schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-v528-7hrm-frqp | 2023-02-15T18:39:26Z | 2021-06-16T18:03:47Z | null | ['CVE-2021-27568'] | Improper Check for Unusual or Exceptional Conditions in json-smart | An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart-mini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27568'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/60'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/62'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/pull/72'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/netplex/json-smart-v2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:30:13Z', 'nvd_published_at': '2021-02-23T02:15:00Z'} |
1.4.0 | GHSA-jwhm-9cjm-4493 | 2023-05-24T14:40:36Z | 2021-06-16T17:24:41Z | null | ['CVE-2021-21649'] | Cross-site Scripting in Jenkins Dashboard View Plugin | Jenkins Dashboard View Plugin prior to 2.16 and 2.12.1 does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
As part of this fix, the property for image URLs was changed from `url` to `imageUrl`. Existing [Configuration as Code](https://plugins.jenkins.io/configuration-as-code/) configurations are still supported, but exports will emit the new property. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13'}, {'fixed': '2.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21649'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21649.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2233'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:16:07Z', 'nvd_published_at': '2021-05-11T15:15:00Z'} |
1.4.0 | GHSA-wpgh-hmv4-r3v5 | 2021-05-20T21:52:15Z | 2021-06-21T17:18:20Z | null | ['CVE-2021-25928'] | Prototype pollution in safe-obj | Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'safe-obj'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25928'}, {'type': 'WEB', 'url': 'https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:52:15Z', 'nvd_published_at': '2021-04-26T11:15:00Z'} |
1.4.0 | GHSA-vfvf-6gx5-mqv6 | 2021-06-23T20:38:29Z | 2021-06-24T20:16:02Z | null | ['CVE-2021-32701'] | Incorrect Authorization in ORY Oathkeeper | ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/oathkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0-beta.2'}, {'fixed': '0.38.12-beta.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.38.11-beta.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32701'}, {'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/pull/424'}, {'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T20:38:29Z', 'nvd_published_at': '2021-06-22T20:15:00Z'} |
1.4.0 | GHSA-j858-xp5v-f8xx | 2023-08-25T21:02:50Z | 2021-06-02T21:42:49Z | null | ['CVE-2021-33564'] | Dragonfly contains remote code execution vulnerability | An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the `verify_url` option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/513'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j858-xp5v-f8xx'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0'}, {'type': 'WEB', 'url': 'https://github.com/mlr0p/CVE-2021-33564'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/dragonfly/CVE-2021-33564.yml'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml'}, {'type': 'WEB', 'url': 'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/'}] | {'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T16:59:54Z', 'nvd_published_at': '2021-05-29T14:15:00Z'} |
1.4.0 | GHSA-rwv7-3v45-hg29 | 2021-12-02T15:30:22Z | 2021-06-08T18:49:28Z | null | ['CVE-2021-25288'] | Out-of-bounds Read | An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. This dates to Pillow 2.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.Image.open']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '8.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25288'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}] | {'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:36:38Z', 'nvd_published_at': '2021-06-02T16:15:00Z'} |
1.4.0 | GHSA-r6rj-9ch6-g264 | 2021-06-16T19:58:45Z | 2021-06-07T22:09:26Z | null | ['CVE-2021-26707'] | Prototype pollution in Merge-deep | The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'merge-deep'}, 'ecosystem_specific': {'affected_functions': ['merge-deep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26707'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210716-0008/'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/merge-deep'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:48:51Z', 'nvd_published_at': '2021-06-02T15:15:00Z'} |
1.4.0 | GHSA-r578-pj6f-r4ff | 2021-06-16T21:25:21Z | 2021-06-21T17:07:47Z | null | ['CVE-2021-32691'] | Auto-merging Person Records Compromised | ### Impact
New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events).
### Patches
We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details.
### Workarounds
If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class.
```js
create = async (profile) => {
const rockUpdateFields = this.mapApollosFieldsToRock(profile);
// auto-merge functionality is compromised
// we are creating a new user and patching them with profile details
const id = await this.post('/People', {
Gender: 0, // required by Rock. Listed first so it can be overridden.
IsSystem: false, // required by rock
});
await this.patch(`/People/${id}`, {
...rockUpdateFields,
});
return id;
};
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [support@apollos.app](mailto:support@apollos.app)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@apollosproject/data-connector-rock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32691'}, {'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2'}, {'type': 'WEB', 'url': 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0'}] | {'cwe_ids': ['CWE-287', 'CWE-303'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T18:55:04Z', 'nvd_published_at': '2021-06-16T22:15:00Z'} |
1.4.0 | GHSA-mm8j-9x84-m9cv | 2021-04-06T21:44:01Z | 2021-06-16T17:34:18Z | null | ['CVE-2021-23899'] | Arbitrary code injection in json-sanitizer | OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mikesamuel:json-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:44:01Z', 'nvd_published_at': '2021-01-13T16:15:00Z'} |
1.4.0 | GHSA-9hx4-qm7h-x84j | 2021-05-20T16:31:56Z | 2021-06-29T18:32:53Z | null | ['CVE-2014-8683'] | Cross-site Scripting in Gogs | Cross-site scripting (XSS) vulnerability in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.8 allows remote attackers to inject arbitrary web script or HTML via the text parameter to api/v1/markdown. | [] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8683'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98693'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://gogs.io/docs/intro/change_log.html'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/34'}, {'type': 'WEB', 'url': 'https://www.securityfocus.com/archive/1/533996/100/0/threaded'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:31:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6rg3-8h8x-5xfv | 2021-10-05T17:24:11Z | 2021-06-23T18:04:50Z | null | [] | Unchecked hostname resolution could allow access to local network resources by users outside the local network | ### Impact
A newly implemented route allowing users to download files from remote endpoints was not properly verifying the destination hostname for user provided URLs. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible.
This vulnerability requires valid authentication credentials and is therefore **not exploitable by unauthenticated users**. If you are running an instance for yourself or other trusted individuals this impact is unlikely to be of major concern to you. However, you should still upgrade for security sake.
### Patches
Users should upgrade to the latest version of Wings.
### Workarounds
There is no workaround available that does not involve modifying Panel or Wings code.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}] | [{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}] | {'cwe_ids': ['CWE-284', 'CWE-441'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T18:04:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cjjc-xp8v-855w | 2023-08-30T00:21:00Z | 2021-06-23T18:02:39Z | null | ['CVE-2020-7919'] | Helm uses crypto package vulnerable to panic from malformed X.509 certificate | The Helm core maintainers have identified a high severity security vulnerability in Go's `crypto` package affecting all versions prior to Helm 2.16.8 and Helm 3.1.0.
Thanks to @ravin9249 for identifying the vulnerability.
### Impact
Go before 1.12.16 and 1.13.x before 1.13.7 (and the `crypto/cryptobyte` package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients resulting in a panic via a malformed X.509 certificate. This may allow a remote attacker to cause a denial of service.
### Patches
A patch to compile Helm against Go 1.14.4 has been provided for Helm 2 and is available in Helm 2.16.8. Helm 3.1.0 and newer are compiled against Go 1.13.7+.
### Workarounds
No workaround is available. Users are urged to upgrade.
