schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-59jw-jqf4-3wq3
2022-02-08T21:33:08Z
2021-03-22T23:28:23Z
null
['CVE-2021-21344']
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21344'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21344.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]
{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:49Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}
1.4.0
GHSA-mx3r-w3pj-7wv7
2021-03-23T21:26:23Z
2021-03-19T21:10:30Z
2021-03-23T21:26:23Z
['CVE-2020-28431']
Command injection in wc-cmd
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'wc-cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28431'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WCCMD-1050423'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:48:14Z', 'nvd_published_at': '2021-02-23T16:15:00Z'}
1.4.0
GHSA-545q-3fg6-48m7
2023-09-12T20:51:14Z
2021-03-18T19:39:31Z
null
['CVE-2021-23346']
html-parse-stringify and html-parse-stringify2 vulnerable to Regular expression denial of service (ReDoS)
This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'html-parse-stringify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'html-parse-stringify2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23346'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/releases/tag/v2.0.1'}, {'type': 'WEB', 'url': 'https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:03:51Z', 'nvd_published_at': '2021-03-04T17:15:00Z'}
1.4.0
GHSA-jff3-mwp3-f8cw
2021-03-09T00:29:44Z
2021-03-09T00:38:31Z
null
['CVE-2021-21360']
Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup
### Impact _What kind of vulnerability is it? Who is impacted?_ Information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `"Products.GenericSetup>=2.1.1"` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Visit the ZMI Security tab at `portal_setup/manage_access` and click on the link _Access contents information_. On the next page, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. Return to the ZMI Security tab at `portal_setup/manage_access` and scroll down to the link _View_. Click on _View_, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. ### References _Are there any links users can visit to find out more?_ - [GHSA-jff3-mwp3-f8cw](https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw) - [Products.GenericSetup on PyPI](https://pypi.org/project/Products.GenericSetup/) - [Definition of information disclosure at MITRE](https://cwe.mitre.org/data/definitions/200.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Products.GenericSetup issue tracker](https://github.com/zopefoundation/Products.GenericSetup/issues) * Email us at [security@plone.org](mailto:security@plone.org)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Products.GenericSetup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21360'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Products.GenericSetup/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T00:29:44Z', 'nvd_published_at': '2021-03-09T01:15:00Z'}
1.4.0
GHSA-57h3-9rgr-c24m
2021-12-02T17:48:12Z
2021-03-29T16:35:16Z
null
['CVE-2021-25289']
Out of bounds write in Pillow
An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25289'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:07:48Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}
1.4.0
GHSA-874w-m2v2-mj64
2022-10-07T13:10:52Z
2021-03-29T20:48:45Z
null
['CVE-2019-15151']
Double Free in Adplug
AdPlug 2.3.1 has a double free in the `Cu6mPlayer` class in `u6m.h`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'adplug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151'}, {'type': 'WEB', 'url': 'https://github.com/adplug/adplug/issues/91'}, {'type': 'WEB', 'url': 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'}, {'type': 'WEB', 'url': 'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633'}, {'type': 'PACKAGE', 'url': 'https://github.com/adplug/adplug'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/'}]
{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T20:51:24Z', 'nvd_published_at': '2019-08-18T21:15:00Z'}
1.4.0
GHSA-hf64-x4gq-p99h
2023-09-04T16:27:59Z
2021-03-18T19:55:34Z
null
['CVE-2020-35655']
Pillow Out-of-bounds Read
In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35655'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:17:03Z', 'nvd_published_at': '2021-01-12T09:15:00Z'}
1.4.0
GHSA-8q59-q68h-6hv4
2021-09-28T19:04:49Z
2021-03-25T21:26:26Z
null
['CVE-2020-14343']
Improper Input Validation in PyYAML
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.constructor.FullConstructor', 'yaml.constructor.UnsafeConstructor']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14343'}, {'type': 'WEB', 'url': 'https://github.com/SeldonIO/seldon-core/issues/2252'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/420'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/420#issuecomment-663673966'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860466'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://pypi.org/project/PyYAML/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T21:15:23Z', 'nvd_published_at': '2021-02-09T21:15:00Z'}
1.4.0
GHSA-x2jp-hh65-4xvf
2021-11-18T15:25:56Z
2021-03-29T20:42:15Z
null
['CVE-2021-20280']
Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle
Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20280'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a303eb9e9e387f95ea2a80cb1ce6c0b132ec1cc4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939037'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGOMHMYM3WICJ6D6U22Z6LPJGT5A6MZM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=419651'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:18:11Z', 'nvd_published_at': '2021-03-15T22:15:00Z'}
1.4.0
GHSA-xgpf-p52j-pf7m
2021-03-24T17:41:15Z
2021-03-24T17:42:02Z
null
['CVE-2021-27938']
XSS in CreateQueuedJobTask
A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.6.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27938'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symbiote/silverstripe-queuedjobs/CVE-2021-27938.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-queuedjobs/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2021-27938'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T17:41:15Z', 'nvd_published_at': '2021-03-16T16:15:00Z'}
1.4.0
GHSA-f6hm-88x3-mfjv
2022-02-08T21:32:19Z
2021-03-22T23:29:19Z
null
['CVE-2021-21349']
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
### Impact The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21349](https://x-stream.github.io/CVE-2021-21349.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21349'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21349.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]
{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:26:25Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}
1.4.0
GHSA-246w-56m2-5899
2021-08-31T21:07:23Z
2021-03-26T19:52:54Z
null
['CVE-2021-21332']
Cross-site scripting (XSS) vulnerability in the password reset endpoint
### Impact The password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. ### Patches This is fixed in #9200. ### Workarounds Depending on the needs and configuration of the homeserver a few options are available: 1. Password resets can be disabled by delegating email to a third-party service (via the `account_threepid_delegates.email` setting) or disabling email (by not configuring the `email` setting). 2. If the homeserver is not configured to use passwords (via the `password_config.enabled` setting) then the affected endpoint can be blocked at a reverse proxy: * `/_synapse/client/password_reset/email/submit_token` 3. The `password_reset_confirmation.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-246w-56m2-5899'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21332'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9200'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T19:52:12Z', 'nvd_published_at': '2021-03-26T20:15:00Z'}
1.4.0
GHSA-3wvg-mj6g-m9cv
2023-09-04T16:26:56Z
2021-03-18T19:55:21Z
null
['CVE-2021-27922']
Pillow Uncontrolled Resource Consumption
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27922'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:20:39Z', 'nvd_published_at': '2021-03-03T09:15:00Z'}
1.4.0
GHSA-5phf-pp7p-vc2r
2021-10-21T17:32:38Z
2021-03-19T19:42:11Z
null
['CVE-2021-28363']
Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection
### Impact Users who are using an HTTPS proxy to issue HTTPS requests and haven't configured their own SSLContext via `proxy_config`. Only the default SSLContext is impacted. ### Patches [urllib3 >=1.26.4 has the issue resolved](https://github.com/urllib3/urllib3/releases/tag/1.26.4). urllib3<1.26 is not impacted due to not supporting HTTPS requests via HTTPS proxies. ### Workarounds Upgrading is recommended as this is a minor release and not likely to break current usage. Configuring an `SSLContext` with `check_hostname=True` and passing via `proxy_config` instead of relying on the default `SSLContext` ### For more information If you have any questions or comments about this advisory: * Email us at [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.26.0'}, {'fixed': '1.26.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28363'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commits/main'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/releases/tag/1.26.4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/urllib3/1.26.4/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-36'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-02'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T19:41:48Z', 'nvd_published_at': '2021-03-15T18:15:00Z'}
1.4.0
GHSA-xfhp-gmh8-r8v2
2023-09-08T20:24:11Z
2021-03-19T21:22:10Z
null
['CVE-2021-23354']
printf vulnerable to Regular Expression Denial of Service (ReDoS)
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string ```regex /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g ``` in `lib/printf.js`. The vulnerable regular expression has cubic worst-case time complexity.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'printf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/issues/31'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/pull/32'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T18:59:14Z', 'nvd_published_at': '2021-03-12T15:15:00Z'}
1.4.0
GHSA-v648-p92f-9996
2021-03-19T20:35:47Z
2021-03-29T20:57:39Z
null
['CVE-2019-0925']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:35:47Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}
1.4.0
GHSA-pq64-v7f5-gqh8
2023-08-07T11:43:18Z
2021-03-29T16:33:03Z
null
['CVE-2021-27291']
Pygments vulnerable to Regular Expression Denial of Service (ReDoS)
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pygments'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '2.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27291'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14'}, {'type': 'WEB', 'url': 'https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/pygments/pygments'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4878'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4889'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:28:40Z', 'nvd_published_at': '2021-03-17T13:15:00Z'}
1.4.0
GHSA-vqcj-wrf2-7v73
2023-09-04T16:27:22Z
2021-03-18T19:55:27Z
null
['CVE-2020-35654']
Pillow Out-of-bounds Write
In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35654'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:18:25Z', 'nvd_published_at': '2021-01-12T09:15:00Z'}
1.4.0
GHSA-4wv4-mgfq-598v
2021-03-12T19:13:27Z
2021-03-12T23:00:19Z
null
[]
Code injection in nobelprizeparser
Code injection through use of eval.
