schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-rf3w-29h3-r636 | 2021-09-17T17:54:21Z | 2021-09-20T20:45:35Z | null | ['CVE-2020-21322'] | Arbitrary Code Execution in feehi/cms | An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/44'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:54:21Z', 'nvd_published_at': '2021-09-15T22:15:00Z'} |
1.4.0 | GHSA-wcvp-r8j8-47pc | 2023-06-13T21:58:19Z | 2021-09-01T18:30:35Z | null | ['CVE-2021-28028'] | Double free in toodee | When inserting rows from an iterator at a particular index, toodee would shift items over, duplicating their ownership. The space reserved for the new elements was based on the len() returned by the ExactSizeIterator.
This could result in elements in the array being freed twice if the iterator panics. Uninitialized or previously freed elements could also be exposed if the len() didn't match the number of elements.
These issues were fixed in commit `ced70c17` by temporarily setting the length of the array smaller while processing it and adding assertions on the number of elements returned by the iterator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'toodee'}, 'ecosystem_specific': {'affected_functions': ['toodee::TooDee::insert_row']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28028'}, {'type': 'WEB', 'url': 'https://github.com/antonmarsden/toodee/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/antonmarsden/toodee/commit/ced70c172486fb4827c172cd8238053df3d1dcdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/antonmarsden/toodee'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0028.html'}] | {'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:42Z', 'nvd_published_at': '2021-03-05T09:15:00Z'} |
1.4.0 | GHSA-3j6g-hxx5-3q26 | 2022-02-08T20:43:00Z | 2021-09-23T23:18:58Z | null | ['CVE-2021-38153'] | Observable Discrepancy in Apache Kafka | Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.11'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.13'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.13'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.13'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38153'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kafka'}, {'type': 'WEB', 'url': 'https://kafka.apache.org/cve-list'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35322aec467ddae34002690edaa4d9f16e7df9b5bf7164869b75b62c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://support.confluent.io/hc/en-us/articles/4407632156692-CVE-2021-38153-Confluent-Platform-Vulnerability-Timing-attacks'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T16:45:11Z', 'nvd_published_at': '2021-09-22T09:15:00Z'} |
1.4.0 | GHSA-v92m-hhhw-vv9v | 2021-08-30T21:59:12Z | 2021-09-01T18:27:12Z | null | ['CVE-2019-19208'] | Code injection in codiad | Codiad Web IDE through 2.8.4 allows PHP Code injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codiad/codiad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19208'}, {'type': 'PACKAGE', 'url': 'https://github.com/Codiad/Codiad'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/en/security-advisories/'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2019-0049/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49902'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:59:12Z', 'nvd_published_at': '2020-03-16T15:15:00Z'} |
1.4.0 | GHSA-q879-9g95-56mx | 2021-09-17T20:07:13Z | 2021-09-20T19:54:26Z | null | ['CVE-2021-39219'] | Wrong type for `Linker`-define functions when used across two `Engine`s | ### Impact
As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Engine` was used to create the `Linker` and then a different `Engine` was used to create a `Store` and then the `Linker` was used to instantiate a module into that `Store`. Cross-`Engine` usage of functions is not supported in Wasmtime and this can result in type confusion of function pointers, resulting in being able to safely call a function with the wrong type.
Triggering this bug requires using at least two `Engine` values in an embedding and then additionally using two different values with a `Linker` (one at the creation time of the `Linker` and another when instantiating a module with the `Linker`).
It's expected that usage of more-than-one `Engine` in an embedding is relatively rare since an `Engine` is intended to be a globally shared resource, so the expectation is that the impact of this issue is relatively small.
The fix implemented is to change this behavior to `panic!()` in Rust instead of silently allowing it. Using different `Engine` instances with a `Linker` is a programmer bug that `wasmtime` catches at runtime.
### Patches
This bug has been patched and users should upgrade to Wasmtime version 0.30.0.
### Workarounds
If you cannot upgrade Wasmtime and are using more than one `Engine` in your embedding it's recommended to instead use only one `Engine` for the entire program if possible. An `Engine` is designed to be a globally shared resource that is suitable to have only one for the lifetime of an entire process. If using multiple `Engine`s is required then code should be audited to ensure that `Linker` is only used with one `Engine`.
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ecosystem_specific': {'affected_functions': ['wasmtime::Linker::func_new', 'wasmtime::Linker::func_wrap', 'wasmtime::Store::gc']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q879-9g95-56mx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39219'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff'}, {'type': 'WEB', 'url': 'https://crates.io/crates/wasmtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0110.html'}] | {'cwe_ids': ['CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T20:07:13Z', 'nvd_published_at': '2021-09-17T20:15:00Z'} |
1.4.0 | GHSA-hqm2-gwqf-r5g5 | 2021-08-30T17:26:36Z | 2021-09-02T17:17:06Z | null | ['CVE-2021-38302'] | SQL injection in TYPO3 extension | It has been discovered that the extension is susceptible to SQL Injection when processing bounced emails. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N/E:F/RL:U/RC:C'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ecodev/newsletter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38302'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ecodev/newsletter'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-014'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:26:36Z', 'nvd_published_at': '2021-08-13T17:15:00Z'} |
1.4.0 | GHSA-55r9-7mf8-m382 | 2023-09-11T16:20:48Z | 2021-09-22T20:36:46Z | null | ['CVE-2021-23443'] | Cross-site Scripting in edge.js | Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if `{{ }}` are used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'edge.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23443'}, {'type': 'WEB', 'url': 'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'}, {'type': 'PACKAGE', 'url': 'https://github.com/edge-js/edge'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556'}] | {'cwe_ids': ['CWE-79', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T14:25:18Z', 'nvd_published_at': '2021-09-21T17:15:00Z'} |
1.4.0 | GHSA-f263-c949-w85g | 2021-09-28T16:17:25Z | 2021-09-28T16:16:52Z | null | ['CVE-2020-7692'] | Improper Authorization in Google OAuth Client | PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.oauth-client:google-oauth-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7692'}, {'type': 'WEB', 'url': 'https://github.com/googleapis/google-oauth-java-client/issues/469'}, {'type': 'WEB', 'url': 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'}, {'type': 'PACKAGE', 'url': 'https://github.com/googleapis/google-oauth-java-client'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc7636%23section-1'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc8252%23section-8.1'}] | {'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T16:16:34Z', 'nvd_published_at': '2020-07-09T14:15:00Z'} |
1.4.0 | GHSA-593v-wcqx-hq2w | 2021-09-03T21:34:00Z | 2021-09-07T22:57:58Z | null | [] | Incorrect version tags linked to external repository | ### Impact
A security incident caused a number of incorrect version tags to be pushed to the Parse Server repository. These version tags linked to a personal fork of a contributor who had write access to the repository. The code to which these tags linked has not been reviewed or approved by Parse Platform. Even though no releases were published with these incorrect versions, it was possible to define a Parse Server dependency that pointed to these version tags, for example if you defined this dependency:
```js
"parse-server": "git@github.com:parse-community/parse-server.git#4.9.3"
```
We have since deleted the incorrect version tags, but they may still show up in your personal fork on GitHub or locally. We do not know when these tags have been pushed to the Parse Server repository, but we first became aware of this issue on July 21, 2021. We are not aware of any malicious code or concerns related to privacy, security or legality (e.g. proprietary code). However, it has been reported that some functionality does not work as expected and the introduction of security vulnerabilities cannot be ruled out.
You may be also affected if you used the Bitnami image for Parse Server. Bitnami picked up the incorrect version tag `4.9.3` and published a new Bitnami image for Parse Server.
**If you are using any of the affected versions, we urgently recommend to upgrade to version `4.10.0`.**
These are the incorrect tags:
```
4.0.0-beta1
4.0.0-beta2
4.0.0-beta3
4.0.0-beta4
4.0.0-beta5
4.0.0-beta6
4.0.10
4.0.11
4.0.12
4.0.13
4.0.14
4.0.3
4.0.4
4.0.6
4.0.7
4.0.8
4.0.9
4.6.0
4.6.0-beta
4.7.0
4.8.0
4.8.1
4.8.2
4.8.3
4.8.4
4.8.5
4.9.0
4.9.1
4.9.2
4.9.3
```
### Patches
Upgrade to version `4.10.0`.