### References
- https://nvd.nist.gov/vuln/detail/CVE-2020-7919
- https://github.com/helm/helm/pull/8288
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Helm repository](https://github.com/helm/helm/issues)
* For security-specific issues, email us at <cncf-helm-security@lists.cncf.io> | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/helm/helm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.16.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/helm/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20200124225646-8b5121be2f68'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7919'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://go.dev/cl/216677'}, {'type': 'WEB', 'url': 'https://go.dev/cl/216680'}, {'type': 'WEB', 'url': 'https://go.dev/issue/36837'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/golang-announce'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/golang-announce/Hsw4mHYc470'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/Hsw4mHYc470'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0229'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4848'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T22:07:33Z', 'nvd_published_at': '2020-03-16T21:15:00Z'} |
1.4.0 | GHSA-fg5w-w99f-rj6w | 2022-06-29T20:41:05Z | 2021-06-08T23:15:35Z | null | ['CVE-2021-29300'] | Command Injection in @ronomon/opened | The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@ronomon/opened'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300'}, {'type': 'WEB', 'url': 'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4775'}, {'type': 'PACKAGE', 'url': 'https://github.com/ronomon/opened'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T16:56:53Z', 'nvd_published_at': '2021-05-24T16:15:00Z'} |
1.4.0 | GHSA-mh82-55cm-6gfh | 2022-06-29T20:42:39Z | 2021-06-08T23:16:03Z | null | ['CVE-2021-25945'] | Prototype pollution vulnerability in js-extend | Prototype pollution vulnerability in 'js-extend' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25945'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmattos/js-extend'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25945'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T23:04:49Z', 'nvd_published_at': '2021-05-26T15:15:00Z'} |
1.4.0 | GHSA-p55x-7x9v-q8m4 | 2021-05-20T20:59:20Z | 2021-06-29T21:45:07Z | null | ['CVE-2017-15133'] | Denial of Service in miekg-dns | A denial of service flaw was found in miekg-dns before 1.0.4. A remote attacker could use carefully timed TCP packets to block the DNS server from accepting new connections. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/miekg/dns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15133'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/issues/627'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/pull/631'}, {'type': 'WEB', 'url': 'https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1538763'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0006'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:59:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m45g-f45x-vv22 | 2021-05-20T21:19:40Z | 2021-06-23T17:20:38Z | null | ['CVE-2021-31232'] | Improper input validation in CNCF Cortex | The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cortexproject/cortex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31232'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex/pull/4129/files'}, {'type': 'WEB', 'url': 'https://community.grafana.com/c/security-announcements'}, {'type': 'WEB', 'url': 'https://github.com/cortexproject/cortex'}, {'type': 'WEB', 'url': 'https://lists.cncf.io/g/cortex-users/message/50'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:19:40Z', 'nvd_published_at': '2021-04-30T13:15:00Z'} |
1.4.0 | GHSA-c56f-grv3-gpfr | 2021-06-02T19:27:50Z | 2021-06-07T22:10:13Z | null | ['CVE-2021-23388'] | Regular expression denial of service in forms | The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'forms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23388'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/pull/214'}, {'type': 'WEB', 'url': 'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FORMS-1296389'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:27:50Z', 'nvd_published_at': '2021-06-01T14:15:00Z'} |
1.4.0 | GHSA-gxcm-36qw-j29v | 2021-05-07T16:03:29Z | 2021-06-08T20:12:02Z | null | ['CVE-2021-27672'] | SQL Injection in tribalsystems/zenario | SQL Injection in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the "cID" parameter when creating a new HTML component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.53370'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27672'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}, {'type': 'WEB', 'url': 'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T16:03:29Z', 'nvd_published_at': '2021-04-15T14:15:00Z'} |
1.4.0 | GHSA-px9f-597f-wmcf | 2021-03-26T23:09:59Z | 2021-06-16T17:43:36Z | null | ['CVE-2021-27576'] | Uncontrolled Resource Consumption in Apache OpenMeetings server | If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27576'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8'}, {'type': 'WEB', 'url': 'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OPENMEETINGS-2551'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E'}, {'type': 'WEB', 'url': 'https://openmeetings.apache.org/security.html#cve-2021-27576---apache-openmeetings-bandwidth-can'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T23:09:59Z', 'nvd_published_at': '2021-03-15T09:15:00Z'} |
1.4.0 | GHSA-49q3-8867-5wmp | 2021-06-08T15:31:31Z | 2021-06-08T18:47:06Z | null | ['CVE-2021-32673'] | Remote Command Execution in reg-keygen-git-hash-plugin | ### Impact
`reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands.
### Patches
Upgrade to version 0.10.16 or later.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-suit)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'reg-keygen-git-hash-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.16'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32673'}, {'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'}, {'type': 'WEB', 'url': 'https://github.com/reg-viz/reg-suit/releases/tag/v0.10.16'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin'}] | {'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T15:31:31Z', 'nvd_published_at': '2021-06-08T17:15:00Z'} |
1.4.0 | GHSA-29qj-rvv6-qrmv | 2021-06-01T20:09:20Z | 2021-06-15T16:05:22Z | null | ['CVE-2020-10688'] | Cross-site scripting in RESTEasy | A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.3.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.2.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10688'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/issues/7248'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1814974'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-2519'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0008/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:09:20Z', 'nvd_published_at': '2021-05-27T19:15:00Z'} |
1.4.0 | GHSA-2f88-5hg8-9x2x | 2023-08-15T17:39:29Z | 2021-06-16T17:32:49Z | null | ['CVE-2021-26291'] | Origin Validation Error in Apache Maven | Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven:maven-compat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven:maven-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26291'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven/commit/899465aeec03753ea91e15a79579eab76369c016'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven/commit/fa79cb22e456cc65522b5bab8c4240fe08c5775f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/maven'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MNG-7116'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MNG-7117'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0556ce5db7231025785477739ee416b169d8aff5ee9bac7854d64736@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06db4057b74e0598a412734f693a34a8836ac6f06d16d139e5e1027c@%3Cdev.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07a89b32783f73bda6903c1f9aadeb859e5bef0a4daed6d87db8e4a9@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a401f8c98a99f68d061fde6e6659d695f28d60fe4f0413bcb355b0@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a5e4ff2a7ca7ad8595d7683afbaeb3b8788ba974681907f97e7dc8e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d083314aa3934dd4b6e6970d1f6ee50f6eaa9d867deb2cd96788478@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30e9fcba679d164158cc26236704c351954909c18cb2485d11038aa6@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r340e75c9bb6e8661b89e1cf2c52f4638a18312e57bd884722bc28f52@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r39fa6ec4b7e912d3e04ea68efd23e554ec9c8efa2c96f5b45104fc61@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f0450dcab7e63b5f233ccfbc6fca5f1867a75c8aa2493ea82732381@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r52c6cda14dc6315dc79e72d30109f4589e9c6300ef6dc1a019da32d4@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r53cd5de57aaa126038c5301d8f518f3defab3c5b1c7e17c97bad08d8@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5ae6aaa8a2ce86145225c3516bb45d315c0454e3765d651527e5df8a@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71bc13669be84c2ff45b74a67929bc2da905c152e12a39b406e3c2a0@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7212b874e575e59d648980d91bc22e684906aee9b211ab92da9591f5@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74329c671df713f61ae4620ee2452a0443ccad7f33c60e8ed7d21ff9@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78fb6d2cf0ca332cfa43abd4471e75fa6c517ed9cdfcb950bff48d40@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86aebd0387ae19b740b3eb28bad83fe6aceca0d6257eaa810a6e0002@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86e1c81e03f441855f127980e9b3d41939d04a7caea2b7ab718e2288@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96cc126d3ee9aa42af9d3bb4baa94828b0a5f656584a50dcc594125f@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00%40%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00@%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra88a0eba7f84658cefcecc0143fd8bbad52c229ee5dfcbfdde7b6457@%3Cdev.jena.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9d984eccfd2ae7726671e025f0296bf03786e5cdf872138110ac29b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7ae2530063d1cd1cf8e9fa130d10940760f927168d4063d23b8cd0a@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd6c3a36f1dbc130da1b89d0f320db7040de71661a512695a8d513ac@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re75f8b3dbc5faa1640908f87e644d373e00f8b4e6ba3e2ba4bd2c80b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red3bf6cbfd99e36b0c0a4fa1cea1eef1eb300c6bd8f372f497341265@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://maven.apache.org/docs/3.8.1/release-notes.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/23/5'}] | {'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T22:21:03Z', 'nvd_published_at': '2021-04-23T15:15:00Z'} |
1.4.0 | GHSA-7gfg-6934-mqq2 | 2023-02-14T00:18:06Z | 2021-06-29T21:34:57Z | null | ['CVE-2019-20786'] | Improper Authenication in Pion DTLS | handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20786'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/pion/dtls'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/compare/v1.5.1...v1.5.2'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0038'}, {'type': 'WEB', 'url': 'https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean'}, {'type': 'WEB', 'url': 'https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:54:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x3wr-v4wx-5qpc | 2022-06-29T20:41:54Z | 2021-06-21T17:14:01Z | null | ['CVE-2021-25948'] | Prototype Pollution | Prototype pollution vulnerability in ‘expand-hash’ versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'expand-hash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25948'}, {'type': 'PACKAGE', 'url': 'https://github.com/doowb/expand-hash'}, {'type': 'WEB', 'url': 'https://github.com/doowb/expand-hash/blob/556913f6c2f05848110b5b8261cfc78e5ce3dc77/index.js#L19'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:29:17Z', 'nvd_published_at': '2021-06-10T12:15:00Z'} |
1.4.0 | GHSA-339j-hqgx-qrrx | 2023-08-08T19:57:23Z | 2021-06-21T17:13:06Z | null | ['CVE-2021-23395'] | Prototype Pollution in nedb | This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'nedb'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23395'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NEDB-1305279'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:12:32Z', 'nvd_published_at': '2021-06-15T20:15:00Z'} |
1.4.0 | GHSA-pwhf-39xg-4rxw | 2021-06-04T19:23:33Z | 2021-06-04T19:09:35Z | null | ['CVE-2021-32660'] | Script injection | ### Impact
A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data.
The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store.