[]
[{'package': {'ecosystem': 'npm', 'name': 'nobelprizeparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v'}, {'type': 'WEB', 'url': 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/nobelprizeparser'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T19:13:27Z', 'nvd_published_at': None}
1.4.0
GHSA-f38p-c2gq-4pmr
2022-07-05T18:05:18Z
2021-03-19T20:14:21Z
null
['CVE-2021-21267']
Regular Expression Denial-of-Service in npm schema-inspector
### Impact _What kind of vulnerability is it? Who is impacted?_ Email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. The new regex expression is more limited in what it can check, so it is more flexible than the one used before. Therefore, this was a new major version instead of a new patch version to warn people upgrading that they should make sure the email validation still works for their use case. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ If a user chooses to not upgrade, the only known workaround would be to stop using the email validation feature in the library. The user could, for example, accept the email address into their system but save it in a "not yet validated" state in their system until a verification email is sent to it (to determine whether the email is valid and belongs to the form submitter). Note that this is the preferred way of validating email addresses anyways. ### References _Are there any links users can visit to find out more?_ https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f ### For more information If you have any questions or comments about this advisory, you can create an issue in this repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'schema-inspector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21267'}, {'type': 'WEB', 'url': 'https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f'}, {'type': 'WEB', 'url': 'https://github.com/schema-inspector/schema-inspector/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0006/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/schema-inspector'}]
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:14:08Z', 'nvd_published_at': '2021-03-19T21:15:00Z'}
1.4.0
GHSA-hwpc-8xqv-jvj4
2022-10-25T20:37:12Z
2021-03-22T23:28:38Z
null
['CVE-2021-21345']
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21345'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21345.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]
{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:24:01Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}
1.4.0
GHSA-fvgf-6h6h-3322
2023-09-05T14:35:06Z
2021-03-18T20:29:49Z
null
['CVE-2021-3281']
Django Directory Traversal via archive.extract
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3281'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/3.0.12/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210226-0004/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:34:01Z', 'nvd_published_at': '2021-02-02T07:15:00Z'}
1.4.0
GHSA-vw2g-5827-m9fp
2021-03-23T15:20:17Z
2021-03-29T20:55:52Z
null
['CVE-2019-1308']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1308'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:20:17Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}
1.4.0
GHSA-8278-88vv-x98r
2021-03-10T21:51:06Z
2021-03-10T21:51:17Z
null
['CVE-2021-21371']
Execution of untrusted code through config file
### Impact It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. ### Workarounds Manually adjust yaml.load() to yaml.safe_load() ### For more information If you have any questions or comments about this advisory: * Open an issue in [tenable/integration-jira-cloud](https://github.com/tenable/integration-jira-cloud/issues) * Email us at [vulnreport@tenable.com](mailto:vulnreport@tenable.com)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tenable-jira-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21371'}, {'type': 'WEB', 'url': 'https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/tenable-jira-cloud/'}, {'type': 'WEB', 'url': 'https://pyyaml.docsforge.com/master/documentation/#loading-yaml'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T21:51:06Z', 'nvd_published_at': '2021-03-10T22:15:00Z'}
1.4.0
GHSA-9652-78hp-w58c
2021-03-19T22:19:46Z
2021-03-29T20:07:39Z
null
['CVE-2021-3271']
Stored cross-site scripting in PressBooks
PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pressbooks/pressbooks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.18.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3271'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks/pull/2072'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks'}, {'type': 'WEB', 'url': 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:19:46Z', 'nvd_published_at': '2021-02-18T19:15:00Z'}
1.4.0
GHSA-53r4-h27g-rg3x
2021-03-18T22:22:03Z
2021-03-29T20:59:07Z
null
['CVE-2019-0992']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0992'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:22:03Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-hqqv-9x3v-mp7w
2021-03-16T16:31:12Z
2021-03-18T19:27:20Z
null
['CVE-2020-7014']
Privilege Escalation Flaw in Elasticsearch
The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.0'}, {'fixed': '6.8.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7014'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200619-0003/'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}]
{'cwe_ids': ['CWE-266', 'CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T16:31:12Z', 'nvd_published_at': '2020-06-03T18:15:00Z'}
1.4.0
GHSA-xr9h-9m79-x29g
2021-02-24T06:59:10Z
2021-03-01T19:38:23Z
null
['CVE-2020-8902']
SSRF in Rendertron
Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
[]
[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8902'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rendertron'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T06:59:10Z', 'nvd_published_at': '2021-02-23T12:15:00Z'}
1.4.0
GHSA-9hx2-hgq2-2g4f
2021-12-02T17:47:58Z
2021-03-29T16:35:46Z
null
['CVE-2021-25292']
Regular Expression Denial of Service (ReDoS) in Pillow
An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '8.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25292'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3bce145966374dd39ce58a6fc0083f8d1890719c'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/6207b44ab1ff4a91d8ddc7579619876d0bb191a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:05:35Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}
1.4.0
GHSA-5q6m-3h65-w53x
2022-08-03T17:21:06Z
2021-03-11T22:26:09Z
null
['CVE-2021-24033']
react-dev-utils OS Command Injection in function `getProcessForPort`
react-dev-utils prior to v11.0.4 exposes a function, `getProcessForPort`, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '11.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/10644'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2021-24033'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-react-dev-utils/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T22:18:08Z', 'nvd_published_at': '2021-03-09T01:15:00Z'}
1.4.0
GHSA-x79j-wgqv-g8h2
2021-03-29T18:02:42Z
2021-03-23T01:54:06Z
null
['CVE-2021-21358']
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form
### Problem It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 10.4.14 or 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue. ### References * [TYPO3-CORE-SA-2021-004](https://typo3.org/security/advisory/typo3-core-sa-2021-004)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.2.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21358'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-form'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-004'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:00Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}
1.4.0
GHSA-3wj8-vp9h-rm6m
2023-09-13T20:23:10Z
2021-03-19T21:32:20Z
null
['CVE-2021-23344']
total.js Remote Code Execution Vulnerability
total.js is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. It can be used as web, desktop, service or IoT application. Affected versions of this package are vulnerable to Remote Code Execution (RCE) via `set`. ### PoC ```js // To be run in a nodejs console: require('total.js/utils').set({}, 'a;eval(`require("child_process")\\x2eexecSync("touch pwned")`);//') ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.4.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23344'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:42:43Z', 'nvd_published_at': '2021-03-04T17:15:00Z'}
1.4.0
GHSA-wq4r-8342-jmc9
2021-03-23T20:31:43Z
2021-03-29T20:24:44Z
null
['CVE-2021-28381']
SQL injection in vhs (aka VHS: Fluid ViewHelpers)
The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'fluidtypo3/vhs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28381'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-001'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T20:31:43Z', 'nvd_published_at': '2021-03-16T20:15:00Z'}
1.4.0
GHSA-4p9g-qgx9-397p
2021-03-29T17:43:44Z
2021-03-23T01:54:09Z
null
['CVE-2021-21359']
Denial of Service in Page Error Handling