### Workarounds
Downgrade to version `4.5.2`.
### References
n/a | [] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-593v-wcqx-hq2w'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T21:34:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vvf2-ppj9-pp49 | 2022-05-04T03:24:54Z | 2021-09-20T20:42:06Z | null | ['CVE-2021-3794'] | Inefficient Regular Expression Complexity in vuelidate | vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@vuelidate/validators'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-alpha.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-alpha.21'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794'}, {'type': 'WEB', 'url': 'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d'}, {'type': 'PACKAGE', 'url': 'https://github.com/vuelidate/vuelidate'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7'}] | {'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:15:49Z', 'nvd_published_at': '2021-09-15T13:15:00Z'} |
1.4.0 | GHSA-2q95-593f-g7h7 | 2021-08-26T14:59:25Z | 2021-09-02T17:16:06Z | null | ['CVE-2020-22345'] | OS Command Injection in Centreon | /graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.04.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.10.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22345'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/8467#event-3163627607'}, {'type': 'WEB', 'url': 'https://engindemirbilek.github.io/centreon-19.10-rce'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T14:59:25Z', 'nvd_published_at': '2021-08-18T21:15:00Z'} |
1.4.0 | GHSA-pc4w-8v5j-29w9 | 2021-08-30T21:46:09Z | 2021-09-01T18:31:29Z | null | ['CVE-2021-34371'] | Deserialization of Untrusted Data in Neo4j | Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j:neo4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34371'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/neo4j'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/50170'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:46:09Z', 'nvd_published_at': '2021-08-05T20:15:00Z'} |
1.4.0 | GHSA-4jg2-84c2-pj95 | 2023-01-26T21:57:36Z | 2021-09-21T18:41:59Z | null | ['CVE-2023-23619'] | Improper Control of Generation of Code ('Code Injection') in @asyncapi/modelina | ### Impact
Anyone who is using the default presets and/or does not handle the functionality themself.
### Patches
It is impossible to fully guard against this, because users have access to the original raw information. However, as of version 1, if you only access the constrained models, you will not encounter this issue.
Further similar situations are NOT seen as a security issue, but intended behavior.
### Workarounds
Fully custom presets that change the entire rendering process which can then escape the user input.
### For more information
Even though that I changed all the presets here, the vulnerability is still present throughout. I am using a JSON Schema here for simplicity.
```ts
const jsonSchemaDoc = {
$id: 'CustomClass',
type: 'object',
properties: {
'property: any; \n constructor(){console.log("injected")} \n private _temp': { type: 'string' },
}
};
generator = new TypeScriptGenerator(
{
presets: [
{
class: {
property({ propertyName, content }) {
return `private ${propertyName}: any;`;
},
ctor() {
return '';
},
getter() {
return '';
},
setter() {
return '';
}
}
}
]
}
);
const inputModel = await generator.process(jsonSchemaDoc);
```
This would render
```ts
export class CustomClass {
private property: any;
constructor(){console.log("injected")}
private _temp: any;
private additionalProperties: any;
}
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@asyncapi/modelina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23619'}, {'type': 'PACKAGE', 'url': 'https://github.com/asyncapi/modelina'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T16:14:04Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-h9w3-f7x6-v54c | 2021-10-28T16:14:46Z | 2021-09-20T23:18:54Z | 2021-10-28T16:13:59Z | ['CVE-2021-23441'] | Deserialization of Untrusted Data in com.jsoniter:jsoniter | # Withdrawn
was withdrawn by its CNA. Further investigation showed that it was not a security issue.
## Original Description
All versions of package com.jsoniter:jsoniter are vulnerable to Deserialization of Untrusted Data via malicious JSON strings. This may lead to a Denial of Service, and in certain cases, code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jsoniter:jsoniter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23441'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMJSONITER-1316198'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:25:57Z', 'nvd_published_at': '2021-09-19T14:15:00Z'} |
1.4.0 | GHSA-p92x-r36w-9395 | 2023-09-07T18:41:16Z | 2021-09-02T22:02:25Z | null | ['CVE-2021-23438'] | Type confusion in mpath | This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition `ignoreProperties.indexOf(parts[i]) !== -1` returns `-1` if `parts[i]` is `['__proto__']`. This is because the method that has been called if the input is an array is `Array.prototype.indexOf()` and not `String.prototype.indexOf()`. They behave differently depending on the type of the input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'mpath'}, 'ecosystem_specific': {'affected_functions': ['mpath.get', 'mpath.has', 'mpath.unset', 'mpath.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23438'}, {'type': 'WEB', 'url': 'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc'}, {'type': 'WEB', 'url': 'https://github.com/mongoosejs/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/aheckmann/mpath'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MPATH-1577289'}] | {'cwe_ids': ['CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T17:06:28Z', 'nvd_published_at': '2021-09-01T19:15:00Z'} |
1.4.0 | GHSA-246r-r2wf-frhx | 2021-09-03T15:58:46Z | 2021-09-01T18:31:36Z | null | ['CVE-2021-36804'] | Malicious password-reset in Akaunting | Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'akaunting/akaunting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36804'}, {'type': 'WEB', 'url': 'https://github.com/laravel/laravel/pull/5477'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/laravel'}, {'type': 'WEB', 'url': 'https://github.com/laravel/laravel/blob/75a7dba9c44ce3555cc57dd1826467839fd9774f/CHANGELOG.md#v844-2020-12-01'}, {'type': 'WEB', 'url': 'https://www.laravel-enlightn.com/docs/security/host-injection-analyzer.html'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/'}] | {'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:34:44Z', 'nvd_published_at': '2021-08-04T23:15:00Z'} |
1.4.0 | GHSA-m489-xr35-fjxr | 2021-09-22T20:34:42Z | 2021-09-22T20:35:08Z | null | [] | Regular Expression Denial of Service in millisecond | Versions of `millisecond` prior to 0.1.2 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Proof of concept
```
var ms = require('millisecond');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
ms(genstr(process.argv[2], "5") + " minutea");
```
## Recommendation
Update to version 0.1.2 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'millisecond'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/unshiftio/millisecond/pull/4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/59'}] | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T20:34:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rh5w-82wh-jhr8 | 2021-08-30T18:05:54Z | 2021-09-01T18:40:31Z | null | ['CVE-2021-27912'] | XSS vulnerability on asset view | ### Impact
Mautic versions before 3.3.4 / 4.0.0 are vulnerable to an inline JS XSS attack when viewing Mautic assets by utilizing inline JS in the title and adding a broken image URL as a remote asset. This can only be leveraged by an authenticated user with permission to create or edit assets.
### Patches
Upgrade to 3.3.4 or 4.0.0
### Workarounds
No
### References
https://github.com/mautic/mautic/releases/tag/3.3.4
https://github.com/mautic/mautic/releases/tag/4.0.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-rh5w-82wh-jhr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27912'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:05:54Z', 'nvd_published_at': '2021-08-30T16:15:00Z'} |
1.4.0 | GHSA-4fr2-j4g9-mppf | 2023-09-07T22:37:35Z | 2021-09-24T15:42:21Z | null | ['CVE-2020-28271'] | Prototype Pollution in deephas | Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deephas'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28271'}, {'type': 'WEB', 'url': 'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271,'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:25:52Z', 'nvd_published_at': '2020-11-12T18:15:00Z'} |
1.4.0 | GHSA-m72g-42q6-gvc2 | 2021-10-04T14:22:45Z | 2021-10-04T20:13:11Z | null | ['CVE-2020-20129'] | Cross-site Scripting in LaraCMS | LaraCMS contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'wanglelecc/laracms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20129'}, {'type': 'WEB', 'url': 'https://github.com/wanglelecc/laracms/issues/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/wanglelecc/laracms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T20:34:58Z', 'nvd_published_at': '2021-09-29T22:15:00Z'} |
1.4.0 | GHSA-wpvm-wqr4-p7cw | 2022-02-08T21:39:05Z | 2021-10-13T15:34:09Z | null | ['CVE-2021-26272'] | Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4 | It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26272'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-829'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:01:30Z', 'nvd_published_at': '2021-01-26T21:15:00Z'} |
1.4.0 | GHSA-3ww4-cp53-6g2x | 2021-10-21T14:56:51Z | 2021-10-18T19:44:06Z | null | ['CVE-2021-42228'] | Cross Site Request Forgery in kindeditor | Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x. First, you upload an html file containing csrf on the website that uses a google editor, (you only need to search in google: inurl:/examples/uploadbutton.html) and then use the authority of this website to trick users into clicking your malicious html link. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'kindeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42228'}, {'type': 'WEB', 'url': 'https://github.com/kindsoft/kindeditor/issues/337'}, {'type': 'PACKAGE', 'url': 'https://github.com/kindsoft/kindeditor'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:38:56Z', 'nvd_published_at': '2021-10-14T17:15:00Z'} |
1.4.0 | GHSA-fffj-9qwg-qmh5 | 2021-10-08T18:19:43Z | 2021-10-12T22:00:31Z | null | ['CVE-2016-1517'] | Improper Input Validation in OpenCV | OpenCV 3.0.0 allows remote attackers to cause a denial of service (segfault) via vectors involving corrupt chunks. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV 3.3.1.11). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1517'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/5956'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/1701.04739.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T18:19:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qh54-9vc5-m9fg | 2021-10-11T21:16:02Z | 2021-10-12T16:06:30Z | null | [] | MD5 hash support in github.com/foxcpp/maddy | ### Impact
This vulnerability affects maddy 0.5.1, 0.5.0 users using auth.shadow module
and an extremely outdated system that still allows MD5 hashes in
/etc/shadows.