### Patches
The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@backstage/techdocs-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03'}] | {'cwe_ids': ['CWE-434', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:02:53Z', 'nvd_published_at': '2021-06-03T17:15:00Z'} |
1.4.0 | GHSA-jmgg-wx67-7qfv | 2021-05-20T22:17:17Z | 2021-06-22T15:23:33Z | null | ['CVE-2020-13252'] | Command Injection in Centreon | Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.04.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13252'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/8467'}, {'type': 'WEB', 'url': 'https://engindemirbilek.github.io/centreon-19.10-rce'}, {'type': 'WEB', 'url': 'https://github.com/EnginDemirbilek/EnginDemirbilek.github.io/blob/master/centreon-19.10-rce.html'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/compare/19.04.13...19.04.15'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:17:17Z', 'nvd_published_at': '2020-05-21T04:15:00Z'} |
1.4.0 | GHSA-qrg9-f472-qwfm | 2021-06-24T19:46:19Z | 2021-06-28T16:55:58Z | null | ['CVE-2021-31412'] | Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19 | Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.
- https://vaadin.com/security/cve-2021-31412 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 14.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '19.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.0.8'}}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-qrg9-f472-qwfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31412'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/11107'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31412'}] | {'cwe_ids': ['CWE-1295', 'CWE-20', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:46:19Z', 'nvd_published_at': '2021-06-24T12:15:00Z'} |
1.4.0 | GHSA-67f6-c8mx-4q2m | 2021-05-19T19:47:05Z | 2021-06-16T17:21:11Z | null | ['CVE-2021-32053'] | Uncontrolled Resource Consumption in JPA Server in HAPI FHIR | JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:hapi-fhir-jpaserver-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32053'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/hapi-fhir/issues/2641'}, {'type': 'WEB', 'url': 'https://github.com/hapifhir/hapi-fhir/pull/2642'}, {'type': 'WEB', 'url': 'https://hapifhir.io'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:47:05Z', 'nvd_published_at': '2021-05-10T21:15:00Z'} |
1.4.0 | GHSA-xpxm-pf7g-2534 | 2021-05-03T16:41:32Z | 2021-06-08T20:11:52Z | null | ['CVE-2021-31778'] | Cross-site scripting in media2click | The media2click (aka 2 Clicks for External Media) extension 1.x before 1.3.3 for TYPO3 allows XSS by a backend user account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'amazing/media2click'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31778'}, {'type': 'WEB', 'url': 'https://github.com/ghermens/media2click/commit/3c4e413fbc7d35c47212e754c24d5070637a11a3'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/amazing/media2click'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-004'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T16:41:32Z', 'nvd_published_at': '2021-04-28T07:15:00Z'} |
1.4.0 | GHSA-g7w8-pp9w-7p32 | 2021-10-05T17:26:03Z | 2021-06-28T16:57:32Z | null | [] | Creation of order credits was not validated by acl in admin orders | ### Impact
Creation of order credits was not validated by ACL in admin orders
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/download/#shopware-6'}] | {'cwe_ids': ['CWE-306'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T19:19:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jq42-hfch-42f3 | 2021-10-05T17:22:08Z | 2021-06-01T21:20:53Z | null | [] | Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint | # Impact
Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint.
An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container.
Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint.
# Patches
All users should upgrade to Singularity 3.7.4 or later.
# Workarounds
Users who only interact with the default remote endpoint or do not use the library:// url are not affected.
Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected.
# Acknowledgements
This issue was found by Mike Frisch and brought to our attention by Sylabs. Sylabs is making a [coordinated disclosure](https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394).
# For more information
General questions about the impact of the advisory can be asked in the:
[Singularity Slack Channel](https://join.slack.com/t/hpcng/shared_invite/zt-qda4h1ls-OP0Uouq6sSmVE6i_0NrWdw)
[Singularity Mailing List](https://groups.google.com/a/lbl.gov/g/singularity)
Any sensitive security concerns should be directed to: [singularity-security@hpcng.org](mailto:singularity-security@hpcng.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hpcng/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.2'}, {'fixed': '3.7.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394'}, {'type': 'PACKAGE', 'url': 'https://github.com/hpcng/singularity'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T20:04:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-px4h-xg32-q955 | 2021-10-27T17:04:15Z | 2021-06-08T23:11:43Z | null | ['CVE-2021-33502'] | ReDoS in normalize-url | The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'normalize-url'}, 'ecosystem_specific': {'affected_functions': ['normalize-url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33502'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/normalize-url'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210706-0001/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T17:56:25Z', 'nvd_published_at': '2021-05-24T16:15:00Z'} |
1.4.0 | GHSA-7r96-8g3x-g36m | 2022-01-04T19:36:52Z | 2021-06-28T17:16:56Z | null | [] | Improper Verification of Cryptographic Signature | ### Impact
The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid.
### Patches
Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verification method, the previous signatures are still valid. We highly recommend reverifying any signatures that were previously verified with the vulnerable `verifyWithMessage` method.
### Workarounds
In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. For example, the return statement should start with `return this.verify(signed, password).verified && ` instead of `return this.verify(signed, password) && `.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/TogaTech/tEnvoy](https://github.com/TogaTech/tEnvoy)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tenvoy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'}, {'type': 'WEB', 'url': 'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'}, {'type': 'PACKAGE', 'url': 'https://github.com/TogaTech/tEnvoy'}] | {'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:14:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rfcf-m67m-jcrq | 2021-10-21T13:55:20Z | 2021-06-21T17:03:44Z | null | ['CVE-2021-32693'] | Authentication granted to all firewalls instead of just one | Description
-----------
When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on one part of the application is considered authenticated on the whole application.
Resolution
----------
We now ensure that the authenticated token is only available for the firewall that generates it.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728) for branch 5.3.
Credits
-------
I would like to thank Bogdan, gndk, Paweł Warchoł, Warxcell, and Adrien Lamotte for reporting the issue and Wouter J for fixing the issue.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693'}, {'type': 'WEB', 'url': 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/security-http'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T20:33:08Z', 'nvd_published_at': '2021-06-17T23:15:00Z'} |
1.4.0 | GHSA-4pwq-fj89-6rjc | 2022-08-11T17:00:17Z | 2021-06-18T18:29:54Z | null | ['CVE-2020-13944'] | Apache Airflow Cross-site Scripting | In Apache Airflow < 1.10.12, the `origin` parameter passed to some of the endpoints like `/trigger` and was vulnerable to a XSS exploit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13944'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/11/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/01/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T17:35:39Z', 'nvd_published_at': '2020-09-17T14:15:00Z'} |
1.4.0 | GHSA-g6xv-8q23-w2q3 | 2021-05-20T16:59:51Z | 2021-06-29T18:32:48Z | null | ['CVE-2014-8682'] | SQL Injection in Gogs | Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8682'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/0c5ba4573aecc9eaed669e9431a70a5d9f184b8d'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98694'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/35238'}, {'type': 'WEB', 'url': 'http://gogs.io/docs/intro/change_log.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/33'}, {'type': 'WEB', 'url': 'http://www.exploit-db.com/exploits/35238'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/533995/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/71187'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:59:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xw37-57qp-9mm4 | 2023-02-09T19:40:33Z | 2021-06-29T21:14:16Z | null | ['CVE-2020-26265'] | Consensus flaw during block processing in github.com/ethereum/go-ethereum | ### Impact
A consensus-vulnerability in Geth could cause a chain split, where vulnerable versions refuse to accept the canonical chain.
### Description
A flaw was repoted at 2020-08-11 by John Youngseok Yang (Software Platform Lab), where a particular sequence of transactions could cause a consensus failure.
- Tx 1:
- `sender` invokes `caller`.
- `caller` invokes `0xaa`. `0xaa` has 3 wei, does a self-destruct-to-self
- `caller` does a `1 wei` -call to `0xaa`, who thereby has 1 wei (the code in `0xaa` still executed, since the tx is still ongoing, but doesn't redo the selfdestruct, it takes a different path if callvalue is non-zero)
- Tx 2:
- `sender` does a 5-wei call to 0xaa. No exec (since no code).
In geth, the result would be that `0xaa` had `6 wei`, whereas OE reported (correctly) `5` wei. Furthermore, in geth, if the second tx was not executed, the `0xaa` would be destructed, resulting in `0 wei`. Thus obviously wrong.
It was determined that the root cause was this [commit](https://github.com/ethereum/go-ethereum/commit/223b950944f494a5b4e0957fd9f92c48b09037ad) from [this PR](https://github.com/ethereum/go-ethereum/pull/19953). The semantics of `createObject` was subtly changd, into returning a non-nil object (with `deleted=true`) where it previously did not if the account had been destructed. This return value caused the new object to inherit the old `balance`:
```golang
func (s *StateDB) CreateAccount(addr common.Address) {
newObj, prev := s.createObject(addr)
if prev != nil {
newObj.setBalance(prev.data.Balance)
}
}
```
It was determined that the minimal possible correct fix was
```diff
+++ b/core/state/statedb.go
@@ -589,7 +589,10 @@ func (s *StateDB) createObject(addr common.Address) (newobj, prev *stateObject)
s.journal.append(resetObjectChange{prev: prev, prevdestruct: prevdestruct})
}
s.setStateObject(newobj)
- return newobj, prev
+ if prev != nil && !prev.deleted {
+ return newobj, prev
+ }
+ return newobj, nil
```
### Patches
See above. The fix was included in Geth `v1.9.20` "Paragade".