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5) > * CWE-405, CWE-674 > * Status: **DRAFT** ### Problem Requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded. ### Solution Update to TYPO3 versions 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Paul Keller, Mathias Bolt Lesniak and Kay Strobach who reported this issue and to TYPO3 framework merger Frank Nägler and to TYPO3 security team member Torben Hansen who fixed the issue. ### References * [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21359'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-005'}]
{'cwe_ids': ['CWE-405', 'CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:10Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}
1.4.0
GHSA-w36g-q975-37rg
2021-03-12T22:48:12Z
2021-03-18T19:30:20Z
null
['CVE-2021-26814']
Improper Input Validation (RCE)
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'wazuh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26814'}, {'type': 'WEB', 'url': 'https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html'}, {'type': 'WEB', 'url': 'https://github.com/wazuh/wazuh/releases/tag/v4.0.4'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:48:12Z', 'nvd_published_at': '2021-03-06T02:15:00Z'}
1.4.0
GHSA-pjj4-jjgc-h3r8
2021-03-12T22:28:01Z
2021-03-12T23:09:24Z
null
[]
Authenticated remote code execution
### Impact Authenticated remote code execution using plugin manager without ACL permissions. ### Patches We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-pjj4-jjgc-h3r8'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:28:01Z', 'nvd_published_at': None}
1.4.0
GHSA-vmf5-924f-25f2
2021-03-18T22:36:03Z
2021-03-29T20:59:12Z
null
['CVE-2019-1103']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:36:03Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}
1.4.0
GHSA-pch5-whg9-qr2r
2023-09-08T20:25:35Z
2021-03-29T21:32:05Z
null
['CVE-2021-29418']
netmask npm package mishandles octal input data
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0001/'}, {'type': 'WEB', 'url': 'https://sick.codes/sick-2021-011'}, {'type': 'WEB', 'url': 'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/netmask'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T21:31:24Z', 'nvd_published_at': '2021-03-30T07:15:00Z'}
1.4.0
GHSA-7vwg-39h8-8qp8
2021-03-11T17:41:09Z
2021-03-11T17:42:01Z
null
[]
/user/sessions endpoint allows detecting valid accounts
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer. If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.2.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/ezsystems/ezplatform-rest'}]
{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T17:41:09Z', 'nvd_published_at': None}
1.4.0
GHSA-753c-phhg-cj29
2023-09-06T23:33:10Z
2021-03-12T23:01:49Z
null
['CVE-2021-23352']
Madge vulnerable to command injection
This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which, when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function. ### PoC ```js const madge = require('madge'); madge('..', {graphVizPath: "touch HELLO;"}) .then((res) => res.svg()) .then((writtenImagePath) => { console.log('Image written to ' + writtenImagePath); }); ```
[]
[{'package': {'ecosystem': 'npm', 'name': 'madge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23352'}, {'type': 'WEB', 'url': 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}, {'type': 'WEB', 'url': 'https://github.com/pahen/madge/blob/master/lib/graph.js#L27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MADGE-1082875'}]
{'cwe_ids': ['CWE-77', 'CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:10:53Z', 'nvd_published_at': '2021-03-09T19:15:00Z'}
1.4.0
GHSA-h23m-w6x5-jwr4
2021-03-18T21:55:02Z
2021-03-29T21:00:08Z
null
['CVE-2019-0923']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:55:02Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}
1.4.0
GHSA-pc22-3g76-gm6j
2021-03-22T23:45:20Z
2021-03-11T03:09:16Z
null
['CVE-2021-21363']
Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory
### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. #### Java Code The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 ### Patches Fix has been applied to the master branch with: * https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89 included in release: 2.4.19 ### References * [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) * [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information If you have any questions or comments about this advisory: * Email us at [security@swagger.io](mailto:security@swagger.io) #### Original vulnerability report > I'm performing OSS security research under the GitHub Security Lab Bug Bounty program. > I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries. > > - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f > - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac > - https://github.com/github/codeql/pull/4473 > > The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users. > > --- > > This vulnerability exists in the maven plugin. > > This vulnerability is distinctly different. This vulnerability is most likely a local privilege escalation vulnerability. > > https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 > > This vulnerability is very similar to this similar vulnerability I disclosed in the Eclipse Jetty project. > > https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 > > This is due to a race condition between the call to `delete` and the call to `mkdirs`. > > ```java > // ensure file will always be unique by appending random digits > File outputFolder = File.createTempFile("codegen-", "-tmp"); // Attacker knows the full path of the file that will be generated > // delete the file that was created > outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Swagger Code Generator. > // and make a directory of the same name > // SECURITY VULNERABILITY: Race Condition! - Attacker beats Swagger Code Generator and now owns this directory > outputFolder.mkdirs(); > ``` > > This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. > > The fix here is to switch to the `Files` API for creating temporary directories. Which does not contain this race condition, and appropriately sets the correct file permissions. >
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21363'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'}]
{'cwe_ids': ['CWE-378', 'CWE-379'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T03:07:41Z', 'nvd_published_at': '2021-03-11T03:15:00Z'}
1.4.0
GHSA-2cxf-6567-7pp6
2021-07-08T17:02:28Z
2021-03-03T23:01:17Z
null
['CVE-2021-21331']
Local Information Disclosure Vulnerability
### Impact Local information disclosure of sensitive information downloaded via the API using the API Client. ### Finding The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. This vulnerability was found due to [this query](https://lgtm.com/query/8938575359870595124/) that [Jonathan Leitschuh](https://github.com/JLLeitschuh) contributed to the Semmle QL project. ### Patches This issue has been patched in [version 1.0.0-beta.9](https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9). See also [Remove unused downloadFile helpers](https://github.com/DataDog/datadog-api-client-java/pull/637). ### Workarounds The recommended workaround is to specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`. ### References * [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) * [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [DataDog/datadog-api-client-java](https://github.com/DataDog/datadog-api-client-java) * Email us at [security@datadoghq.com](mailto:security@datadoghq.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.datadoghq:datadog-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-beta.6'}, {'fixed': '1.0.0-beta.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21331'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9'}]
{'cwe_ids': ['CWE-378', 'CWE-379'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-03T22:58:04Z', 'nvd_published_at': '2021-03-03T23:15:00Z'}
1.4.0
GHSA-537h-rv9q-vvph
2023-09-01T10:08:35Z
2021-03-24T18:24:39Z
null
['CVE-2020-13757']
Python-RSA decryption of ciphertext leads to DoS
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13757'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/146'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667'}, {'type': 'PACKAGE', 'url': 'https://github.com/sybrenstuvel/python-rsa'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4478-1/'}]
{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T18:24:28Z', 'nvd_published_at': '2020-06-01T19:15:00Z'}
1.4.0
GHSA-m6gj-h9gm-gw44
2023-09-05T14:32:18Z
2021-03-18T20:30:13Z
null
['CVE-2020-24583']
Django Incorrect Default Permissions
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24583'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200918-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4479-1/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/09/01/2'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}]
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:36:46Z', 'nvd_published_at': '2020-09-01T13:15:00Z'}
1.4.0
GHSA-9295-mhf3-v33m
2023-08-08T19:54:40Z
2021-03-29T18:25:26Z
null
['CVE-2021-28099']
Insecure temporary file in Netflix OSS Hollow
