA-rgx6-rjj4-c388
2023-09-08T21:29:03Z
2021-06-21T17:16:42Z
null
['CVE-2021-33829']
Cross-site Scripting in ckeditor4
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because `--!>` is mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.14.0'}, {'fixed': '4.16.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33829'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-003'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ckeditor4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T17:22:32Z', 'nvd_published_at': '2021-06-09T12:15:00Z'}
1.4.0
GHSA-q4qv-fmwc-qxpx
2021-04-07T22:06:28Z
2021-06-22T15:24:55Z
null
['CVE-2019-7726']
SQL Injection in NukeViet
modules/banners/funcs/click.php in NukeViet before 4.3.04 has a SQL INSERT statement with raw header data from an HTTP request (e.g., Referer and User-Agent).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.04'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7726'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:06:28Z', 'nvd_published_at': '2020-12-31T05:15:00Z'}
1.4.0
GHSA-rmw5-xpg9-jr29
2022-04-27T20:30:31Z
2021-06-10T17:23:21Z
null
['CVE-2020-28924']
Use of Cryptographically Weak Pseudo-Random Number Generator in Rclone
An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rclone/rclone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28924'}, {'type': 'WEB', 'url': 'https://github.com/rclone/rclone/issues/4783'}, {'type': 'PACKAGE', 'url': 'https://github.com/rclone/rclone'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIFT24Q6EFXLQZ24AER2QGFFZLMIPCD/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-14'}]
{'cwe_ids': ['CWE-331', 'CWE-338'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T14:47:19Z', 'nvd_published_at': '2020-11-19T20:15:00Z'}
1.4.0
GHSA-r37h-j483-cjjm
2021-06-04T18:50:20Z
2021-06-01T21:38:20Z
null
['CVE-2021-33563']
Improper rate limiting in Koel
Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phanan/koel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33563'}, {'type': 'WEB', 'url': 'https://github.com/koel/koel/releases/tag/v5.1.4'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1-other-koel/koel/'}]
{'cwe_ids': ['CWE-799', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:37:37Z', 'nvd_published_at': '2021-05-24T23:15:00Z'}
1.4.0
GHSA-5vq5-pg3r-9ph3
2022-01-03T15:56:18Z
2021-06-10T17:22:08Z
null
['CVE-2021-32674']
Path Traversal in Zope
Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.2.1 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32674'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Zope'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Zope/'}]
{'cwe_ids': ['CWE-12', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T21:32:39Z', 'nvd_published_at': '2021-06-08T18:15:00Z'}
1.4.0
GHSA-7r82-7xv7-xcpj
2022-02-08T22:02:43Z
2021-06-03T23:40:23Z
null
['CVE-2020-13956']
Cross-site scripting in Apache HttpClient
Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/httpcomponents-client'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:25:52Z', 'nvd_published_at': '2020-12-02T17:15:00Z'}
1.4.0
GHSA-q6w2-89hq-hq27
2022-08-11T16:52:01Z
2021-06-08T23:02:43Z
null
['CVE-2021-20195']
keycloak Self Stored Cross-site Scripting vulnerability
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20195'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'}]
{'cwe_ids': ['CWE-116', 'CWE-20', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:55:29Z', 'nvd_published_at': '2021-05-28T11:15:00Z'}
1.4.0
GHSA-27pv-q55r-222g
2021-05-21T18:31:52Z
2021-06-23T17:27:44Z
null
['CVE-2020-26279']
Path traversal in github.com/ipfs/go-ipfs
### Impact It is currently possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when `ipfs get` is done on an affected DAG. 1. The only affected command is `ipfs get`. 2. The gateway is not affected. ### Patches Traversal fix patched in https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227 `tar-utils` patch applied to go-ipfs via https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2 ### Workarounds Upgrade to go-ipfs 0.8 or later. ### References Binaries for the patched versions of go-ipfs are available on the IPFS distributions site, https://dist.ipfs.io/go-ipfs ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs) * Email us at [security@ipfs.io](mailto:security@ipfs.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26279'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2'}, {'type': 'WEB', 'url': 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:31:52Z', 'nvd_published_at': None}
1.4.0
GHSA-qvp4-rpmr-xwrr
2021-06-22T20:50:44Z
2021-06-23T18:00:20Z
null
[]
Possible bypass of token claim validation when OAuth2 Introspection caching is enabled