### Patches
Patch is available as part of the 0.5.2 release.
### Workarounds
Ensure MD5 hashes are not present in /etc/shadow.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-qh54-9vc5-m9fg'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}] | {'cwe_ids': ['CWE-261'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T21:16:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fxwf-45c7-4ppr | 2022-01-07T16:07:29Z | 2021-10-12T16:40:58Z | null | ['CVE-2020-28270'] | Prototype pollution in object-hierarchy-access | Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'object-hierarchy-access'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.33.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270'}, {'type': 'WEB', 'url': 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'}, {'type': 'PACKAGE', 'url': 'https://github.com/mjpclab/object-hierarchy-access'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270,'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T21:14:17Z', 'nvd_published_at': '2020-11-12T18:15:00Z'} |
1.4.0 | GHSA-8849-5h85-98qw | 2021-10-06T19:53:25Z | 2021-10-12T22:22:17Z | null | ['CVE-2019-9423'] | Out-of-bounds Write in OpenCV | In opencv calls that use libpng, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges required. User interaction is not required for exploitation. Product: AndroidVersions: Android-10Android ID: A-110986616 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9423'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://source.android.com/security/bulletin/android-10'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10/25/17'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10/27/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/07/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/05/1'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T19:53:25Z', 'nvd_published_at': '2019-09-27T19:15:00Z'} |
1.4.0 | GHSA-x2gw-85w6-fjjw | 2021-10-05T16:02:41Z | 2021-10-04T20:13:55Z | null | ['CVE-2021-40926'] | Cross-site scripting in demos/demo.mysqli.php in getID3 | Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'james-heinrich/getid3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.9.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40926'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/getID3/issues/341'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/getID3/pull/342'}, {'type': 'PACKAGE', 'url': 'https://github.com/JamesHeinrich/getID3'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/getID3/releases/tag/v1.9.21'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T13:49:18Z', 'nvd_published_at': '2021-10-01T16:15:00Z'} |
1.4.0 | GHSA-56wv-2wr9-3h9r | 2023-08-30T22:53:57Z | 2021-10-12T16:30:37Z | null | ['CVE-2020-12607'] | Improper Verification of Cryptographic Signature in fastecdsa | An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s<sup>-1</sup>, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'fastecdsa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12607'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/commit/4a16daeaf139be20654ef58a9fe4c79dc030458c'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/commit/7b64e3efaa806b4daaf73bb5172af3581812f8de'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/commit/e592f106edd5acf6dacedfab2ad16fe6c735c9d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/AntonKueltz/fastecdsa'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:28:23Z', 'nvd_published_at': '2020-06-02T21:15:00Z'} |
1.4.0 | GHSA-68jc-v27h-vhmw | 2023-09-08T14:12:06Z | 2021-10-12T16:28:25Z | null | ['CVE-2020-13671'] | Drupal core Unrestricted Upload of File with Dangerous Type | Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.9.0'}, {'fixed': '8.9.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.74'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13671'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-012'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:20:20Z', 'nvd_published_at': '2020-11-20T16:15:00Z'} |
1.4.0 | GHSA-qv95-g3gm-x542 | 2022-08-10T23:49:29Z | 2021-10-12T16:39:01Z | null | ['CVE-2021-41802'] | Hashicorp Vault Privilege Escalation Vulnerability | HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41802'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-27-vault-merging-multiple-entity-aliases-for-the-same-mount-may-allow-privilege-escalation/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}] | {'cwe_ids': ['CWE-269', 'CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:57:45Z', 'nvd_published_at': '2021-10-08T17:15:00Z'} |
1.4.0 | GHSA-fvq6-392h-6mjj | 2021-11-18T00:06:51Z | 2021-10-12T22:01:08Z | null | ['CVE-2017-12599'] | Out-of-bounds Read in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the function icvCvt_BGRA2BGR_8u_C4C3R when reading an image file by using cv::imread. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12599'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:47:17Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-823f-cwm9-4g74 | 2021-10-05T21:11:11Z | 2021-10-06T17:49:23Z | null | ['CVE-2021-41124'] | Splash authentication credentials potentially leaked to target websites | ### Impact
If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`.
### Patches
Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely.
### Workarounds
If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth).
Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots).
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/scrapy-plugins/scrapy-splash/issues)
* [Email us](mailto:opensource@zyte.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'scrapy-splash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41124'}, {'type': 'WEB', 'url': 'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy-plugins/scrapy-splash'}, {'type': 'WEB', 'url': 'https://github.com/scrapy-plugins/scrapy-splash/releases/tag/0.8.0'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T21:11:11Z', 'nvd_published_at': '2021-10-05T21:15:00Z'} |
1.4.0 | GHSA-3f99-hvg4-qjwj | 2021-10-11T18:36:36Z | 2021-10-11T17:09:05Z | null | ['CVE-2021-41117'] | Insecure random number generation in keypair | ## Description and Impact
A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging to the victim. We recommend replacing any RSA keys that were generated using keypair version 1.0.3 or earlier.
## Fix
* The [bug](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) in the pseudo-random number generator is fixed in commit [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18).
* If the crypto module is available, it is used instead of the pseudo-random number generator. Also fixed in [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18)
## Additional Details
The specific [line](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) with the flaw is:
```javascript
b.putByte(String.fromCharCode(next & 0xFF))
```
The [definition](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L350-L352) of `putByte` is
```javascript
util.ByteBuffer.prototype.putByte = function(b) {
this.data += String.fromCharCode(b);
};
```
Simplified, this is `String.fromCharCode(String.fromCharCode(next & 0xFF))`. This results in most of the buffer containing zeros. An example generated buffer:
(Note: truncated for brevity)
```
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x04\x00\x00\x00....\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
```
Since it is masking with 0xFF, approximately 97% of the bytes are converted to zeros. The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion.
## Credit
This issue was reported to GitHub Security Lab by Ross Wheeler of Axosoft. It was discovered by Axosoft engineer Dan Suceava, who noticed that [keypair](https://github.com/juliangruber/keypair) was regularly generating duplicate RSA keys. GitHub security engineer [@vcsjones (Kevin Jones)](https://github.com/vcsjones) independently investigated the problem and identified the cause and source code location of the bug. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'keypair'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41117'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18'}, {'type': 'PACKAGE', 'url': 'https://github.com/juliangruber/keypair'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/keypair/releases/tag/v1.0.4'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/'}] | {'cwe_ids': ['CWE-335'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T17:06:03Z', 'nvd_published_at': '2021-10-11T17:15:00Z'} |
1.4.0 | GHSA-v988-828w-xvf2 | 2021-10-21T21:36:22Z | 2021-10-22T16:21:07Z | null | [] | Authentication Bypass Using an Alternate Path or Channel and Authentication Bypass by Primary Weakness in rucio-webui | ### Impact
`rucio-webui` installations of the `1.26` release line potentially leak the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the `webui` within a close timeframe, thus allowing users to access the `webui` with the leaked authentication token. Privileges are therefore also escalated.