> ID: NFLX-2021-001 > Title: Local information disclosure in Hollow > Release Date: 2021-03-23 > Credit: Security Researcher @JLLeitschuh # Overview Security researcher @JLLeitschuh reported that Netflix Hollow (a Netflix OSS project available here: https://github.com/Netflix/hollow) writes to a local temporary directory before validating the permissions on it. # Impact An attacker with the ability to create directories and set permissions on the local filesystem could pre-create this directory and read or modify anything written there by the Hollow process. # Description Since the `Files.exists(parent)` is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated. # Workarounds and Fixes Avoid running Hollow in configurations that share a filesystem with less-trusted processes. May be fixed in a future release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.netflix.hollow:hollow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-j83w-7qr9-wv86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28099'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/hollow/issues/502'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md'}]
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:39:18Z', 'nvd_published_at': '2021-03-23T21:15:00Z'}
1.4.0
GHSA-qwwr-qc2p-6283
2021-10-21T21:19:32Z
2021-03-22T16:57:07Z
null
['CVE-2018-14550']
Out-of-bounds write in libpng
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'libpng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.37'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.35'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14550'}, {'type': 'WEB', 'url': 'https://github.com/glennrp/libpng/issues/246'}, {'type': 'WEB', 'url': 'https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token'}, {'type': 'PACKAGE', 'url': 'https://github.com/glennrp/libpng'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201908-02'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0001/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T15:41:48Z', 'nvd_published_at': '2019-07-10T12:15:00Z'}
1.4.0
GHSA-5rq8-3wvf-wrfg
2021-03-18T22:10:02Z
2021-03-29T20:59:01Z
null
['CVE-2019-0933']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0937.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0933'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:10:02Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}
1.4.0
GHSA-jgwr-3qm3-26f3
2022-08-22T19:40:41Z
2021-03-19T20:11:13Z
null
['CVE-2021-25329']
Potential remote code execution in Apache Tomcat
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.41'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.108'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.107'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25329'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210409-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4891'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/01/2'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:10:56Z', 'nvd_published_at': '2021-03-01T12:15:00Z'}
1.4.0
GHSA-5wqj-f379-6jh4
2021-03-16T01:08:14Z
2021-03-19T21:19:47Z
null
['CVE-2020-28426']
Command injection in kill-process-on-port
All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'kill-process-on-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28426'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T01:08:14Z', 'nvd_published_at': '2021-02-01T16:15:00Z'}
1.4.0
GHSA-hvv8-336g-rx3m
2023-03-09T21:21:55Z
2021-03-22T23:28:01Z
null
['CVE-2021-21342']
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
### Impact The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16 ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21342](https://x-stream.github.io/CVE-2021-21342.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21342'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21342.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]
{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:33Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}
1.4.0
GHSA-qpfq-ph7r-qv6f
2022-02-08T21:32:28Z
2021-03-22T23:29:00Z
null
['CVE-2021-21347']
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21347](https://x-stream.github.io/CVE-2021-21347.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21347'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21347.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]
{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:25:22Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}
1.4.0
GHSA-7qmm-q394-fmch
2023-09-05T23:01:21Z
2021-03-19T21:19:29Z
null
['CVE-2021-23355']
Command Injection in ps-kill
This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. PoC (provided by reporter): ```js var ps_kill = require('ps-kill'); ps_kill.kill('$(touch success)', function() {}); ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ps-kill'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23355'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PSKILL-1078529'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T22:05:22Z', 'nvd_published_at': '2021-03-15T17:15:00Z'}
1.4.0
GHSA-9824-rp6m-xx9w
2021-03-18T22:17:02Z
2021-03-29T20:59:04Z
null
['CVE-2019-0989']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:17:02Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-w5hr-jm4j-9jvq
2022-05-03T03:42:06Z
2021-03-02T02:57:23Z
null
['CVE-2021-26119']
Sandbox escape through template_object in smarty
Sandbox protection could be bypassed through access to an internal Smarty object that should have been blocked. Sites that rely on [Smarty Security features](https://www.smarty.net/docs/en/advanced.features.tpl) should upgrade as soon as possible. Please upgrade to 3.1.39 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.39'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-w5hr-jm4j-9jvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26119'}, {'type': 'PACKAGE', 'url': 'https://github.com/smarty-php/smarty/'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202105-06'}, {'type': 'WEB', 'url': 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5151'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T02:55:01Z', 'nvd_published_at': '2021-02-22T02:15:00Z'}
1.4.0
GHSA-fx83-3ph3-9j2q
2023-08-31T16:40:38Z
2021-03-19T21:32:47Z
null
['CVE-2020-25626']
Cross-site Scripting (XSS) in Django REST Framework
A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'djangorestframework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25626'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1878635'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/django-rest-framework'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201016-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5186'}]
{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:51:34Z', 'nvd_published_at': '2020-09-30T20:15:00Z'}
1.4.0
GHSA-2x75-mf24-588m
2021-03-18T22:34:45Z
2021-03-29T20:59:11Z
null
['CVE-2019-1092']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1092'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:34:45Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}
1.4.0
GHSA-fr28-569j-53c4
2023-09-05T14:31:48Z
2021-03-18T20:30:01Z
null
['CVE-2020-24584']
Django Incorrect Default Permissions
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24584'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1853724acaf17ed7414d54c7d2b5563a25025a71'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200918-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4479-1/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/09/01/2'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}]
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:36:35Z', 'nvd_published_at': '2020-09-01T13:15:00Z'}
1.4.0
GHSA-g3rq-g295-4j3m
2022-04-18T21:58:03Z
2021-03-19T21:28:05Z
null
['CVE-2020-28493']
Regular Expression Denial of Service (ReDoS) in Jinja2
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Jinja2'}, 'ecosystem_specific': {'affected_functions': ['jinja2.utils.urlize']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28493'}, {'type': 'WEB', 'url': 'https://github.com/pallets/jinja/pull/1343'}, {'type': 'WEB', 'url': 'https://github.com/pallets/jinja/commit/15ef8f09b659f9100610583938005a7a10472d4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/jinja'}, {'type': 'WEB', 'url': 'https://github.com/pallets/jinja/blob/ab81fd9c277900c85da0c322a2ff9d68a235b2e6/src/jinja2/utils.py%23L20'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVAKCOO7VBVUBM3Q6CBBTPBFNP5NDXF4/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-19'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T01:08:09Z', 'nvd_published_at': '2021-02-01T20:15:00Z'}
1.4.0
GHSA-59cj-99cw-rq64
2021-03-18T21:47:50Z
2021-03-29T21:00:05Z
null
['CVE-2019-0913']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0913'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0913'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:47:50Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}
1.4.0
GHSA-f5g8-5qq7-938w
2023-09-04T16:30:52Z
2021-03-18T19:55:41Z
null
['CVE-2020-35653']
Pillow Out-of-bounds Read
In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35653'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/2f409261eb1228e166868f8f0b5da5cda52e55bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:15:44Z', 'nvd_published_at': '2021-01-12T09:15:00Z'}
1.4.0