### Credits
The bug was found by @johnyangk and reported via bounty@ethereum.org.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.4'}, {'fixed': '1.9.20'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26265'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21080'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/21409'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0105'}] | {'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:15:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7rg4-266c-jqw6 | 2022-06-29T20:41:29Z | 2021-06-08T20:12:56Z | null | ['CVE-2021-28055'] | Predictable CSRF tokens in centreon/centreon | An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.10.0'}, {'fixed': '20.10.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.04.0'}, {'fixed': '20.04.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.10.0'}, {'fixed': '19.10.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.37'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28055'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/9612'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/19.10.23'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/2.8.37'}] | {'cwe_ids': ['CWE-330', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T15:18:01Z', 'nvd_published_at': '2021-04-15T19:15:00Z'} |
1.4.0 | GHSA-9f46-5r25-5wfm | 2021-09-21T14:55:38Z | 2021-06-29T03:13:28Z | null | ['CVE-2021-32708'] | Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem | ### Impact
The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely.
The conditions:
- A user is allowed to supply the path or filename of an uploaded file.
- The supplied path or filename is not checked against unicode chars.
- The supplied pathname checked against an extension deny-list, not an allow-list.
- The supplied path or filename contains a unicode whitespace char in the extension.
- The uploaded file is stored in a directory that allows PHP code to be executed.
Given these conditions are met a user can upload and execute arbitrary code on the system under attack.
### Patches
The unicode whitespace removal has been replaced with a rejection (exception).
The library has been patched in:
- 1.x: https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32
- 2.x: https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74
### Workarounds
For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'league/flysystem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'league/flysystem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32708'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32'}, {'type': 'PACKAGE', 'url': 'https://github.com/thephpleague/flysystem'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNZSWK4GOMJOOHKLZEOE5AQSLC4DNCRZ/'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/league/flysystem'}] | {'cwe_ids': ['CWE-367'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-24T18:03:15Z', 'nvd_published_at': '2021-06-24T17:15:00Z'} |
1.4.0 | GHSA-hwqm-x785-qh8p | 2021-05-12T22:03:39Z | 2021-06-23T17:52:33Z | null | ['CVE-2020-12797'] | Incorrect Permission Assignment for Critical Resource in Hashicorp Consul | HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/structs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/structs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12797'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/5606'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/8047'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/98eea08d3ba1b220a14cf6eedf3b6b07ae2795d7'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md'}] | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T22:03:39Z', 'nvd_published_at': '2020-06-11T20:15:00Z'} |
1.4.0 | GHSA-qpxw-6473-ppww | 2021-05-25T20:45:01Z | 2021-06-22T15:23:04Z | null | ['CVE-2020-12467'] | Session Fixation in Subrion CMS | Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12467'}, {'type': 'WEB', 'url': 'https://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Session%20Fixation'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:45:01Z', 'nvd_published_at': '2020-04-29T21:15:00Z'} |
1.4.0 | GHSA-qm57-vhq3-3fwf | 2021-05-20T15:13:24Z | 2021-06-09T17:14:51Z | null | ['CVE-2021-32052'] | Header injection possible in Django | In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32052'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e1e81aa1c4427411e3c68facdd761229ffea6f6f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1944801'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0002/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/may/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/06/1'}] | {'cwe_ids': ['CWE-79', 'CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:12:45Z', 'nvd_published_at': '2021-05-06T16:15:00Z'} |
1.4.0 | GHSA-599h-8wpj-75xj | 2021-05-20T21:24:49Z | 2021-06-23T17:23:30Z | null | ['CVE-2021-23365'] | Authentication Bypass in tyk-identity-broker | The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tyktechnologies/tyk-identity-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23365'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/pull/147'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0'}, {'type': 'WEB', 'url': 'https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:24:49Z', 'nvd_published_at': '2021-04-26T10:15:00Z'} |
1.4.0 | GHSA-4ffq-6g62-j4v4 | 2022-12-13T16:27:53Z | 2021-06-16T17:29:43Z | null | ['CVE-2021-21620'] | Cross-Site Request Forgery in the Jenkins Claim plugin | Claim Plugin 2.18.1 and earlier does not require POST requests for the form submission endpoint assigning claims, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to change claims.
Claim Plugin 2.18.2 requires POST requests for the affected HTTP endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:claim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21620'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/claim-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(2)'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:25:26Z', 'nvd_published_at': '2021-02-24T16:15:00Z'} |
1.4.0 | GHSA-hjfx-8p6c-g7gx | 2023-09-04T16:28:23Z | 2021-06-08T18:49:20Z | null | ['CVE-2021-28678'] | Insufficient Verification of Data Authenticity in Pillow | An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '8.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28678'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377/commits/496245aa4365d0827390bd0b6fbd11287453b3a1'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}] | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:38:37Z', 'nvd_published_at': '2021-06-02T16:15:00Z'} |
1.4.0 | GHSA-fh37-cx83-q542 | 2021-05-07T21:48:45Z | 2021-06-18T18:30:11Z | null | ['CVE-2021-26697'] | Improper Authentication in Apache Airflow | The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue only affects Apache Airflow 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26697'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/17/2'}] | {'cwe_ids': ['CWE-269', 'CWE-287', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:48:45Z', 'nvd_published_at': '2021-02-17T15:15:00Z'} |
1.4.0 | GHSA-qq3j-xp49-j73f | 2021-05-24T20:57:17Z | 2021-06-23T18:14:36Z | null | ['CVE-2020-4053'] | Plugin archive directory traversal in Helm | The Helm core maintainers have identified an information disclosure
vulnerability in Helm 3.0.0-3.2.3.
### Impact
A traversal attack is possible when installing Helm plugins from a tar
archive over HTTP. It is possible for a malicious plugin author to inject a relative
path into a plugin archive, and copy a file outside of the intended directory.
Traversal Attacks are a form of a Directory Traversal that can be exploited by
extracting files from an archive. The premise of the Directory Traversal
vulnerability is that an attacker can gain access to parts of the file system
outside of the target folder in which they should reside. The attacker can
then overwrite executable files and either invoke them remotely or wait for
the system or user to call them, thus achieving Remote Command Execution on
the victim's machine. The vulnerability can also cause damage by overwriting
configuration files or other sensitive resources, and can be exploited on both
client (user) machines and servers.
https://snyk.io/research/zip-slip-vulnerability
### Patches
This issue has been fixed in Helm 3.2.4
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Helm repository](https://github.com/helm/helm/issues)
* For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3/pkg/plugin/installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-qq3j-xp49-j73f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/8317'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.2.4'}] | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T20:57:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w5rh-j4g3-jr29 | 2023-05-24T14:45:31Z | 2021-06-16T17:29:17Z | null | ['CVE-2021-21651'] | Missing Authorization in Jenkins S3 publisher Plugin | Jenkins S3 publisher Plugin prior to 0.11.7 and 0.11.5.1 does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to obtain the list of configured profiles.
S3 publisher Plugin 0.11.7 and 0.11.5.1 performs permission checks when providing a list of configured profiles. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.6'}, {'fixed': '0.11.7'}]}], 'versions': ['0.11.6']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21651'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2021/21xxx/CVE-2021-21651.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2201'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:59:06Z', 'nvd_published_at': '2021-05-11T15:15:00Z'} |
1.4.0 | GHSA-q2q7-5pp4-w6pg | 2021-10-21T16:39:49Z | 2021-06-01T21:19:32Z | null | ['CVE-2021-33503'] | Catastrophic backtracking in URL authority parser when passed URL containing many @ characters | ### Impact
When provided with a URL containing many `@` characters in the authority component the authority regular expression exhibits catastrophic backtracking causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
### Patches
The issue has been fixed in urllib3 v1.26.5.