Rucio server / daemons are not affected by this issue, it is isolated to the webui.
### Patches
This issue is fixed in the `1.26.7` release of the `rucio-webui`.
### Workarounds
Installation of the `1.25.7` `webui` release. The `1.25` and previous webui release lines are not affected by this issue.
### References
https://github.com/rucio/rucio/issues/4928 | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'rucio-webui'}, 'ecosystem_specific': {'affected_functions': ['rucio-webui.lib.rucio.web.ui.flask.common.utils.add_cookies', 'rucio-webui.lib.rucio.web.ui.flask.common.utils.redirect_to_last_known_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.26.0'}, {'fixed': '1.26.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rucio/rucio/security/advisories/GHSA-v988-828w-xvf2'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/issues/4810'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/issues/4928'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/commit/8f832404ae88d6300e17d7e706b40fe58e0df90c'}, {'type': 'PACKAGE', 'url': 'https://github.com/rucio/rucio'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/releases/tag/1.26.7'}] | {'cwe_ids': ['CWE-288', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T21:36:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x95h-979x-cf3j | 2021-10-19T16:10:19Z | 2021-10-19T20:15:30Z | null | ['CVE-2021-42576'] | Policies not properly enforced in bluemonday | The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Python (in pybluemonday), does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pybluemonday'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/microcosm-cc/bluemonday'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42576'}, {'type': 'WEB', 'url': 'https://github.com/microcosm-cc/bluemonday/commit/c788a2a4d42e081ad54a31368478820bb4a42fb4'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/'}, {'type': 'PACKAGE', 'url': 'https://github.com/microcosm-cc/bluemonday'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0588'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:10:19Z', 'nvd_published_at': '2021-10-18T15:15:00Z'} |
1.4.0 | GHSA-j7qv-pgf6-hvh4 | 2021-10-27T17:00:26Z | 2021-10-26T14:55:21Z | null | ['CVE-2021-41183'] | XSS in `*Text` options of the Datepicker widget in jquery-ui | ### Impact
Accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
```js
$( "#datepicker" ).datepicker( {
showButtonPanel: true,
showOn: "both",
closeText: "<script>doEvilThing( 'closeText XSS' )</script>",
currentText: "<script>doEvilThing( 'currentText XSS' )</script>",
prevText: "<script>doEvilThing( 'prevText XSS' )</script>",
nextText: "<script>doEvilThing( 'nextText XSS' )</script>",
buttonText: "<script>doEvilThing( 'buttonText XSS' )</script>",
appendText: "<script>doEvilThing( 'appendText XSS' )</script>",
} );
```
will call `doEvilThing` with 6 different parameters coming from all `*Text` options.
### Patches
The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML.
### Workarounds
A workaround is to not accept the value of the `*Text` options from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1953'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'WEB', 'url': 'https://bugs.jqueryui.com/ticket/15284'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-001'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:45Z', 'nvd_published_at': '2021-10-26T15:15:00Z'} |
1.4.0 | GHSA-pjwm-rvh2-c87w | 2023-07-28T15:38:48Z | 2021-10-22T20:38:14Z | null | [] | Embedded malware in ua-parser-js | The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.29'}, {'fixed': '0.7.30'}]}], 'versions': ['0.7.29']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.1'}]}], 'versions': ['0.8.0']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496'}, {'type': 'PACKAGE', 'url': 'https://github.com/faisalman/ua-parser-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ua-parser-js'}] | {'cwe_ids': ['CWE-829', 'CWE-912'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T20:37:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w729-7633-2fw5 | 2021-10-29T13:51:56Z | 2021-10-27T18:52:06Z | null | ['CVE-2021-40865'] | Deserialization of Untrusted Data leading to Remote Code Execution in Apache Storm | An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40865'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/45'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:53:48Z', 'nvd_published_at': '2021-10-25T13:15:00Z'} |
1.4.0 | GHSA-634c-v2xv-ffpg | 2021-10-07T20:28:55Z | 2021-10-12T22:02:51Z | null | ['CVE-2017-14136'] | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14136'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9443'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9448'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:28:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9g3v-j3cr-6fc6 | 2021-10-25T20:08:05Z | 2021-10-21T17:48:26Z | null | ['CVE-2021-3879'] | Cross-site Scripting in snipe-it | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3879'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:51:59Z', 'nvd_published_at': '2021-10-19T13:15:00Z'} |
1.4.0 | GHSA-9g8h-pjm4-q92p | 2021-11-18T15:31:47Z | 2021-10-12T22:23:41Z | null | ['CVE-2018-5268'] | Out-of-bounds Write in OpenCV. | In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10541'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:55:52Z', 'nvd_published_at': '2018-01-08T05:29:00Z'} |
1.4.0 | GHSA-rjf2-j2r6-q8gr | 2021-10-19T14:18:05Z | 2021-10-19T15:28:45Z | null | ['CVE-2021-23449'] | Prototype Pollution in vm2 | This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/363'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0010/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VM2-1585918'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T14:18:05Z', 'nvd_published_at': '2021-10-18T17:15:00Z'} |
1.4.0 | GHSA-cpqf-3c3r-c9g2 | 2021-10-05T15:57:32Z | 2021-10-05T17:53:20Z | null | ['CVE-2021-40323'] | Cobbler before 3.3.0 allows log poisoning | Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:57:32Z', 'nvd_published_at': '2021-10-04T06:15:00Z'} |
1.4.0 | GHSA-9gj3-hwp5-pmwc | 2021-10-27T17:00:10Z | 2021-10-26T14:55:02Z | null | ['CVE-2021-41182'] | XSS in the `altField` option of the Datepicker widget in jquery-ui | ### Impact
Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
```js
$( "#datepicker" ).datepicker( {
altField: "<img onerror='doEvilThing()' src='/404' />",
} );
```
will call the `doEvilThing` function.
### Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector.
### Workarounds
A workaround is to not accept the value of the `altField` option from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2021-41182.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:41Z', 'nvd_published_at': '2021-10-26T15:15:00Z'} |
1.4.0 | GHSA-5rg2-6qr5-2xp8 | 2021-10-25T20:08:18Z | 2021-10-21T17:49:18Z | null | ['CVE-2021-3863'] | Cross-site Scripting in snipe-it | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:52:33Z', 'nvd_published_at': '2021-10-19T13:15:00Z'} |
1.4.0 | GHSA-jggw-2q6g-c3m6 | 2021-10-06T18:06:55Z | 2021-10-12T22:22:58Z | null | ['CVE-2019-19624'] | Out-of-bounds Read in OpenCV | An out-of-bounds read was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.0.25). Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocated arrays Ux and Uy. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19624'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/14554'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-19624'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T18:06:55Z', 'nvd_published_at': '2019-12-06T15:15:00Z'} |
1.4.0 | GHSA-j8fq-86c5-5v2r | 2022-03-21T19:58:43Z | 2021-10-27T18:53:48Z | null | ['CVE-2021-42343'] | Remote code execution in dask | An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'distributed'}, 'ecosystem_specific': {'affected_functions': ['dask.distributed.LocalCluster', 'dask.distributed.Client']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42343'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/pull/5427'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b'}, {'type': 'WEB', 'url': 'https://docs.dask.org/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dask/distributed'}] | {'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:16:11Z', 'nvd_published_at': '2021-10-26T11:15:00Z'} |
1.4.0 | GHSA-rqxg-xvcq-3v2f | 2021-11-18T15:33:23Z | 2021-10-12T22:02:04Z | null | ['CVE-2017-12605'] | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12605'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:53:47Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-m836-gxwq-j2pm | 2021-10-27T18:58:30Z | 2021-10-28T16:27:03Z | null | [] | Improper Access Control in github.com/treeverse/lakefs | ### Impact
1. [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name.
1. [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them.
1. [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them.
1. [low] A user allowed to list objects in a repository _or_ read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit.
### For more information
If you have any questions or comments about this advisory please:
* Email us at security@treeverse.io.