GHSA-qx3w-4864-94ch
2021-03-29T17:59:09Z
2021-03-23T01:53:42Z
null
['CVE-2021-21339']
Cleartext storage of session identifier
### Problem User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported this issue and to TYPO3 core & security team members Benni Mack & Oliver Hader who fixed the issue. ### References * [TYPO3-CORE-SA-2021-006](https://typo3.org/security/advisory/typo3-core-sa-2021-006)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.57'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.2.56'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.51'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.50'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-qx3w-4864-94ch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21339'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-006'}]
{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:41:13Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}
1.4.0
GHSA-8hc4-xxm3-5ppp
2023-07-03T22:08:31Z
2021-03-02T03:44:14Z
null
['CVE-2021-22880']
Active Record subject to Regular Expression Denial-of-Service (ReDoS)
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22880'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1023899'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2021-22880.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/ZzUqCh9vyhI'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210805-0009/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4929'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T03:40:01Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}
1.4.0
GHSA-85g2-29m8-qf2p
2021-03-16T22:49:14Z
2021-03-19T21:18:33Z
null
['CVE-2021-25914']
Prototype Pollution Vulnerability in object-collider
Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'object-collider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25914'}, {'type': 'WEB', 'url': 'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T22:49:14Z', 'nvd_published_at': '2021-03-01T18:15:00Z'}
1.4.0
GHSA-qxx8-292g-2w66
2021-03-08T15:48:36Z
2021-03-08T15:50:01Z
null
[]
Improper Authentication
### Impact A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an an attacker to have internal knowledge of the bot. ### Patches The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case. ### Workarounds Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator which throws an exception if the Claims are Skill Claims. For detailed instructions, see the link in the References section. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet) * Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Bot.Connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.6.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Bot.Connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.7.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Bot.Connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Bot.Connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Bot.Connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/microsoft/botbuilder-dotnet/security/advisories/GHSA-qxx8-292g-2w66'}, {'type': 'WEB', 'url': 'https://aka.ms/SkillClaimsValidationDotnet'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Microsoft.Bot.Connector/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T15:48:36Z', 'nvd_published_at': None}
1.4.0
GHSA-6j89-jhpr-849f
2021-03-23T15:23:32Z
2021-03-29T20:55:46Z
null
['CVE-2019-1307']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:23:32Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}
1.4.0
GHSA-pwpr-vp2v-99xw
2021-03-22T23:17:39Z
2021-03-29T20:56:11Z
null
['CVE-2019-1138']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1138'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1138'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:17:39Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}
1.4.0
GHSA-mw7r-3g6w-85qg
2021-03-22T22:10:01Z
2021-03-29T20:57:46Z
null
['CVE-2019-1131']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:10:01Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}
1.4.0
GHSA-h4hr-7fg3-h35w
2023-09-05T22:59:24Z
2021-03-01T19:52:33Z
null
['CVE-2021-23341']
Denial of service in prismjs
The package prismjs before 1.23.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the `prism-asciidoc`, `prism-rest`, `prism-tap` and `prism-eiffel` components.
[]
[{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23341'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/issues/2583'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/pull/2584'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076582'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/prismjs'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T07:34:23Z', 'nvd_published_at': '2021-02-18T16:15:00Z'}
1.4.0
GHSA-hpv8-9rq5-hq7w
2022-10-25T20:35:54Z
2021-03-11T03:09:18Z
null
['CVE-2021-21364']
Generated Code Contains Local Information Disclosure Vulnerability
### Impact **This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually! On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. #### Java Code The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/kotlin-client/infrastructure/ApiClient.kt.mustache#L209 - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/finch/api.mustache#L84 - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L831-L834 - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L630-L633 ### Patches Fix has been applied to the master branch with: * https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2 included in release: 2.4.19 ### Workarounds Users can remediate the vulnerability in non patched version by manually (or programmatically e.g. in CI) updating the generated source code to use `java.nio.files.Files` temporary file creation instead of `java.io.File`, e.g. by changing ```java if (tempFolderPath == null) return File.createTempFile(prefix, suffix); else return File.createTempFile(prefix, suffix, new File(tempFolderPath)); ``` to ```java if (tempFolderPath == null) return Files.createTempFile(prefix, suffix).toFile(); else return Files.createTempFile(Paths.get(tempFolderPath), prefix, suffix).toFile(); ``` or generally changing: ```java File.createTempFile(prefix, suffix); ``` to ```java Files.createTempFile(prefix, suffix).toFile(); ``` ### References * [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) * [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html) * [CWE-732: Incorrect Permission Assignment for Critical Resource](https://cwe.mitre.org/data/definitions/732.html) ### For more information If you have any questions or comments about this advisory: * Email us at [security@swagger.io](mailto:security@swagger.io) #### Original vulnerability report > I'm performing OSS security research under the GitHub Security Lab Bug Bounty program. > I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries. > > - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f > - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac > - https://github.com/github/codeql/pull/4473 > > The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users. > > --- > > This code exists in the code generator, in the generated code. > > In this case, I believe this is only a local information disclosure. IE. another user can read the information, not replace it. > > In particular, the method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. > > This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. > > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/kotlin-client/infrastructure/ApiClient.kt.mustache#L209 > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/finch/api.mustache#L84 > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L831-L834 > - https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-codegen/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L630-L633 > > The fix here is to switch to the `Files` API, instead of `File` as that appropriately sets the file permissions. >
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21364'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2'}]
{'cwe_ids': ['CWE-200', 'CWE-378', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T03:08:54Z', 'nvd_published_at': '2021-03-11T03:15:00Z'}
1.4.0
GHSA-ppxc-pmx9-qjv9
2021-03-22T23:02:53Z
2021-03-29T20:57:59Z
null
['CVE-2019-1195']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1195'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:02:53Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}
1.4.0
GHSA-fq6p-x6j3-cmmq
2023-09-11T16:30:56Z
2021-03-01T19:57:16Z
null
['CVE-2020-28496']
Denial of service in three
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. **PoC:** ```js var three = require('three') function build_blank(n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost + " ms") ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'three'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.125.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28496'}, {'type': 'WEB', 'url': 'https://github.com/mrdoob/three.js/issues/21132'}, {'type': 'WEB', 'url': 'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-THREE-1064931'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T07:40:52Z', 'nvd_published_at': '2021-02-18T15:15:00Z'}
1.4.0
GHSA-cqff-fx2x-p86v
2021-03-08T15:48:55Z