### References
- [CVE-2021-33503](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503)
- [JVNVU#92413403 (English)](https://jvn.jp/en/vu/JVNVU92413403/)
- [JVNVU#92413403 (Japanese)](https://jvn.jp/vu/JVNVU92413403/)
- [urllib3 v1.26.5](https://github.com/urllib3/urllib3/releases/tag/1.26.5)
### For more information
If you have any questions or comments about this advisory:
* Ask in our [community Discord](https://discord.gg/urllib3)
* Email [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.4'}, {'fixed': '1.26.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/security/advisories/GHSA-q2q7-5pp4-w6pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33503'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/5b047b645f5f93900d5e2fc31230848c25eb1f5f#diff-52026d639119bf1e0364836b4e8a18bd9ed3c95c6ba39b26534a5057a65e35bbR65'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q2q7-5pp4-w6pg'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-36'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T22:09:12Z', 'nvd_published_at': '2021-06-29T11:15:00Z'} |
1.4.0 | GHSA-mj8x-cpr8-x39h | 2021-04-19T21:38:56Z | 2021-06-16T17:33:19Z | null | ['CVE-2021-27850'] | Remote code execution in Apache Tapestry | A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.2, upgrade to 5.6.3 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27850'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TAP5-2663'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0002/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/15/1'}] | {'cwe_ids': ['CWE-502', 'CWE-922'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:38:56Z', 'nvd_published_at': '2021-04-15T08:15:00Z'} |
1.4.0 | GHSA-39q4-p535-c852 | 2023-09-07T21:45:40Z | 2021-06-10T17:25:05Z | null | ['CVE-2021-23392'] | Uncontrolled Resource Consumption in locutus | The package locutus before 2.0.15 is vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'locutus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392'}, {'type': 'WEB', 'url': 'https://github.com/locutusjs/locutus/pull/446'}, {'type': 'WEB', 'url': 'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T20:22:09Z', 'nvd_published_at': '2021-06-08T08:15:00Z'} |
1.4.0 | GHSA-rpcg-f9q6-2mq6 | 2021-06-08T17:17:21Z | 2021-06-08T18:45:52Z | null | [] | Remote Code Execution via traversal in TAL expressions | This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities.
### Impact
Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use.
By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk.
### Patches
The problem has been fixed in Zope 5.21 and 4.6.1.
### Workarounds
The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
### References
* [The previous advisory (GHSA-5pr9-v234-jw36)](https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues)
* Email us at [security@plone.org](mailto:security@plone.org)
| [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-08T17:17:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pjc4-3w99-j7v4 | 2022-01-10T21:33:30Z | 2021-06-15T15:56:59Z | null | ['CVE-2021-23393'] | Open redirect in Flask-Unchained | This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Unchained'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23393'}, {'type': 'WEB', 'url': 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'}, {'type': 'WEB', 'url': 'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:36:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mrwr-2945-fr22 | 2021-06-23T18:44:29Z | 2021-06-22T15:17:28Z | null | ['CVE-2021-32245'] | Cross-site scripting in PageKit | In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32245'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/963'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T17:32:02Z', 'nvd_published_at': '2021-06-16T21:15:00Z'} |
1.4.0 | GHSA-24p5-x9f9-vvpx | 2023-07-05T23:17:56Z | 2021-06-08T20:10:27Z | null | ['CVE-2021-20681'] | Cross-site Scripting (XSS) in baserCMS | Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20681'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN64869876'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN64869876/index.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:39:01Z', 'nvd_published_at': '2021-03-26T09:15:00Z'} |
1.4.0 | GHSA-rvwf-54qp-4r6v | 2022-08-11T21:47:32Z | 2021-06-04T21:37:45Z | null | ['CVE-2017-18640'] | SnakeYAML Entity Expansion during load operation | The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18640'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/asomov/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack'}, {'type': 'WEB', 'url': 'https://bitbucket.org/asomov/snakeyaml/wiki/Changes'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/377'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/wiki/Changes'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22ac2aa053b7d9c6b75a49db78125c9316499668d0f4a044f3402e2f@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r28c9009a48d52cf448f8b02cd823da0f8601d2dff4d66f387a35f1e0@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a5b84fdf59042dc398497e914b5bb1aed77328320b1438144ae1953@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b05744c0c2867daa5d1a96832965b7d6220328b0ead06c22a6e7854@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2db207a2431a5e9e95e899858ab1f5eabd9bcc790a6ca7193ae07e94@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r436988d2cfe8a770ae361c82b181c5b2bf48a249bad84d8a55a3b46e@%3Cdev.phoenix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r465d2553a31265b042cf5457ef649b71e0722ab89b6ea94a5d59529b@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c682fb8cf69dd14162439656a6ebdf42ea6ad0e4edba95907ea3f14@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d7f37da1bc2df90a5a0f56eb7629b5ea131bfe11eeeb4b4c193f64a@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5510f0125ba409fc1cabd098ab8b457741e5fa314cbd0e61e4339422@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55d807f31e64a080c54455897c20b1667ec792e5915132c7b7750533@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56805265475919252ba7fc10123f15b91097f3009bae86476624ca25@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r643ba53f002ae59068f9352fe1d82e1b6f375387ffb776f13efe8fda@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r666f29a7d0e1f98fa1425ca01efcfa86e6e3856e01d300828aa7c6ea@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c91e52b3cc9f4e64afe0f34f20507143fd1f756d12681a56a9b38da@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d54c2da792c74cc14b9b7665ea89e144c9e238ed478d37fd56292e6@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72a3588d62b2de1361dc9648f5d355385735e47f7ba49d089b0e680d@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8464b6ec951aace8c807bac9ea526d4f9e3116aa16d38be06f7c6524@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b57c57cffa01e418868a3c7535b987635ff1fb5ab534203bfa2d64a@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r900e020760c89f082df1c6e0d46320eba721e4e47bb9eb521e68cd95@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raebd2019b3da8c2f90f31e8b203b45353f78770ca93bfe5376f5532e@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb0e033d5ec8233360203431ad96580cf2ec56f47d9a425d894e279c2@%3Cpr.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb34d8d3269ad47a1400f5a1a2d8310e13a80b6576ebd7f512144198d@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5c33d0069c927fae16084f0605895b98d231d7c48527bcb822ac48c@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7b28ac741e32dd5edb2c22485d635275bead7290b056ee56baf8ce0@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaa1f513d903c89a08267c91d86811fa5bcc82e0596b6142c5cea7ea@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3211c71f7e0973a1825d1988a3921288c06cd9d793eae97ecd34948@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb2a7037366c58bac6aec6ce3df843a11ef97ae4eb049f05f410eaa5@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb4b61dbe2ed1c7a88781a9aff5a9e7342cc7ed026aec0418ee67596@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce5c93bba6e815fb62ad38e28ca1943b3019af1eddeb06507ad4e11a@%3Ccommits.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd582c64f66c354240290072f340505f5d026ca944ec417226bb0272e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd34c0479587e32a656d976649409487d51ca0d296b3e26b6b89c3f5@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re791a854001ec1f79cd4f47328b270e7a1d9d7056debb8f16d962722@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re851bbfbedd47c690b6e01942acb98ee08bd00df1a94910b905bc8cd@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb1751562ee5146d3aca654a2df76a2c13d8036645ce69946f9c219e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/recfe569f4f260328b0036f1c82b2956e864d519ab941a5e75d0d832d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf95bebee6dfcc55067cebe8482bd31e6f481d9f74ba8e03f860c3ec7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe0aab6c3bebbd9cbfdedb65ff3fdf420714bcb8acdfd346077e1263@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKN7VGIKTYBCAKYBRG55QHXAY5UDZ7HA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTVJC54XGX26UJVVYCXZ7D25X3R5T2G6/'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.yaml/snakeyaml/1.25/usages'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-28'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}] | {'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T21:34:16Z', 'nvd_published_at': '2019-12-12T03:15:00Z'} |
1.4.0 | GHSA-7q44-r25x-wm4q | 2021-06-30T18:13:17Z | 2021-06-22T15:17:51Z | null | ['CVE-2021-34551'] | Remote Code Execution vulnerability in PHPMailer 6.4.1 running on Windows | PHPMailer 6.4.1 contains a possible remote code execution vulnerability through the `$lang_path` parameter of the `setLanguage()` method. If the `$lang_path` parameter is passed unfiltered from user input, it can be set to [a UNC path](https://docs.microsoft.com/en-us/dotnet/standard/io/file-path-formats#unc-paths), and if an attacker is also able to create a remote mount on the server that the UNC path points to, a script file under their control may be executed.
### Impact
Arbitrary code may be run by a remote attacker under the web server or PHP process running on Window hosts.
### Patches
Mitigated in PHPMailer 6.5.0 by no longer treating translation files as PHP code, but by parsing their text content directly.
This approach avoids the possibility of executing unknown code while retaining backward compatibility. This isn't ideal, so the current translation format is deprecated and will be replaced in the next major release.
### Workarounds
Any of:
* Ensure that calling code does not pass unfiltered user-supplied data to the `$lang_path` parameter of the `setLanguage()` method.
* Block or filter the use of unknown UNC paths in this parameter (or altogether).
* Ensure that unauthorised users do not have the ability to read from unknown remote servers via UNC paths.
* Run on an OS that does not support UNC paths
### References
[CVE-2021-34551](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34551).