* Open an issue on https://github.com/treeverse/lakeFS/issues/new.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.53.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-m836-gxwq-j2pm'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/f2117281cadb14fdf9ac7fe287f84d5c10308b88'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:58:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4mvj-rq4v-2fxw | 2022-12-03T03:56:39Z | 2021-10-21T17:50:44Z | null | ['CVE-2021-23452'] | Prototype Pollution in x-assign | This vulnerability affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'x-assign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23452'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvoorberg/x-assign'}, {'type': 'WEB', 'url': 'https://runkit.com/embed/sq8qjwemyn8t'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T14:54:57Z', 'nvd_published_at': '2021-10-20T13:15:00Z'} |
1.4.0 | GHSA-9cxh-gqpx-qc5m | 2022-02-08T20:42:44Z | 2021-10-12T17:49:25Z | null | ['CVE-2021-41355'] | Credential Disclosure in System.DirectoryServices.Protocols | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux.
### Patches
Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux.
Package name | Vulnerable versions | Secure versions
------------ | ---------------- | -------------------------
System.DirectoryServices.Protocols | 5.0.0 | 5.0.1
### Other Details
- Announcement for this issue can be found at dotnet/announcements#202
- An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.DirectoryServices.Protocols'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/60301'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:48:55Z', 'nvd_published_at': '2021-10-13T01:15:00Z'} |
1.4.0 | GHSA-q9p4-qfc8-fvpp | 2021-10-08T23:09:47Z | 2021-10-12T16:32:38Z | null | ['CVE-2019-10762'] | SQL Injection in medoo | columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'catfan/medoo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762'}, {'type': 'WEB', 'url': 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}, {'type': 'PACKAGE', 'url': 'https://github.com/catfan/Medoo'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:09:47Z', 'nvd_published_at': '2019-10-30T22:15:00Z'} |
1.4.0 | GHSA-9378-f4v7-jgm4 | 2021-10-08T21:29:34Z | 2021-10-04T20:12:30Z | null | ['CVE-2021-41616'] | Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils | Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ddlutils:ddlutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41616'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ddlutils'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T18:36:23Z', 'nvd_published_at': '2021-09-30T08:15:00Z'} |
1.4.0 | GHSA-x3rm-644h-67m8 | 2021-10-06T20:21:31Z | 2021-10-12T22:22:05Z | null | ['CVE-2019-16249'] | Out-of-bounds Read in OpenCV | OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16249'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15481'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/15531'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/30'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T20:21:31Z', 'nvd_published_at': '2019-09-11T23:15:00Z'} |
1.4.0 | GHSA-frqg-7g38-6gcf | 2021-10-11T18:39:06Z | 2021-10-05T20:23:18Z | null | ['CVE-2021-41116'] | Improper escaping of command arguments on Windows leading to command injection | ### Impact
Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected.
### Patches
1.10.23 and 2.1.9 fix the issue
### Workarounds
None
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.1.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116'}, {'type': 'WEB', 'url': 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/composer/composer'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:44:04Z', 'nvd_published_at': '2021-10-05T18:15:00Z'} |
1.4.0 | GHSA-5xvc-vgmp-jgc3 | 2021-10-29T13:44:43Z | 2021-10-28T23:13:57Z | null | ['CVE-2021-41194'] | Improper Access Control in jupyterhub-firstuseauthenticator | ### Impact
When JupyterHub is used with FirstUseAuthenticator, the vulnerability allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed.
### Patches
Upgrade to jupyterhub-firstuseauthenticator to 1.0, or apply patch https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch
### Workarounds
If you cannot upgrade, there is no complete workaround, but it can be mitigated.
If you cannot upgrade yet, you can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until you can patch or upgrade. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub-firstuseauthenticator'}, 'ecosystem_specific': {'affected_functions': ['firstuseauthenticator.firstuseauthenticator.FirstUseAuthenticator.authenticate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/security/advisories/GHSA-5xvc-vgmp-jgc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41194'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/commit/953418e2450dbc2d854e332350849533b0ebc7ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/firstuseauthenticator'}] | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T16:52:16Z', 'nvd_published_at': '2021-10-28T20:15:00Z'} |
1.4.0 | GHSA-ppj4-34rq-v8j9 | 2023-08-30T00:32:37Z | 2021-10-25T19:43:15Z | null | ['CVE-2021-42836'] | github.com/tidwall/gjson Vulnerable to REDoS attack | GJSON is a Go package that provides a fast and simple way to get values from a json document. GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42836'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0265'}] | {'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:27:20Z', 'nvd_published_at': '2021-10-22T18:15:00Z'} |
1.4.0 | GHSA-4cfr-gjfx-fj3x | 2021-10-05T15:51:30Z | 2021-10-05T17:53:11Z | null | ['CVE-2021-40324'] | Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40324'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:51:30Z', 'nvd_published_at': '2021-10-04T06:15:00Z'} |
1.4.0 | GHSA-w7x8-cq7r-g5g9 | 2021-10-22T19:37:10Z | 2021-10-25T19:43:39Z | null | ['CVE-2021-33988'] | Cross Site Scripting in Microweber | Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33988'}, {'type': 'WEB', 'url': 'https://github.com/nck0099/osTicket/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T19:37:10Z', 'nvd_published_at': '2021-10-19T17:15:00Z'} |
1.4.0 | GHSA-wq8f-wvqp-xvvm | 2021-11-18T15:34:09Z | 2021-10-12T22:02:35Z | null | ['CVE-2017-12863'] | Integer Overflow or Wraparound in OpenCV | In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function PxMDecoder::readData has an integer overflow when calculate src_pitch. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12863'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9371'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:39:41Z', 'nvd_published_at': '2017-08-15T16:29:00Z'} |
1.4.0 | GHSA-fm39-cw8h-3p63 | 2021-10-07T15:12:30Z | 2021-10-12T22:07:14Z | null | ['CVE-2019-14491'] | Out-of-bounds Read in OpenCV | An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read in the function cv::predictOrdered<cv::HaarEvaluator> in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14491'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15125'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPFLN6QAX6SUA4XR4NMKKXX26H3TYCVQ/'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:12:30Z', 'nvd_published_at': '2019-08-01T17:15:00Z'} |
1.4.0 | GHSA-pgjj-866w-fc5c | 2021-10-11T16:14:26Z | 2021-10-12T16:03:43Z | null | ['CVE-2021-21278'] | Risk of code injection | ### Impact
Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues
### Patches
Temporarily removed the problematic route and added a `no-new-func` rule to eslint
Self-built users should upgrade to 7f1c430 and later as soon as possible
### Credits
Tencent Woodpecker Security Team
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues)
* Email us at [i@diygod.me](mailto:i@diygod.me) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rsshub'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T16:14:26Z', 'nvd_published_at': '2021-01-26T21:15:00Z'} |
1.4.0 | GHSA-3pcq-34w5-p4g2 | 2022-08-15T20:14:42Z | 2021-10-21T17:49:30Z | null | ['CVE-2021-41167'] | modern-async's `forEachSeries` and `forEachLimit` functions do not limit the number of requests | ### Impact
This is a bug affecting two of the functions in this library: `forEachSeries` and `forEachLimit`. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects.
### Patches
The problem has been patched in 1.0.4.
### Workarounds
There is no workaround aside from upgrading to 1.0.4.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'modern-async'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}, {'type': 'PACKAGE', 'url': 'https://github.com/nicolas-van/modern-async'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T17:39:03Z', 'nvd_published_at': '2021-10-20T19:15:00Z'} |
1.4.0 | GHSA-37hx-4mcq-wc3h | 2021-10-06T14:09:30Z | 2021-10-06T17:48:16Z | null | ['CVE-2021-28128'] | Weak Password Recovery Mechanism for Forgotten Password in Strapi | In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28128'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/issues/9657'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.6.0'}, {'type': 'WEB', 'url': 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt'}] | {'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:09:30Z', 'nvd_published_at': '2021-05-06T14:15:00Z'} |
1.4.0 | GHSA-4vr9-8cjf-vf9c | 2021-10-08T22:14:28Z | 2021-10-12T16:00:37Z | null | ['CVE-2020-26281'] | Async-h1 request smuggling possible with long unread bodies | ### Impact
This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications.
If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body.
One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request.
Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to specify a long content and capture another user's request in its body. This content could be captured in a post request to an endpoint that allows the content to be subsequently retrieved by the adversary.
### Patches
This has been addressed in async-h1 2.3.0 and previous versions have been yanked.