### Impact When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. ### Patches A patch will be released with `v0.38.12-beta.1`. ### Workarounds Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. ### Trace The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. ### Post-Mortem The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process. To avoid this from happening again we enabled codecov with a strict policy on the Ory Oathkeeper repository: Without an increase in code coverage the PR can not be merged. To address this issue and any regressions we have added a test suite ensuring that the cache behaviour is correct in the different scenarios: - Scope strategy is `none`, cache is enabled, and `requested_scope` is not empty -> cache will not be used; - Scope strategy is `none`, cache is enabled, and `requested_scope` is empty -> cache will be used; - Scope strategy is not `none`, cache is enabled, and `requested_scope` is not empty -> cache will be used; as well as validating if `iss`, `aud`, `exp`, `token_use`, and scope are validated. Additionally, we added [CodeQL scanning](https://github.com/ory/oathkeeper/commit/64ac7562669287d391cd72dfd43c5d71ff9f89a1) to the CI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/oathkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0-beta.2'}, {'fixed': '0.38.12-beta.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.38.11-beta.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T20:50:44Z', 'nvd_published_at': None}
1.4.0
GHSA-gpvv-69j7-gwj8
2022-04-21T15:43:34Z
2021-06-09T17:35:04Z
null
['CVE-2019-20916']
Path Traversal in pip
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20916'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/issues/6413'}, {'type': 'WEB', 'url': 'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/pip/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/compare/19.1.1...19.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:55:04Z', 'nvd_published_at': '2020-09-04T20:15:00Z'}
1.4.0
GHSA-g6rj-rv7j-xwp4
2023-09-04T16:32:28Z
2021-06-08T18:49:11Z
null
['CVE-2021-28675']
Pillow Denial of service
An issue was discovered in Pillow before 8.2.0. `PSDImagePlugin.PsdImageFile` lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on `Image.open` prior to `Image.load`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28675'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377/commits/22e9bee4ef225c0edbb9323f94c26cee0c623497'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-233', 'CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:41:46Z', 'nvd_published_at': '2021-06-02T15:15:00Z'}
1.4.0
GHSA-jr3j-whm4-9wwm
2021-06-07T18:54:43Z
2021-06-04T19:10:34Z
null
['CVE-2021-32641']
Reflected XSS when using flashMessages or languageDictionary
### Overview Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's - `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`. - `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. ### Am I affected? You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply: - You are utilizing `flashMessage` feature. - User input or data from URL parameters is incorporated into the `flashMessage`. An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`. ```js var params = new URLSearchParams(location.search); var errorMessage = params.get('error__message'); var showParams = {}; if (!!errorMessage === true) { showParams.flashMessage = { type: 'error', text: 'We were unable to log you in. ' + errorMessage, }; } lock.show(showParams); ``` OR - You are utilizing `languageDictionary` feature. - User input or data from URL parameters is used in `languageDictionary` properties. An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`. ```js var params = new URLSearchParams(location.search); var instruction = params.get('instruction'); var options = { languageDictionary: { emailInputPlaceholder: "something@youremail.com", title: "title", socialLoginInstructions: instruction }, }; var lock = new Auth0LockPasswordless( CLIENT_ID, DOMAIN, options ); lock.show() ``` ### How to fix that? Upgrade to version `11.30.1`. ### Will this update impact my users? The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.30.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/releases/tag/v11.30.1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:28:08Z', 'nvd_published_at': '2021-06-04T21:15:00Z'}
1.4.0
GHSA-pw59-4qgf-jxr8
2022-04-04T21:27:42Z
2021-06-18T22:04:32Z
null
['CVE-2020-17522']
Cache Manipulation Attack in Apache Traffic Control
When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resulting in them being granted to clients possibly outside the CDN arcitechture.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17522'}, {'type': 'WEB', 'url': 'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607dca4a96cb8@%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E'}]
{'cwe_ids': ['CWE-525', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:27:42Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}
1.4.0
GHSA-rxjp-mfm9-w4wr
2022-06-29T20:40:42Z
2021-06-04T21:15:56Z