Reported by [listensec.com](https://listensec.com) via Tidelift.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [PHPMailer](https://github.com/PHPMailer/PHPMailer)
* [Email the maintainers](mailto:phpmailer@synchromedia.co.uk)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7q44-r25x-wm4q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34551'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/'}] | {'cwe_ids': ['CWE-434', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T19:50:57Z', 'nvd_published_at': '2021-06-16T18:15:00Z'} |
1.4.0 | GHSA-mw3r-pfmg-xp92 | 2021-10-21T18:58:58Z | 2021-06-16T17:37:11Z | null | ['CVE-2021-23926'] | Improper Restriction of Recursive Entity References in Apache XMLBeans | The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlbeans:xmlbeans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23926'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/XMLBEANS-517'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html'}, {'type': 'WEB', 'url': 'https://poi.apache.org/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-776'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:33:29Z', 'nvd_published_at': '2021-01-14T15:15:00Z'} |
1.4.0 | GHSA-rmpv-rcp6-v8wc | 2021-05-27T22:04:38Z | 2021-06-08T23:20:11Z | null | ['CVE-2021-33508'] | Cross-site scripting in Plone | Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33508'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T22:04:38Z', 'nvd_published_at': '2021-05-21T22:15:00Z'} |
1.4.0 | GHSA-mr6h-chqp-p9g2 | 2023-02-09T20:01:35Z | 2021-06-29T18:32:44Z | null | ['CVE-2014-8681'] | SQL Injection in gogs.io/gogs | SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gogits/gogs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '0.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8681'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogits/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogits/gogs/releases/tag/v0.5.8'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0021'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2014/Nov/31'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150711111508/http://gogs.io/docs/intro/change_log.html#v0.5.8-%40-2014-11-19'}, {'type': 'WEB', 'url': 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8681'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/35237'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Nov/31'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:47:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8wwf-2644-f8x4 | 2023-08-07T14:11:00Z | 2021-06-15T15:49:01Z | null | ['CVE-2021-34363'] | The Fuck Arbitrary File Deletion via Path Traversal | The thefuck (aka _The Fuck_) is app that corrects errors in previous console commands. _The Fuck_ python package before 3.31 allows Path Traversal that leads to arbitrary file deletion via the `undo archive operation` feature. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'thefuck'}, 'ecosystem_specific': {'affected_functions': ['thefuck.rules.dirty_untar.side_effect', 'thefuck.rules.dirty_unzip.side_effect']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34363'}, {'type': 'WEB', 'url': 'https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvbn/thefuck'}, {'type': 'WEB', 'url': 'https://github.com/nvbn/thefuck/releases/tag/3.31'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MEDDLBFVRUQHPYIBJ4MFM3M4NUJUXL5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YA6UNQSOY6M3NJDZLS6YJXTS4WGDMEEJ/'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/48'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:25:06Z', 'nvd_published_at': '2021-06-10T11:15:00Z'} |
1.4.0 | GHSA-gq5r-cc4w-g8xf | 2023-08-30T18:52:39Z | 2021-06-23T17:25:08Z | null | [] | gosaml2 is vulnerable to NULL Pointer Dereference from malformed XML signatures | This affects all versions less than 0.7.0 of package github.com/russellhaering/gosaml2. There is a crash on null pointer dereference caused by sending malformed XML signatures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7731'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/issues/59'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/pull/90'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/commit/66e3b7affd622b8b24ea1e18845f045e46b23424'}, {'type': 'PACKAGE', 'url': 'https://github.com/russellhaering/gosaml2'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/releases/tag/v0.7.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302'}] | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:39:22Z', 'nvd_published_at': '2021-04-30T16:15:00Z'} |
1.4.0 | GHSA-8h2j-cgx8-6xv7 | 2021-06-17T20:06:14Z | 2021-06-10T15:43:54Z | null | ['CVE-2021-32677'] | Cross-Site Request Forgery (CSRF) in FastAPI | ### Impact
FastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack.
In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `content-type` header sent was not set to `application/json` or a compatible JSON media type (e.g. `application/geo+json`).
So, a request with a content type of `text/plain` containing JSON data would be accepted and the JSON data would be extracted.
But requests with content type `text/plain` are exempt from [CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) preflights, for being considered [Simple requests](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests). So, the browser would execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application.
### Patches
This is fixed in FastAPI `0.65.2`.
The request data is now parsed as JSON only if the `content-type` header is `application/json` or another JSON compatible media type like `application/geo+json`.
### Workarounds
It's best to upgrade to the latest FastAPI.
But still, it would be possible to add a middleware or a dependency that checks the `content-type` header and aborts the request if it is not `application/json` or another JSON compatible content type.
### References
* [CORS on Mozilla web docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS)
* [This answer on StackExchange](https://security.stackexchange.com/questions/157528/ways-to-bypass-browsers-cors-policy/157531#157531)
* [OWASP CSRF](https://owasp.org/www-community/attacks/csrf)
* Fixed in PR [#2118](https://github.com/tiangolo/fastapi/pull/2118)
### For more information
If you have any questions or comments, write to [security@tiangolo.com](mailto:security@tiangolo.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'fastapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.65.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tiangolo/fastapi/security/advisories/GHSA-8h2j-cgx8-6xv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32677'}, {'type': 'WEB', 'url': 'https://github.com/tiangolo/fastapi/commit/fa7e3c996edf2d5482fff8f9d890ac2390dede4d'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MATAWX25TYKNEKLDMKWNLYDB34UWTROA/'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T13:34:54Z', 'nvd_published_at': '2021-06-09T18:15:00Z'} |
1.4.0 | GHSA-rrvg-2c69-p9rf | 2022-12-15T18:20:16Z | 2021-06-16T17:28:58Z | null | ['CVE-2021-21652'] | CSRF vulnerability in Jenkins Xray - Test Management for Jira Plugin allows capturing credentials | Xray - Test Management for Jira Plugin 2.4.0 and earlier does not require POST requests for a connection test method, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Xray - Test Management for Jira Plugin 2.4.1 requires POST requests for the affected connection test method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xray-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21652'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xray-connector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(1)'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:12:26Z', 'nvd_published_at': '2021-05-11T15:15:00Z'} |
1.4.0 | GHSA-8j34-9876-pvfq | 2021-05-21T18:15:45Z | 2021-06-23T17:28:26Z | null | ['CVE-2020-26284'] | Hugo can execute a binary from the current directory on Windows | ## Impact
Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. However, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one.
Windows users who run `hugo` inside untrusted Hugo sites are affected.
## Patches
Users should upgrade to Hugo v0.79.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gohugoio/hugo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.79.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26284'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/38736'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:15:45Z', 'nvd_published_at': '2020-12-21T23:15:00Z'} |
1.4.0 | GHSA-jv35-xqg7-f92r | 2023-09-13T20:02:47Z | 2021-06-21T17:16:09Z | null | ['CVE-2021-25949'] | set-getter Prototype Pollution Vulnerability | Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'set-getter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25949'}, {'type': 'WEB', 'url': 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4'}, {'type': 'PACKAGE', 'url': 'https://github.com/doowb/set-getter'}, {'type': 'WEB', 'url': 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210615022308/https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:22:58Z', 'nvd_published_at': '2021-06-10T12:15:00Z'} |
1.4.0 | GHSA-w942-gw6m-p62c | 2023-08-30T11:40:58Z | 2021-06-23T17:53:05Z | null | ['CVE-2020-35380'] | Denial of service in GJSON | GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON. Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35380'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/192'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0059'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:50:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-52qp-gwwh-qrg4 | 2021-06-16T20:15:07Z | 2021-06-21T17:10:02Z | null | ['CVE-2021-32684'] | Missing Handler in @scandipwa/magento-scripts | ### Impact
After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable.
### Patches
[Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above.
### Workarounds
Upgrade to patched or latest (recommended) version `npm i @scandipwa/magento-scripts@1.5.3` or `npm i @scandipwa/magento-scripts@latest`.
### References
New releases always available here: https://github.com/scandipwa/create-magento-app/releases
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@scandipwa/magento-scripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.1'}, {'fixed': '1.5.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684'}, {'type': 'WEB', 'url': 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'}] | {'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-16T20:15:07Z', 'nvd_published_at': '2021-06-14T23:15:00Z'} |
1.4.0 | GHSA-m7rg-8wvq-846v | 2023-08-08T19:57:34Z | 2021-06-07T21:49:14Z | null | ['CVE-2021-25947'] | Prototype pollution in nestie | Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nestie'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947'}] | {'cwe_ids': ['CWE-1321', 'CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:32:41Z', 'nvd_published_at': '2021-06-03T20:15:00Z'} |
1.4.0 | GHSA-433w-mm6h-rv9p | 2021-05-21T20:47:30Z | 2021-06-23T17:29:06Z | null | [] | Auth bypass in SAML provider | ### Impact
The following vulnerabilities have been disclosed, which impact users leveraging the SAML auth provider:
- [`goxmldsig` - Signature Validation Bypass](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7)
- [`gosaml2` - Authentication Bypass](https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg)
### Patches
[Patch available](https://github.com/netlify/gotrue/pull/274)
Please upgrade to v1.0.0 or commit hash `a2b4dd6bc4ef7562d1df044098b303f564eefa90`
### Workarounds
No known workarounds.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [gotrue](https://github.com/netlify/gotrue/issues)
* Email us at [security@netlify.com](mailto:security@netlify.com) | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/netlify/gotrue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/security/advisories/GHSA-433w-mm6h-rv9p'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:47:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-257v-vj4p-3w2h | 2021-06-30T18:03:29Z | 2021-06-22T01:14:09Z | null | ['CVE-2021-29060'] | Regular Expression Denial of Service (ReDOS) | In the npm package `color-string`, there is a ReDos (Regular Expression Denial of Service) vulnerability regarding an exponential time complexity for
linearly increasing input lengths for `hwb()` color strings.