### Workarounds
none
### References
https://github.com/http-rs/async-h1/releases/tag/v2.3.0
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [async-h1](https://github.com/http-rs/async-h1)
* Contact a core team member on [zulip](https://http-rs.zulip-chat.com) or [discord](https://discord.gg/x2gKzst) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'async-h1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/security/advisories/GHSA-4vr9-8cjf-vf9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26281'}, {'type': 'PACKAGE', 'url': 'https://github.com/http-rs/async-h1'}, {'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0093.html'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:14:28Z', 'nvd_published_at': '2020-12-21T22:15:00Z'} |
1.4.0 | GHSA-69j6-29vr-p3j9 | 2021-11-18T15:13:27Z | 2021-10-05T20:24:02Z | null | ['CVE-2021-39226'] | Authentication bypass for viewing and deletions of snapshots | Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly.
## CVE-2021-39226 Snapshot authentication bypass
### Summary
CVSS Score: 9.8 Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
We received a security report to [security@grafana.com](mailto:security@grafana.com) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability.
### Impact
Unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths:
* `/dashboard/snapshot/:key`, or
* `/api/snapshots/:key`
If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path:
* `/api/snapshots-delete/:deleteKey`
Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths:
* `/api/snapshots/:key`, or
* `/api/snapshots-delete/:deleteKey`
The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss.
### Attack audit
While we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment.
#### Through reverse proxy/load balancer logs
To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK).
For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job="nginx-ingress-controller"} |= "\"status\": 200" |= "\"uri\": \"/api/snapshots/:key\""`.
#### Through the Grafana Enterprise audit feature
If you enabled “Log web requests” in your configuration with `router_logging = true`, look for
`"requestUri":"/api/snapshots-delete/”`,`“requestUri":"/api/snapshots/:key"`, or `"type":"snapshot"` in combination with `"action":"delete"`.
### Patched versions
Release 8.1.6:
- [Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6)
- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/)
Release 7.5.11:
- [Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11)
- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/)
### Solutions and mitigations
Download and install the appropriate patch for your version of Grafana.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
### Workaround
If for some reason you cannot upgrade:
You can use a reverse proxy or similar to block access to the literal paths
* `/api/snapshots/:key`
* `/api/snapshots-delete/:deleteKey`
* `/dashboard/snapshot/:key`
* `/api/snapshots/:key`
They have no normal function and can be disabled without side effects.
### Timeline and postmortem
Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC.
* 2021-09-15 14:49: Tuan Tran theblackturtle0901@gmail.com sends initial report about viewing snapshots without authentication
* 2021-09-15 15:56: Initial reproduction
* 2021-09-15 17:10: MEDIUM severity declared
* 2021-09-15 18:58: Workaround deployed on Grafana Cloud
* 2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well
* 2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud
* 2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more.
* 2021-09-16 09:35: HIGH severity declared
* 2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS
* 2021-09-16 11:19: CRITICAL declared
* 2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited
* 2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation
* 2021-09-23: Grafana Cloud instances updated
* 2021-09-28 12:00: Grafana Enterprise images released to customers under embargo
* 2021-10-05 17:00: Public release
## Reporting security issues
If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of
Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index.
## Security announcements
We maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements),
where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss).
## Acknowledgement
We would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39226'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0008/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/05/4'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:49:35Z', 'nvd_published_at': '2021-10-05T18:15:00Z'} |
1.4.0 | GHSA-mx3x-ghqm-r43h | 2021-10-08T22:13:34Z | 2021-10-12T16:27:18Z | null | ['CVE-2020-28280'] | Prototype pollution vulnerability in 'predefine' | Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'predefine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28280'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/commit/1a86a013c0b37c9d6ca078ba34017052af38b7fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/bigpipe/predefine'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:13:34Z', 'nvd_published_at': '2020-12-29T18:15:00Z'} |
1.4.0 | GHSA-xpv2-8ppj-79hh | 2021-10-08T21:30:48Z | 2021-10-04T20:14:31Z | null | ['CVE-2021-41862'] | Expression injection in AviatorScript | AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.aviator:aviator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41862'}, {'type': 'WEB', 'url': 'https://github.com/killme2008/aviatorscript/issues/421'}, {'type': 'PACKAGE', 'url': 'https://github.com/killme2008/aviatorscript'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T16:58:38Z', 'nvd_published_at': '2021-10-02T00:15:00Z'} |
1.4.0 | GHSA-6v6p-p97v-g2p7 | 2021-11-18T15:32:35Z | 2021-10-12T22:01:44Z | null | ['CVE-2017-12603'] | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12603'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T21:00:22Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-pfwg-rxf4-97c3 | 2022-06-01T22:01:45Z | 2021-10-06T17:47:53Z | null | ['CVE-2021-28125'] | Open Redirect in Apache Superset | Apache Superset prior to 1.1.0 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.34.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28125'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/eb35b804acf4d84cb70d02743e04b8afebbee029'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pfwg-rxf4-97c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-superset/PYSEC-2021-128.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/27/2'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:11:38Z', 'nvd_published_at': '2021-04-27T10:15:00Z'} |
1.4.0 | GHSA-5fvx-5p2r-4mvp | 2021-10-25T20:08:26Z | 2021-10-21T17:48:41Z | null | ['CVE-2021-3851'] | Open Redirect in firefly-iii | firefly-iii is vulnerable to URL Redirection to Untrusted Site | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3851'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:06:15Z', 'nvd_published_at': '2021-10-19T13:15:00Z'} |
1.4.0 | GHSA-84g3-cv89-m9gm | 2021-10-06T22:34:42Z | 2021-10-13T15:33:20Z | null | ['CVE-2021-25916'] | Prototype pollution vulnerability in 'patchmerge' | Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'patchmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916'}, {'type': 'WEB', 'url': 'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}, {'type': 'PACKAGE', 'url': 'https://github.com/pjshumphreys/patchmerge'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T22:34:42Z', 'nvd_published_at': '2021-03-16T16:15:00Z'} |
1.4.0 | GHSA-c7gp-2pch-qh2v | 2021-11-18T15:33:02Z | 2021-10-12T22:01:55Z | null | ['CVE-2017-12604'] | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillUniColor function in utils.cpp when reading an image file by using cv::imread. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12604'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:57:19Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-xv8x-pr4h-73jv | 2021-10-18T16:33:54Z | 2021-10-12T15:59:29Z | null | ['CVE-2021-41121'] | Memory corruption when returning a literal struct with a private call inside of it | ### Impact
When performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack.
### Patches
0.3.0 / #2447
* | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41121'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2447'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}] | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:47:24Z', 'nvd_published_at': '2021-10-06T18:15:00Z'} |
1.4.0 | GHSA-vw27-fwjf-5qxm | 2021-10-21T20:46:42Z | 2021-10-22T16:20:10Z | null | ['CVE-2021-41146'] | Arbitrary command execution on Windows via qutebrowserurl: URL handler | ### Impact
Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`.
Only Windows installs where qutebrowser is registered as URL handler are affected. It does *not* have to be set as default browser for the exploit to work.
### Patches
The issue has been fixed in [qutebrowser v2.4.0](https://github.com/qutebrowser/qutebrowser/releases/tag/v2.4.0) in commit 8f46ba3f6dc7b18375f7aa63c48a1fe461190430.
The fix also adds additional hardening for potential similar issues on Linux (by adding the new `--untrusted-args` flag to the `.desktop` file), though no such vulnerabilities are known.
Backported patches for older versions are available, but no further releases are planned:
- v1.7.x: d1ceaab
- v1.8.x: ca7155d
- v1.9.x: 157d871
- v1.10.x: 94a6125
- v1.11.x: 10acfbb
- v1.12.x: 363a18f
- v1.13.x: 410f262
- v1.14.x: e4f4d93
- v2.0.x: 15a1654
- v2.1.x: 509ddf2
- v2.2.x: 03dcba5
- v2.3.x: 00a694c
(commits are referring to qutebrowser/qutebrowser on GitHub)
### Workarounds
Remove qutebrowser from the default browser settings entirely, so that it does not handle any kind of URLs. Make sure to remove *all* handlers, including an (accidental) `qutebrowserURL` handler, e.g. using [NirSoft URLProtocolView](https://www.nirsoft.net/utils/url_protocol_view.html).