2021-03-08T15:50:10Z
null
[]
Improper Authentication
### Impact A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot. ### Patches The problem has been patched in all affected versions. Please see the list of patched versions for the most appropiate one for your individual case. ### Workarounds Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if Claims are Skill Claims. For detailed instructions, see the link in the References section. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botframework-sdk) * Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.1'}]}], 'versions': ['4.8.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.10.1'}]}], 'versions': ['4.10.0']}]
[{'type': 'WEB', 'url': 'https://github.com/microsoft/botbuilder-python/security/advisories/GHSA-cqff-fx2x-p86v'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/botbuilder-python/blob/main/doc/SkillClaimsValidation.md'}, {'type': 'WEB', 'url': 'https://pypi.org/project/botframework-connector/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T15:48:55Z', 'nvd_published_at': None}
1.4.0
GHSA-3vg7-jw9m-pc3f
2021-03-29T18:01:00Z
2021-03-23T01:53:57Z
null
['CVE-2021-21357']
Broken Access Control in Form Framework
### Problem Due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework. In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation. A valid backend user account with access to the form module is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 contributor Ralf Zimmermann who fixed the issue. ### References * [TYPO3-CORE-SA-2021-003](https://typo3.org/security/advisory/typo3-core-sa-2021-003)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:H/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21357'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-form'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-003'}]
{'cwe_ids': ['CWE-20', 'CWE-22', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:41:49Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}
1.4.0
GHSA-79hv-pfx6-hhpj
2021-03-12T19:56:01Z
2021-03-12T21:34:02Z
null
['CVE-2021-28088']
Cross-site scripting (XSS)
Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28088'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1119296'}, {'type': 'WEB', 'url': 'https://anotepad.com/note/read/s3kkk6h7'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T19:56:01Z', 'nvd_published_at': '2021-03-11T17:15:00Z'}
1.4.0
GHSA-j29g-g982-pwpv
2021-03-12T20:09:58Z
2021-03-12T21:34:11Z
null
['CVE-2020-17551']
Cross-site scripting (XSS)
ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17551'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/issues/659'}, {'type': 'WEB', 'url': 'https://www.impresscms.org/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T20:09:58Z', 'nvd_published_at': '2020-10-07T17:15:00Z'}
1.4.0
GHSA-jpcm-4485-69p7
2021-03-12T17:32:39Z
2021-03-09T00:38:41Z
null
['CVE-2021-21361']
Sensitive information disclosure via log in com.bmuschko:gradle-vagrant-plugin
### Impact The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. ### Patches Fixed in version 3.0.0 ### References - https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44 - https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 - https://github.com/bmuschko/gradle-vagrant-plugin/pull/20 ### For more information If you have any questions or comments about this advisory: * Open an issue in [bmuschko/gradle-vagrant-plugin](https://github.com/bmuschko/gradle-vagrant-plugin)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.bmuschko:gradle-vagrant-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21361'}, {'type': 'WEB', 'url': 'https://github.com/bmuschko/gradle-vagrant-plugin/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/bmuschko/gradle-vagrant-plugin/pull/20'}, {'type': 'WEB', 'url': 'https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44'}]
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T00:38:15Z', 'nvd_published_at': '2021-03-09T01:15:00Z'}
1.4.0
GHSA-gmjw-49p4-pcfm
2021-03-12T16:57:44Z
2021-03-12T22:44:17Z
null
['CVE-2021-21368']
Prototype poisoning
### Impact The issue is as follows: when `msgpack5` decodes a map containing a key `"__proto__"`, it assigns the decoded value to `__proto__`. As you are no doubt aware, `Object.prototype.__proto__` is an accessor property for the receiver's prototype. If the value corresponding to the key `__proto__` decodes to an object or `null`, `msgpack5` sets the decoded object's prototype to that value. An attacker who can submit crafted MessagePack data to a service can use this to produce values that appear to be of other types; may have unexpected prototype properties and methods (for example `length`, numeric properties, and `push` et al if `__proto__`'s value decodes to an `Array`); and/or may throw unexpected exceptions when used (for example if the `__proto__` value decodes to a `Map` or `Date`). Other unexpected behavior might be produced for other types. There is no effect on the global prototype. An example: ```js const msgpack5 = require('msgpack5')(); const payload = {}; Object.defineProperty(payload, '__proto__', { value: new Map().set(1, 2), enumerable: true }); const encoded = msgpack5.encode(payload); console.log(encoded); // <Buffer 81 a9 5f 5f 70 72 6f 74 6f 5f 5f 81 01 02> const decoded = msgpack5.decode(encoded); // decoded's prototype has been overwritten console.log(Object.getPrototypeOf(decoded)); // Map(1) { 1 => 2 } console.log(decoded.get); // [Function: get] // decoded appears to most common typechecks to be a Map console.log(decoded instanceof Map); // true console.log(decoded.toString()); // [object Map] console.log(Object.prototype.toString.call(decoded)); // [object Map] console.log(decoded.constructor.name); // Map console.log(Object.getPrototypeOf(decoded).constructor.name); // Map // decoded is not, however, a Map console.log(Object.getPrototypeOf(decoded) === Map.prototype); // false // using decoded as though it were a Map throws try { decoded.get(1); } catch (error) { console.log(error); // TypeError: Method Map.prototype.get called // on incompatible receiver #<Map> } try { decoded.size; } catch (error) { console.log(error); // TypeError: Method get Map.prototype.size // called on incompatible receiver #<Map> } // re-encoding the decoded value throws try { msgpack5.encode(decoded); } catch (error) { console.log(error); // TypeError: Method Map.prototype.entries // called on incompatible receiver #<Map> } ``` This "prototype poisoning" is sort of a very limited inversion of a prototype pollution attack. Only the decoded value's prototype is affected, and it can only be set to `msgpack5` values (though if the victim makes use of custom codecs, anything could be a `msgpack5` value). We have not found a way to escalate this to true prototype pollution (absent other bugs in the consumer's code). ### Patches Versions v5.2.1, v4.5.1, v3.6.1 include the fix. ### Workarounds Always validate incoming data after parsing before doing any processing. ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'msgpack5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'msgpack5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'msgpack5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21368'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/msgpack5/releases/tag/v3.6.1'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/msgpack5/releases/tag/v4.5.1'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/msgpack5/releases/tag/v5.2.1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/msgpack5'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T16:57:44Z', 'nvd_published_at': '2021-03-12T17:15:00Z'}
1.4.0
GHSA-f4jh-ww96-9h9j
2021-03-30T16:22:43Z
2021-03-30T16:23:12Z
null
['CVE-2021-28100']
Netflix/Priam: Temporary Directory Information Disclosure
### Impact When `File.createTempFile` creates a file, the permissions on that file are -rw-r--r--. This means that other users can read the contents of these files after they are written, although they can not modify the contents. This allows for local information disclosure if these files contain sensitive information. Vulnerable locations: - https://github.com/Netflix/Priam/blob/362660bb7ebddb0cfa756a282d94678f65af9f06/priam/src/main/java/com/netflix/priam/backup/MetaData.java#L106-L111 - https://github.com/Netflix/Priam/blob/362660bb7ebddb0cfa756a282d94678f65af9f06/priam/src/main/java/com/netflix/priam/identity/DoubleRing.java#L109-L118 - https://github.com/Netflix/Priam/blob/362660bb7ebddb0cfa756a282d94678f65af9f06/priam/src/main/java/com/netflix/priam/restore/PostRestoreHook.java#L80-L86 --- The custom CodeQL queries leveraged to find these this as well as their results can be found here: https://lgtm.com/query/1543383251073929777/ https://lgtm.com/query/3142895023158674709/ ## Official Disclosure https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-002.md ## Fix There are no fixed versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.netflix.priam:priam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.104'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-f4jh-ww96-9h9j'}]
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:22:43Z', 'nvd_published_at': '2021-03-23T21:15:00Z'}
1.4.0
GHSA-xf46-8vvp-4hxx