Strings reaching more than 5000 characters would see several
milliseconds of processing time; strings reaching more than
50,000 characters began seeing 1500ms (1.5s) of processing time.
The cause was due to a the regular expression that parses
hwb() strings - specifically, the hue value - where
the integer portion of the hue value used a 0-or-more quantifier
shortly thereafter followed by a 1-or-more quantifier.
This caused excessive backtracking and a cartesian scan,
resulting in exponential time complexity given a linear
increase in input length. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'color-string'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29060'}, {'type': 'WEB', 'url': 'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3'}, {'type': 'WEB', 'url': 'https://github.com/Qix-/color-string/releases/tag/1.5.5'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/js/color-string.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/color-string'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-21T23:20:37Z', 'nvd_published_at': '2021-06-21T16:15:00Z'} |
1.4.0 | GHSA-4w4p-xwrr-9crh | 2021-05-25T20:57:05Z | 2021-06-16T17:18:49Z | null | ['CVE-2020-1961'] | Injection in Apache Syncope | Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1961'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:57:05Z', 'nvd_published_at': '2020-05-04T13:15:00Z'} |
1.4.0 | GHSA-c738-77x8-wmq5 | 2022-02-08T21:27:27Z | 2021-06-08T22:29:29Z | null | ['CVE-2020-14340'] | Uncontrolled Resource Consumption in XNIO | A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0.Final'}, {'fixed': '3.8.2.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.1.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.7.9.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.8.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14340'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860218'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T20:32:00Z', 'nvd_published_at': '2021-06-02T13:15:00Z'} |
1.4.0 | GHSA-jj6m-r8jc-2gp7 | 2022-10-25T20:24:52Z | 2021-06-23T18:03:18Z | null | ['CVE-2021-32699'] | Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings | ### Impact
All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding.
### Patches
Users should upgrade to `1.4.4`.
### Workarounds
There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created.
### For more information
If you have any questions or comments about this advisory:
* Contact us on [Discord](https://discord.gg/pterodactyl)
* Email us at `dane ät pterodactyl dot io` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pterodactyl/wings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/wings'}] | {'cwe_ids': ['CWE-405', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T15:43:57Z', 'nvd_published_at': '2021-06-22T20:15:00Z'} |
1.4.0 | GHSA-7r7m-5h27-29hp | 2021-09-15T18:25:52Z | 2021-06-08T18:48:53Z | null | ['CVE-2021-28676'] | Potential infinite loop in Pillow | An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28676'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/bb6c11fb889e6c11b0ee122b828132ee763b5856'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28676-fix-fli-dos'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:46:13Z', 'nvd_published_at': '2021-06-02T16:15:00Z'} |
1.4.0 | GHSA-pgf8-28gg-vpr6 | 2021-06-07T18:55:30Z | 2021-06-04T19:09:20Z | null | ['CVE-2021-32662'] | Path traversal | ### Impact
A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API.
This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API.
### Patches
The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@backstage/techdocs-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32662'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-05-27'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T22:01:05Z', 'nvd_published_at': '2021-06-03T22:15:00Z'} |
1.4.0 | GHSA-5557-j87h-cvf4 | 2021-05-19T18:54:36Z | 2021-06-16T17:29:26Z | null | ['CVE-2021-21653'] | Missing Authorization in jenkins xray-connector | Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xray-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21653'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(2)'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:54:36Z', 'nvd_published_at': '2021-05-11T15:15:00Z'} |
1.4.0 | GHSA-3fx4-7f69-5mmg | 2021-05-20T16:26:07Z | 2021-06-23T17:14:12Z | null | ['CVE-2016-9123'] | Integer Overflow in go-jose | go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit architectures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/square/go-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9123'}, {'type': 'WEB', 'url': 'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/165170'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0009'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/11/03/1'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:26:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rgx6-rjj4-c388 | 2023-09-08T21:29:03Z | 2021-06-21T17:16:42Z | null | ['CVE-2021-33829'] | Cross-site Scripting in ckeditor4 | A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because `--!>` is mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.14.0'}, {'fixed': '4.16.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33829'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-003'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ckeditor4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T17:22:32Z', 'nvd_published_at': '2021-06-09T12:15:00Z'} |
1.4.0 | GHSA-q4qv-fmwc-qxpx | 2021-04-07T22:06:28Z | 2021-06-22T15:24:55Z | null | ['CVE-2019-7726'] | SQL Injection in NukeViet | modules/banners/funcs/click.php in NukeViet before 4.3.04 has a SQL INSERT statement with raw header data from an HTTP request (e.g., Referer and User-Agent). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.04'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7726'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:06:28Z', 'nvd_published_at': '2020-12-31T05:15:00Z'} |
1.4.0 | GHSA-rmw5-xpg9-jr29 | 2022-04-27T20:30:31Z | 2021-06-10T17:23:21Z | null | ['CVE-2020-28924'] | Use of Cryptographically Weak Pseudo-Random Number Generator in Rclone | An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rclone/rclone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28924'}, {'type': 'WEB', 'url': 'https://github.com/rclone/rclone/issues/4783'}, {'type': 'PACKAGE', 'url': 'https://github.com/rclone/rclone'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIFT24Q6EFXLQZ24AER2QGFFZLMIPCD/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-14'}] | {'cwe_ids': ['CWE-331', 'CWE-338'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T14:47:19Z', 'nvd_published_at': '2020-11-19T20:15:00Z'} |
1.4.0 | GHSA-r37h-j483-cjjm | 2021-06-04T18:50:20Z | 2021-06-01T21:38:20Z | null | ['CVE-2021-33563'] | Improper rate limiting in Koel | Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phanan/koel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33563'}, {'type': 'WEB', 'url': 'https://github.com/koel/koel/releases/tag/v5.1.4'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1-other-koel/koel/'}] | {'cwe_ids': ['CWE-799', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:37:37Z', 'nvd_published_at': '2021-05-24T23:15:00Z'} |
1.4.0 | GHSA-5vq5-pg3r-9ph3 | 2022-01-03T15:56:18Z | 2021-06-10T17:22:08Z | null | ['CVE-2021-32674'] | Path Traversal in Zope | Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.2.1 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Zope'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32674'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Zope/commit/1d897910139e2c0b11984fc9b78c1da1365bec21'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Zope'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Zope/'}] | {'cwe_ids': ['CWE-12', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-09T21:32:39Z', 'nvd_published_at': '2021-06-08T18:15:00Z'} |
1.4.0 | GHSA-7r82-7xv7-xcpj | 2022-02-08T22:02:43Z | 2021-06-03T23:40:23Z | null | ['CVE-2020-13956'] | Cross-site scripting in Apache HttpClient | Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/httpcomponents-client'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0002/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:25:52Z', 'nvd_published_at': '2020-12-02T17:15:00Z'} |
1.4.0 | GHSA-q6w2-89hq-hq27 | 2022-08-11T16:52:01Z | 2021-06-08T23:02:43Z | null | ['CVE-2021-20195'] | keycloak Self Stored Cross-site Scripting vulnerability | A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20195'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'}] | {'cwe_ids': ['CWE-116', 'CWE-20', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T17:55:29Z', 'nvd_published_at': '2021-05-28T11:15:00Z'} |
1.4.0 | GHSA-27pv-q55r-222g | 2021-05-21T18:31:52Z | 2021-06-23T17:27:44Z | null | ['CVE-2020-26279'] | Path traversal in github.com/ipfs/go-ipfs | ### Impact
It is currently possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when `ipfs get` is done on an affected DAG.
1. The only affected command is `ipfs get`.
2. The gateway is not affected.
### Patches
Traversal fix patched in https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227
`tar-utils` patch applied to go-ipfs via https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2
### Workarounds
Upgrade to go-ipfs 0.8 or later.
### References
Binaries for the patched versions of go-ipfs are available on the IPFS distributions site, https://dist.ipfs.io/go-ipfs
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs)
* Email us at [security@ipfs.io](mailto:security@ipfs.io) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26279'}, {'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2'}, {'type': 'WEB', 'url': 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:31:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qvp4-rpmr-xwrr | 2021-06-22T20:50:44Z | 2021-06-23T18:00:20Z | null | [] | Possible bypass of token claim validation when OAuth2 Introspection caching is enabled | ### Impact
When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid.