### Timeline
2021-10-15: Issue reported via security@qutebrowser.org by Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group (VXRL)](https://www.vxrl.hk/)
2021-10-15: Issue confirmed by @The-Compiler (lead developer), author of installer (@bitraid) contacted for help/review
2021-10-15: CVE assigned by GitHub
2021-10-15 to 2021-10-17: Fix developed
2021-10-17: Additional core developer (@toofar) contacted for help/review
2021-10-21: v2.4.0 released containing the fix
2021-10-21: Advisory and fix published
### References
See the [commit message](https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430) for additional information and references to various similar issues in other projects.
### Acknowledgements
Thanks to Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group](https://www.vxrl.hk/) (VXRL/@vxresearch) for finding and responsibly disclosing this issue.
### Contact
If you have any questions or comments about this advisory, please email [security@qutebrowser.org](mailto:security@qutebrowser.org). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}] | {'cwe_ids': ['CWE-641', 'CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T20:46:42Z', 'nvd_published_at': '2021-10-21T18:15:00Z'} |
1.4.0 | GHSA-pqjj-6f5q-gqph | 2021-10-08T14:35:41Z | 2021-10-12T22:01:34Z | null | ['CVE-2017-12602'] | Denial of Service in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (memory consumption) issue, as demonstrated by the 10-opencv-dos-memory-exhaust test case. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12602'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9311'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:35:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8w3x-457r-wg53 | 2021-11-18T00:08:10Z | 2021-10-12T22:00:41Z | null | ['CVE-2017-12597'] | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to opencv-python and opencv-contrib-python through 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12597'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T17:28:40Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-vc29-rj92-gc7j | 2021-11-18T15:33:38Z | 2021-10-12T22:02:12Z | null | ['CVE-2017-12606'] | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow4 in utils.cpp when reading an image file by using cv::imread. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12606'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:49:52Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-fw99-f933-rgh8 | 2021-10-07T15:09:42Z | 2021-10-12T22:09:31Z | null | ['CVE-2019-14492'] | Out-of-bounds Read and Out-of-bounds Write in OpenCV | An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14492'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15124'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html'}] | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:09:42Z', 'nvd_published_at': '2019-08-01T17:15:00Z'} |
1.4.0 | GHSA-xrpj-f9v6-2332 | 2021-10-18T19:08:54Z | 2021-10-04T20:12:45Z | 2021-10-18T19:05:16Z | [] | CSV injection in Craft CMS | # Withdrawn
Duplicate of GHSA-h7vq-5qgw-jwwq | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28'}, {'type': 'WEB', 'url': 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}] | {'cwe_ids': ['CWE-1236', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T19:01:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fr26-qjc8-mvjx | 2021-10-13T17:45:05Z | 2021-10-13T18:56:12Z | null | [] | Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19 | Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '6.0.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31412'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:45:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w96g-3p64-63wr | 2021-11-18T00:06:27Z | 2021-10-12T22:01:23Z | null | ['CVE-2017-12601'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a buffer overflow in the cv::BmpDecoder::readData function in modules/imgcodecs/src/grfmt_bmp.cpp when reading an image file by using cv::imread, as demonstrated by the 4-buf-overflow-readData-memcpy test case. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12601'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:40:39Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-m6vm-8g8v-xfjh | 2022-04-20T19:15:08Z | 2021-10-12T22:23:13Z | null | ['CVE-2019-5063'] | Out-of-bounds Write in OpenCV | An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0 (corresponds with OpenCV-Python 4.1.0.25). A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5063'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/16951'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:40:07Z', 'nvd_published_at': '2020-01-03T17:15:00Z'} |
1.4.0 | GHSA-qf6q-qfwp-vp44 | 2021-10-08T22:34:05Z | 2021-10-12T16:30:58Z | null | ['CVE-2020-8818'] | Origin Validation Error in Magento 2 | An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cardgate/magento2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.33'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8818'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/issues/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/cardgate/magento2'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/releases/tag/v2.0.33'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html'}] | {'cwe_ids': ['CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:34:05Z', 'nvd_published_at': '2020-02-25T02:15:00Z'} |
1.4.0 | GHSA-59hh-656j-3p7v | 2023-08-29T18:55:39Z | 2021-10-25T19:42:57Z | null | ['CVE-2021-41173'] | Geth Node Vulnerable to DoS via maliciously crafted p2p message | ### Impact
A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package.
### Details
On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to crash the snap request handler .
By using this vulnerability, a peer connected on the `snap/1` protocol could cause a vulnerable node to crash with a `panic`.
In the `trie.TryGetNode` implementation, if the requested path is reached, the associated node will be returned. However the nilness is
not checked there.
```golang
func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) {
// If we reached the requested path, return the current node
if pos >= len(path) {
// Although we most probably have the original node expanded, encoding
// that into consensus form can be nasty (needs to cascade down) and
// time consuming. Instead, just pull the hash up from disk directly.
var hash hashNode
if node, ok := origNode.(hashNode); ok {
hash = node
} else {
hash, _ = origNode.cache()
}
```
More specifically the `origNode` can be nil(e.g. the child of fullnode) and system can panic at line `hash, _ = origNode.cache()`.
When investigating this, @holiman tried to find it via fuzzing, which uncovered a second crasher, also related to the snap `GetTrieNodes` package. If the caller requests a storage trie:
```golang
// Storage slots requested, open the storage trie and retrieve from there
account, err := snap.Account(common.BytesToHash(pathset[0]))
loads++ // always account database reads, even for failures
if account == nil {
break
}
stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb)
```
The code assumes that `snap.Account` returns _either_ a non-nil response unless `error` is also provided. This is however not the case, since `snap.Account` can return `nil, nil`.
### Patches
```diff
--- a/eth/protocols/snap/handler.go
+++ b/eth/protocols/snap/handler.go
@@ -469,7 +469,7 @@ func handleMessage(backend Backend, peer *Peer) error {
// Storage slots requested, open the storage trie and retrieve from there
account, err := snap.Account(common.BytesToHash(pathset[0]))
loads++ // always account database reads, even for failures
- if err != nil {
+ if err != nil || account == nil {
break
}
stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb)
diff --git a/trie/trie.go b/trie/trie.go
index 7ea7efa835..d0f0d4e2bc 100644
--- a/trie/trie.go
+++ b/trie/trie.go
@@ -174,6 +174,10 @@ func (t *Trie) TryGetNode(path []byte) ([]byte, int, error) {
}
func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) {
+ // If non-existent path requested, abort
+ if origNode == nil {
+ return nil, nil, 0, nil
+ }
// If we reached the requested path, return the current node
if pos >= len(path) {
// Although we most probably have the original node expanded, encoding
@@ -193,10 +197,6 @@ func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, new
}
// Path still needs to be traversed, descend into children
switch n := (origNode).(type) {
- case nil:
- // Non-existent path requested, abort
- return nil, nil, 0, nil
-
case valueNode:
// Path prematurely ended, abort
return nil, nil, 0, nil
```
The fixes were merged into [#23657](https://github.com/ethereum/go-ethereum/pull/23657), with commit [f1fd963](https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8), and released as part of Geth [v1.10.9](https://github.com/ethereum/go-ethereum/tree/v1.10.9) on Sept 29, 2021.