null
['CVE-2021-31542']
Path Traversal in Django
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31542'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0001/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/may/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/04/3'}]
{'cwe_ids': ['CWE-22', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:28:55Z', 'nvd_published_at': '2021-05-05T15:15:00Z'}
1.4.0
GHSA-hx7j-43w2-7rj7
2021-10-05T17:22:38Z
2021-06-07T22:12:13Z
null
['CVE-2021-25946']
Prototype pollution in nconf-toml
Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nconf-toml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25946'}, {'type': 'PACKAGE', 'url': 'https://github.com/RobLoach/nconf-toml'}, {'type': 'WEB', 'url': 'https://github.com/RobLoach/nconf-toml/blob/8ade08cd1cfb9691ab7cc5c3514cc05c5085918f/index.js#L8'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T21:58:39Z', 'nvd_published_at': '2021-05-25T19:15:00Z'}
1.4.0
GHSA-7jr6-prv4-5wf5
2023-08-30T10:26:47Z
2021-06-23T18:14:31Z
null
['CVE-2021-32690']
Helm passes repository credentials to alternate domain
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, one may look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32690'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.6.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0384'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T18:34:04Z', 'nvd_published_at': '2021-06-16T22:15:00Z'}
1.4.0
GHSA-jqmc-fxxp-r589
2021-05-11T22:09:21Z
2021-06-18T18:31:05Z
null
['CVE-2020-14942']
Deserialization of Untrusted Data in Tendenci
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tendenci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.0.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14942'}, {'type': 'WEB', 'url': 'https://github.com/tendenci/tendenci/issues/867'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:09:21Z', 'nvd_published_at': '2020-06-21T15:15:00Z'}
1.4.0
GHSA-954c-jjx6-cxv7
2021-06-28T19:06:42Z
2021-06-28T16:46:41Z
null
['CVE-2021-32702']
Reflected XSS from the callback handler's error query parameter
### Overview Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. ### Am I affected? You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. ### How to fix that? Upgrade to version `1.4.2`. ### Will this update impact my users? The fix adds basic HTML escaping to the error message and it should not impact your users. ### Credit https://github.com/inian https://github.com/git-ishanpatel
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@auth0/nextjs-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32702'}, {'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@auth0/nextjs-auth0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:38:26Z', 'nvd_published_at': '2021-06-25T17:15:00Z'}
1.4.0
GHSA-j39c-c8hj-x4j3
2022-02-08T21:34:09Z
2021-06-16T17:45:29Z
null
['CVE-2021-25122']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.43'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.63'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25122'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210409-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4891'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/01/1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T19:53:13Z', 'nvd_published_at': '2021-03-01T12:15:00Z'}
1.4.0
GHSA-9423-6c93-gpp8
2023-08-29T23:36:50Z
2021-06-23T17:13:29Z
null
['CVE-2020-7667']
github.com/sassoftware/go-rpmutils Arbitrary File Write via Archive Extraction (Zip Slip)
The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading `..` which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sassoftware/go-rpmutils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667'}, {'type': 'WEB', 'url': 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/sassoftware/go-rpmutils'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0042'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:56:04Z', 'nvd_published_at': '2020-06-24T12:15:00Z'}
1.4.0
GHSA-8h77-3xwr-hqhh
2022-12-14T15:11:01Z
2021-06-16T17:10:50Z
null
['CVE-2021-21666']
Cross-site scripting in Jenkins Kiuwan Plugin
Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability. Only older releases of Jenkins are affected by this vulnerability. Jenkins 2.275 and newer, LTS 2.263.2 and newer include a protection preventing this from being exploitable. Kiuwan Plugin 1.6.1 escapes affected parts of the error message in the form validation endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kiuwanJenkinsPlugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21666'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kiuwan-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2367'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/14'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:19:42Z', 'nvd_published_at': '2021-06-10T15:15:00Z'}