2023-09-07T18:44:23Z
2021-03-12T21:33:42Z
null
['CVE-2021-20262']
Keycloak Missing authentication for critical function
A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '12.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20262'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1933639'}]
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T19:13:32Z', 'nvd_published_at': '2021-03-09T18:15:00Z'}
1.4.0
GHSA-43gc-mjxg-gvrq
2022-02-08T21:31:51Z
2021-03-22T23:29:28Z
null
['CVE-2021-21350']
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21350](https://x-stream.github.io/CVE-2021-21350.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21350'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21350.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]
{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:26:55Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}
1.4.0
GHSA-p493-635q-r6gr
2021-03-03T01:49:22Z
2021-03-03T02:03:52Z
null
['CVE-2021-21353']
Remote code execution via the `pretty` option.
### Impact If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. ### Patches Upgrade to `pug@3.0.1` or `pug-code-gen@3.0.2` or `pug-code-gen@2.0.3`, which correctly sanitise the parameter. ### Workarounds If there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade. ### References Original report: https://github.com/pugjs/pug/issues/3312 ### For more information If you believe you have found other vulnerabilities, please **DO NOT** open an issue. Instead, you can follow the instructions in our [Security Policy](https://github.com/pugjs/pug/blob/master/SECURITY.md)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'pug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pug-code-gen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'pug-code-gen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21353'}, {'type': 'WEB', 'url': 'https://github.com/pugjs/pug/issues/3312'}, {'type': 'WEB', 'url': 'https://github.com/pugjs/pug/pull/3314'}, {'type': 'WEB', 'url': 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'}, {'type': 'WEB', 'url': 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/pug'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/pug-code-gen'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-03T01:49:22Z', 'nvd_published_at': '2021-03-03T02:15:00Z'}
1.4.0
GHSA-fh63-4r66-jc7v
2022-04-25T23:35:22Z
2021-03-12T20:24:22Z
null
['CVE-2020-13959']
Cross-site scripting (XSS) in Apache Velocity Tools
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.velocity.tools:velocity-tools-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.velocity:velocity-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13959'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3@%3Cuser.velocity.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r97edad0655770342d2d36620fb1de50b142fcd6c4f5c53dd72ca41d7@%3Cuser.velocity.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9868c564cff7adfd5283563f2309b93b3e496354a211a57503b2f72@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00021.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-52'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/10/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T20:23:42Z', 'nvd_published_at': '2021-03-10T08:15:00Z'}
1.4.0
GHSA-8877-prq4-9xfw
2023-07-03T22:06:02Z
2021-03-02T03:44:17Z
null
['CVE-2021-22881']
Actionpack Open Redirect Vulnerability
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22881'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/b5de7b3a4787d8a55aaad39f477c16e3af65e444'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1047447'}, {'type': 'WEB', 'url': 'https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/v6.1.2.1/actionpack/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22881.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/zN_3qA26l6E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/actionpack'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/05/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/14/5'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T03:44:04Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}
1.4.0
GHSA-mrvj-7q4f-5p42
2021-03-19T19:56:16Z
2021-03-19T19:56:42Z
null
[]
Cross-site scripting in eZ Platform Kernel
### Impact In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims. ### Patches The fix consists simply of adding common types of scriptable file types to the configuration of the already existing filetype blacklist feature. See "Patched versions". As such, this can also be done manually, without installing the patched versions. This may be relevant if you are currently running a considerably older version of the kernel package and don't want to upgrade it at this time. Please see the settting "ezsettings.default.io.file_storage.file_type_blacklist" at: https://github.com/ezsystems/ezplatform-kernel/blob/master/eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml#L109 ### Important note You should adapt this setting to your needs. Do not add file types to the blacklist that you actually need to be able to upload. For instance, if you need your editors to be able to upload SVG files, then don't blacklist that. Instead, you could e.g. use an approval workflow for such content.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.13.8.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.5.15.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.5.15.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.5'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.5.15.2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T19:56:16Z', 'nvd_published_at': None}
1.4.0
GHSA-5mg8-w23w-74h3
2023-08-18T15:56:36Z
2021-03-25T17:04:19Z
null
['CVE-2020-8908']
Information Disclosure in Guava
A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.guava:guava'}, 'ecosystem_specific': {'affected_functions': ['com.google.common.io.Files.createTempDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '32.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8908'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/4011'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/4011#issuecomment-1578991974'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/commit/feb83a1c8fd2e7670b244d5afd23cba5aca43284'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/guava'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e%40%3Ccommits.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6%40%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6@%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748%40%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc%40%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27%40%3Cyarn-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27@%3Cyarn-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44%40%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817db6bfcc41c6e04e199%40%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817db6bfcc41c6e04e199@%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222%40%3Ccommits.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222@%3Ccommits.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367a29a3bc6bbf0baf2c%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367a29a3bc6bbf0baf2c@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb654417809bfdacf09%40%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb654417809bfdacf09@%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba%40%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc98f6b1cd3d86923b3%40%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc98f6b1cd3d86923b3@%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0173551997c749d322%40%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0173551997c749d322@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3%40%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a%40%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24afe80af2a670785b97%40%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24afe80af2a670785b97@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6f848fcc3d606fd78f%40%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6f848fcc3d606fd78f@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95%40%3Cgithub.arrow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc29ccb77713b16e7c5%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc29ccb77713b16e7c5@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604%40%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf%40%3Cdev.pig.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf@%3Cdev.pig.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f5188ceeb3b49c8a1d27%40%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f5188ceeb3b49c8a1d27@%3Cyarn-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85%40%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73ee7bfb34783e1f0d4e%40%3Cyarn-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73ee7bfb34783e1f0d4e@%3Cyarn-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083007d04640b82aa625%40%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083007d04640b82aa625@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594%40%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0003/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-173', 'CWE-200', 'CWE-378', 'CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T17:01:09Z', 'nvd_published_at': '2020-12-10T23:15:00Z'}