### Workarounds
Apply the patch above or upgrade to a version which is not vulnerable.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/)
* Email us at [security@ethereum.org](mailto:security@ethereum.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41173'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23801'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0256'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:23:10Z', 'nvd_published_at': '2021-10-26T14:15:00Z'} |
1.4.0 | GHSA-gw97-f6h8-gm94 | 2021-10-20T17:07:20Z | 2021-10-13T18:55:04Z | null | ['CVE-2021-42009'] | Email relay in Apache Traffic Control | An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42009'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78d471d8a4fd268a4c5ae6c47327c09d9d4b4467c31da2c97422febb@%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dfa9a89b39d06caeeeb7b5cdc41b3493a9b86cc6cfa059d3f349d87@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re384fd0f44c6d230f31376153c6e8b59e4a669f927c1533d06d702af%40%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf0481b9e38ece1ece458d3ce7b2d671df819e3555597f31fc34f084e%40%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/12/1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:43:05Z', 'nvd_published_at': '2021-10-12T08:15:00Z'} |
1.4.0 | GHSA-pm77-c4q7-3fwj | 2021-10-08T22:58:55Z | 2021-10-12T16:31:12Z | null | ['CVE-2019-20455'] | Improper Certificate Validation in Heartland & Global Payments PHP SDK | Gateways/Gateway.php in Heartland & Global Payments PHP SDK before 2.0.0 does not enforce SSL certificate validations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'globalpayments/php-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20455'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8/commits/c86e18f28c5eba0d6ede7d557756d978ea83d3c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/globalpayments/php-sdk'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/compare/1.3.3...2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://winterdragon.ca/global-payments-vulnerability/'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:58:55Z', 'nvd_published_at': '2020-02-14T16:15:00Z'} |
1.4.0 | GHSA-362v-wg5p-64w2 | 2021-10-20T17:28:19Z | 2021-10-12T18:41:16Z | null | ['CVE-2021-42135'] | Incorrect Privilege Assignment in HashiCorp Vault | HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'last_affected': '1.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42135'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-28-vaults-google-cloud-secrets-engine-policies-with-globs-may-provide-additional-privileges-in-vault-1-8-0-onwards/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#180'}] | {'cwe_ids': ['CWE-266', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:53:55Z', 'nvd_published_at': '2021-10-11T03:15:00Z'} |
1.4.0 | GHSA-ggmv-6q9p-9gm6 | 2021-10-19T14:51:11Z | 2021-10-12T17:51:04Z | null | ['CVE-2021-42134'] | Cross-site Scripting in django-unicorn | The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-unicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42134'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/commit/3a832a9e3f6455ddd3b87f646247269918ad10c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamghill/django-unicorn'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/compare/0.36.0...0.36.1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:56:03Z', 'nvd_published_at': '2021-10-11T01:15:00Z'} |
1.4.0 | GHSA-h58v-g3q6-q9fx | 2021-10-21T21:33:34Z | 2021-10-22T16:20:53Z | null | ['CVE-2021-41169'] | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu | ### Impact
_What kind of vulnerability is it? Who is impacted?_
It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form.
Only admin users are affected and only admin users can create tags.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem is patched with Version 1.6.42.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Create a custom request listener to avoid that this kind of tags are created.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues)
* Email us at [security@sulu.io](mailto:security@sulu.io)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.43'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T21:33:34Z', 'nvd_published_at': '2021-10-21T21:15:00Z'} |
1.4.0 | GHSA-p6vg-p826-qp3v | 2021-10-21T15:01:19Z | 2021-10-05T20:24:49Z | null | ['CVE-2021-22963'] | URL Redirection to Untrusted Site ('Open Redirect') in fastify-static | ### Impact
A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`.
The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
### Patches
The issue has been patched in `fastify-static@4.2.4`
### Workarounds
If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
### References
+ Bug founder: drstrnegth
+ [hackerone Report](https://hackerone.com/reports/1354255)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastify-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1354255'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-static'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:55:33Z', 'nvd_published_at': '2021-10-14T15:15:00Z'} |
1.4.0 | GHSA-4p3x-8qw9-24w9 | 2021-10-26T17:56:23Z | 2021-10-27T18:53:18Z | null | ['CVE-2021-41188'] | Authenticated Stored XSS in shopware/shopware | ### Impact
Authenticated Stored XSS in Administration
### Patches
Use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### Workarounds
If you cannot use the security plugin, add the following config to your `.htaccess` file
```
<IfModule mod_headers.c>
<FilesMatch "\.(?i:svg)$">
Header set Content-Security-Policy "script-src 'none'"
</FilesMatch>
</IfModule>
```
If you are using nginx as server config, you can add the following to your configuration:
```
server {
# ...
location ~* ^.+\.svg$ {
add_header Content-Security-Policy "script-src 'none'";
}
}
```
### References
https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4p3x-8qw9-24w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41188'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/37213e91d525c95df262712cba80d1497e395a58'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/releases/tag/v5.7.6'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:56:23Z', 'nvd_published_at': '2021-10-26T15:15:00Z'} |
1.4.0 | GHSA-6768-mcjc-8223 | 2022-10-19T15:36:14Z | 2021-10-27T18:51:22Z | null | ['CVE-2021-38294'] | Command injection leading to Remote Code Execution in Apache Storm | A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38294'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/storm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/44'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html'}] | {'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:52:52Z', 'nvd_published_at': '2021-10-25T13:15:00Z'} |
1.4.0 | GHSA-48w2-rm65-62xx | 2022-08-16T19:48:45Z | 2021-10-12T17:53:00Z | null | ['CVE-2021-41136'] | Puma with proxy which forwards LF characters as line endings could allow HTTP request smuggling | ### Impact
Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as "low". Puma is only aware of a single proxy server which has this behavior.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
### Patches
This vulnerability was patched in Puma 5.5.1 and 4.3.9.
### Workarounds
This vulnerability only affects Puma installations without any proxy in front.
Use a proxy which does not forward LF characters as line endings.
Proxies which do not forward LF characters as line endings:
* Nginx
* Apache (>2.4.25)
* Haproxy
* Caddy
* Traefik
### Possible Breakage
If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error.
### References
* [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v4.3.9'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v5.5.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2021-41136.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-28'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5146'}] | {'cwe_ids': ['CWE-444'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:06:36Z', 'nvd_published_at': '2021-10-12T16:15:00Z'} |
1.4.0 | GHSA-jcxv-2j3h-mg59 | 2021-11-18T15:31:01Z | 2021-10-12T22:03:09Z | null | ['CVE-2017-17760'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV | OpenCV 3.3.1 (corresponding with opencv-python and opencv-contrib-python 3.3.1.11) has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17760'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10351'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102974'}] | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:20:01Z', 'nvd_published_at': '2017-12-29T18:29:00Z'} |
1.4.0 | GHSA-25fx-mxc2-76g7 | 2022-08-15T20:11:12Z | 2021-10-06T17:49:11Z | null | ['CVE-2021-41120'] | Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS | ### Impact
URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last name.
Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication.
### Patches
The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1**
### Workarounds
One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method.
Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in Sylius/PayPalPlugin issues
- Email us at security at sylius dot com
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41120'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/PayPalPlugin'}] | {'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T21:12:27Z', 'nvd_published_at': '2021-10-05T21:15:00Z'} |
1.4.0 | GHSA-jwqp-28gf-p498 | 2021-10-06T17:32:00Z | 2021-10-06T17:46:22Z | null | ['CVE-2021-41125'] | HTTP authentication credentials potentially leaked to target websites | ### Impact
If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target.
This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects.
### Patches
Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials.
If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead.
### Workarounds
If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the [`w3lib.http.basic_auth_header`](https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header) function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth).
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/scrapy/scrapy/issues)
* [Email us](mailto:opensource@zyte.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy/scrapy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html'}, {'type': 'WEB', 'url': 'https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header'}, {'type': 'WEB', 'url': 'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth'}] | {'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:32:00Z', 'nvd_published_at': '2021-10-06T18:15:00Z'} |
1.4.0 | GHSA-q6j2-g8qf-wvf7 | 2022-06-29T21:54:06Z | 2021-10-12T22:34:28Z | null | ['CVE-2020-19003'] | Verification check bypass in Gate One | An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gateone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003'}, {'type': 'WEB', 'url': 'https://github.com/liftoff/GateOne/issues/728'}, {'type': 'PACKAGE', 'url': 'https://github.com/liftoff/GateOne'}] | {'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T13:57:49Z', 'nvd_published_at': '2021-10-06T13:15:00Z'} |
1.4.0 | GHSA-q854-j362-cfq9 | 2021-10-08T21:54:35Z | 2021-10-12T16:22:30Z | null | ['CVE-2020-23849'] | Cross-site Scripting in jsoneditor | Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsoneditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/jsoneditor/issues/1029'}, {'type': 'PACKAGE', 'url': 'https://github.com/josdejong/jsoneditor'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:54:35Z', 'nvd_published_at': '2021-01-11T14:15:00Z'} |
1.4.0 | GHSA-rqgp-ccph-5w65 | 2021-11-02T18:42:29Z | 2021-10-28T23:14:14Z | null | ['CVE-2021-3901'] | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464'}] | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T21:12:18Z', 'nvd_published_at': '2021-10-27T21:15:00Z'} |