### Patches
A patch will be released with `v0.38.12-beta.1`.
### Workarounds
Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist.
### Trace
The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes.
### Post-Mortem
The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
To avoid this from happening again we enabled codecov with a strict policy on the Ory Oathkeeper repository: Without an increase in code coverage the PR can not be merged.
To address this issue and any regressions we have added a test suite ensuring that the cache behaviour is correct in the different scenarios:
- Scope strategy is `none`, cache is enabled, and `requested_scope` is not empty -> cache will not be used;
- Scope strategy is `none`, cache is enabled, and `requested_scope` is empty -> cache will be used;
- Scope strategy is not `none`, cache is enabled, and `requested_scope` is not empty -> cache will be used;
as well as validating if `iss`, `aud`, `exp`, `token_use`, and scope are validated.
Additionally, we added [CodeQL scanning](https://github.com/ory/oathkeeper/commit/64ac7562669287d391cd72dfd43c5d71ff9f89a1) to the CI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ory/oathkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0-beta.2'}, {'fixed': '0.38.12-beta.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.38.11-beta.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T20:50:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gpvv-69j7-gwj8 | 2022-04-21T15:43:34Z | 2021-06-09T17:35:04Z | null | ['CVE-2019-20916'] | Path Traversal in pip | The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committed 6704f2ace. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20916'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/issues/6413'}, {'type': 'WEB', 'url': 'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/pip/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/compare/19.1.1...19.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:55:04Z', 'nvd_published_at': '2020-09-04T20:15:00Z'} |
1.4.0 | GHSA-g6rj-rv7j-xwp4 | 2023-09-04T16:32:28Z | 2021-06-08T18:49:11Z | null | ['CVE-2021-28675'] | Pillow Denial of service | An issue was discovered in Pillow before 8.2.0. `PSDImagePlugin.PsdImageFile` lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on `Image.open` prior to `Image.load`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28675'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5377/commits/22e9bee4ef225c0edbb9323f94c26cee0c623497'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}] | {'cwe_ids': ['CWE-233', 'CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:41:46Z', 'nvd_published_at': '2021-06-02T15:15:00Z'} |
1.4.0 | GHSA-jr3j-whm4-9wwm | 2021-06-07T18:54:43Z | 2021-06-04T19:10:34Z | null | ['CVE-2021-32641'] | Reflected XSS when using flashMessages or languageDictionary | ### Overview
Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's
- `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`.
- `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`.
### Am I affected?
You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply:
- You are utilizing `flashMessage` feature.
- User input or data from URL parameters is incorporated into the `flashMessage`.
An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`.
```js
var params = new URLSearchParams(location.search);
var errorMessage = params.get('error__message');
var showParams = {};
if (!!errorMessage === true) {
showParams.flashMessage = {
type: 'error',
text: 'We were unable to log you in. ' + errorMessage,
};
}
lock.show(showParams);
```
OR
- You are utilizing `languageDictionary` feature.
- User input or data from URL parameters is used in `languageDictionary` properties.
An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`.
```js
var params = new URLSearchParams(location.search);
var instruction = params.get('instruction');
var options = {
languageDictionary: {
emailInputPlaceholder: "something@youremail.com",
title: "title",
socialLoginInstructions: instruction
},
};
var lock = new Auth0LockPasswordless(
CLIENT_ID,
DOMAIN,
options
);
lock.show()
```
### How to fix that?
Upgrade to version `11.30.1`.
### Will this update impact my users?
The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0-lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.30.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/releases/tag/v11.30.1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-04T18:28:08Z', 'nvd_published_at': '2021-06-04T21:15:00Z'} |
1.4.0 | GHSA-pw59-4qgf-jxr8 | 2022-04-04T21:27:42Z | 2021-06-18T22:04:32Z | null | ['CVE-2020-17522'] | Cache Manipulation Attack in Apache Traffic Control | When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resulting in them being granted to clients possibly outside the CDN arcitechture. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17522'}, {'type': 'WEB', 'url': 'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607dca4a96cb8@%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E'}] | {'cwe_ids': ['CWE-525', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:27:42Z', 'nvd_published_at': '2021-01-26T18:15:00Z'} |
1.4.0 | GHSA-rxjp-mfm9-w4wr | 2022-06-29T20:40:42Z | 2021-06-04T21:15:56Z | null | ['CVE-2021-31542'] | Path Traversal in Django | In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31542'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0001/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/may/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/04/3'}] | {'cwe_ids': ['CWE-22', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:28:55Z', 'nvd_published_at': '2021-05-05T15:15:00Z'} |
1.4.0 | GHSA-hx7j-43w2-7rj7 | 2021-10-05T17:22:38Z | 2021-06-07T22:12:13Z | null | ['CVE-2021-25946'] | Prototype pollution in nconf-toml | Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nconf-toml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25946'}, {'type': 'PACKAGE', 'url': 'https://github.com/RobLoach/nconf-toml'}, {'type': 'WEB', 'url': 'https://github.com/RobLoach/nconf-toml/blob/8ade08cd1cfb9691ab7cc5c3514cc05c5085918f/index.js#L8'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-28T21:58:39Z', 'nvd_published_at': '2021-05-25T19:15:00Z'} |
1.4.0 | GHSA-7jr6-prv4-5wf5 | 2023-08-30T10:26:47Z | 2021-06-23T18:14:31Z | null | ['CVE-2021-32690'] | Helm passes repository credentials to alternate domain | Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This issue has been resolved in 3.6.1. There is a workaround through which one may check for improperly passed credentials. One may use a username and password for a Helm repository and may audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, one may look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed, the credentials would be passed on. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32690'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-56hp-xqp3-w2jf'}, {'type': 'PACKAGE', 'url': 'https://github.com/helm/helm'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/releases/tag/v3.6.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0384'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-18T18:34:04Z', 'nvd_published_at': '2021-06-16T22:15:00Z'} |
1.4.0 | GHSA-jqmc-fxxp-r589 | 2021-05-11T22:09:21Z | 2021-06-18T18:31:05Z | null | ['CVE-2020-14942'] | Deserialization of Untrusted Data in Tendenci | Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tendenci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.0.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14942'}, {'type': 'WEB', 'url': 'https://github.com/tendenci/tendenci/issues/867'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:09:21Z', 'nvd_published_at': '2020-06-21T15:15:00Z'} |
1.4.0 | GHSA-954c-jjx6-cxv7 | 2021-06-28T19:06:42Z | 2021-06-28T16:46:41Z | null | ['CVE-2021-32702'] | Reflected XSS from the callback handler's error query parameter | ### Overview
Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message.
### Am I affected?
You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response.
### How to fix that?
Upgrade to version `1.4.2`.
### Will this update impact my users?
The fix adds basic HTML escaping to the error message and it should not impact your users.
### Credit
https://github.com/inian
https://github.com/git-ishanpatel | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@auth0/nextjs-auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32702'}, {'type': 'WEB', 'url': 'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@auth0/nextjs-auth0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:38:26Z', 'nvd_published_at': '2021-06-25T17:15:00Z'} |
1.4.0 | GHSA-j39c-c8hj-x4j3 | 2022-02-08T21:34:09Z | 2021-06-16T17:45:29Z | null | ['CVE-2021-25122'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.43'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.63'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25122'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210409-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4891'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/01/1'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T19:53:13Z', 'nvd_published_at': '2021-03-01T12:15:00Z'} |
1.4.0 | GHSA-9423-6c93-gpp8 | 2023-08-29T23:36:50Z | 2021-06-23T17:13:29Z | null | ['CVE-2020-7667'] | github.com/sassoftware/go-rpmutils Arbitrary File Write via Archive Extraction (Zip Slip) | The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading `..` which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sassoftware/go-rpmutils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667'}, {'type': 'WEB', 'url': 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/sassoftware/go-rpmutils'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0042'}, {'type': 'WEB', 'url': 'https://snyk.io/research/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:56:04Z', 'nvd_published_at': '2020-06-24T12:15:00Z'} |
1.4.0 | GHSA-8h77-3xwr-hqhh | 2022-12-14T15:11:01Z | 2021-06-16T17:10:50Z | null | ['CVE-2021-21666'] | Cross-site scripting in Jenkins Kiuwan Plugin | Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.
Only older releases of Jenkins are affected by this vulnerability. Jenkins 2.275 and newer, LTS 2.263.2 and newer include a protection preventing this from being exploitable.
Kiuwan Plugin 1.6.1 escapes affected parts of the error message in the form validation endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kiuwanJenkinsPlugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21666'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kiuwan-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2367'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/10/14'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-14T19:19:42Z', 'nvd_published_at': '2021-06-10T15:15:00Z'} |