1.4.0
GHSA-qmw8-3v4g-gwj4
2021-03-02T03:32:13Z
2021-03-03T01:52:05Z
null
['CVE-2021-21321']
Prefix escape
### Impact By crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is. [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N) ### Patches A patch have been submitted by Corey Farrell git@cfware.com, the reporter. All releases after v4.0.2 include the fix. ### Workarounds There are no workaround available. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastify-reply-from'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21321'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/fastify-reply-from'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T03:32:13Z', 'nvd_published_at': '2021-03-02T04:15:00Z'}
1.4.0
GHSA-r9p9-mrjm-926w
2023-09-06T23:43:30Z
2021-03-08T16:06:50Z
null
['CVE-2020-28498']
Elliptic Uses a Broken or Risky Cryptographic Algorithm
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'elliptic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/pull/244/commits'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'}, {'type': 'WEB', 'url': 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/elliptic'}]
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T16:02:43Z', 'nvd_published_at': '2021-02-02T19:15:00Z'}
1.4.0
GHSA-4qwp-7c67-jmcc
2021-03-23T00:13:45Z
2021-03-29T20:23:46Z
null
['CVE-2021-3129']
Unauthenticated remote code execution in Ignition
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.16.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3129'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/pull/334'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml'}, {'type': 'WEB', 'url': 'https://www.ambionics.io/blog/laravel-debug-rce'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:13:45Z', 'nvd_published_at': '2021-01-12T15:15:00Z'}
1.4.0
GHSA-mpvw-25mg-59vx
2023-09-05T18:10:06Z
2021-03-29T16:32:27Z
null
['CVE-2020-28463']
Server-side Request Forgery (SSRF) via img tags in reportlab
All versions of package reportlab at time of writing are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject `<img src="http://127.0.0.1:5000" valign="top"/>` 4. Create a nc listener `nc -lp 5000` 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'reportlab'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.55'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28463'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1930417'}, {'type': 'PACKAGE', 'url': 'https://hg.reportlab.com/hg-public/reportlab'}, {'type': 'WEB', 'url': 'https://hg.reportlab.com/hg-public/reportlab/file/f094d273903a/CHANGES.md#l71'}, {'type': 'WEB', 'url': 'https://hg.reportlab.com/hg-public/reportlab/rev/7f2231703dc7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMUJA5GZTPQ5WRYUCCK2GEZM4W43N7HH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZQSFCID67K6BTC655EQY6MNOF35QI44/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145'}, {'type': 'WEB', 'url': 'https://www.reportlab.com/docs/reportlab-userguide.pdf'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:04:29Z', 'nvd_published_at': '2021-02-18T16:15:00Z'}
1.4.0
GHSA-37pf-w9ff-gqvm
2021-03-18T22:07:16Z
2021-03-29T20:58:59Z
null
['CVE-2019-0927']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0933, CVE-2019-0937.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0927'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0927'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:07:16Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}
1.4.0
GHSA-h9q8-5gv2-v6mg
2021-03-12T22:10:34Z
2021-03-12T23:09:08Z
null
[]
Potential Session Hijacking
### Impact Potential session hijacking of store customers. ### Patches We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/shopware/platform'}]
{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:10:34Z', 'nvd_published_at': None}
1.4.0
GHSA-vxhx-gmhm-623c
2021-03-24T23:17:35Z
2021-03-29T20:42:46Z
null
['CVE-2020-25698']
Improper Access Control in moodle
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25698'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895419'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413935'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:17:35Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}
1.4.0
GHSA-5rcr-q3rx-j7vr
2021-03-29T21:03:41Z
2021-03-29T20:57:35Z
null
['CVE-2019-1107']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:38:36Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}
1.4.0
GHSA-h6q6-9hqw-rwfv
2023-01-02T21:51:19Z
2021-03-12T22:39:39Z
null
['CVE-2021-21366']
Misinterpretation of malicious XML input
### Impact xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to 0.5.0 (once it is released) ### Workarounds Downstream applications can validate the input and reject the maliciously crafted documents. ### References Similar to this one reported on the Go standard library: - https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) * Email us: send an email to **all** addresses that are shown by `npm owner ls xmldom`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'}, {'type': 'PACKAGE', 'url': 'https://github.com/xmldom/xmldom'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/releases/tag/0.5.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00000.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xmldom'}]
{'cwe_ids': ['CWE-115', 'CWE-436'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T16:21:24Z', 'nvd_published_at': '2021-03-12T17:15:00Z'}
1.4.0
GHSA-q99r-j969-6jwr
2021-03-23T15:10:34Z
2021-03-29T20:56:04Z
null
['CVE-2019-1237']
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1237'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:10:34Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}
1.4.0
GHSA-c9hq-g4q8-w893
2021-03-24T23:17:02Z
2021-03-29T20:42:55Z
null
['CVE-2020-25701']
Privilage Escalation in moodle
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895432'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413939'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:17:02Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}
1.4.0
GHSA-qr4p-c9wr-phr6
2021-03-18T23:53:31Z
2021-03-19T21:01:46Z
null
['CVE-2020-28273']
Prototype pollution in set-in
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-in'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28273'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:53:31Z', 'nvd_published_at': '2020-12-02T15:15:00Z'}
1.4.0
GHSA-fjh3-g8gq-9q92
2021-03-23T01:41:27Z
2021-03-23T01:53:47Z
null
['CVE-2021-21340']
Cross-Site Scripting in Content Preview
> ### Meta > * CVSS: `AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0) > * CWE-79 > * Status: **DRAFT** ### Problem It has been discovered that database fields used as _descriptionColumn_ are vulnerable to cross-site scripting when their content gets previewed in the page module. A valid backend user account is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue. ### References * [TYPO3-CORE-SA-2021-007](https://typo3.org/security/advisory/typo3-core-sa-2021-007)
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-fjh3-g8gq-9q92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21340'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-backend'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-007'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:41:27Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}
1.4.0
GHSA-v662-xpcc-9xf6
2021-03-23T22:24:20Z
2021-03-23T22:47:26Z
null
['CVE-2021-21379']
It's possible to execute anything with the rights of the author of a macro which uses the {{wikimacrocontent}} macro
### Impact The `{{wikimacrocontent}}` executes the content with the rights of the wiki macro author instead of the caller of that wiki macro. This makes possible to inject scripts through it and they will be executed with the rights of the wiki macro (very often a user which has Programming rights). Fortunately, no such macro exists by default in XWiki Standard but one could have been created or installed with an extension. ### Patches It has been patched in versions XWiki 12.6.3, 11.10.11 and 12.8-rc-1. ### Workarounds There is no easy workaround other than disabling the affected macros. Inserting content in a safe way or knowing what is the user who called the wiki macro is not easy. ### References https://jira.xwiki.org/browse/XWIKI-17759 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-wikimacro-store'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.4'}, {'fixed': '11.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-wikimacro-store'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rendering-wikimacro-store'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.7'}, {'fixed': '12.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.7.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v662-xpcc-9xf6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21379'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17759'}]
{'cwe_ids': ['CWE-281'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T22:24:20Z', 'nvd_published_at': '2021-03-12T18:15:00Z'}