schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-rf3w-29h3-r636
2021-09-17T17:54:21Z
2021-09-20T20:45:35Z
null
['CVE-2020-21322']
Arbitrary Code Execution in feehi/cms
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/44'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T17:54:21Z', 'nvd_published_at': '2021-09-15T22:15:00Z'}
1.4.0
GHSA-wcvp-r8j8-47pc
2023-06-13T21:58:19Z
2021-09-01T18:30:35Z
null
['CVE-2021-28028']
Double free in toodee
When inserting rows from an iterator at a particular index, toodee would shift items over, duplicating their ownership. The space reserved for the new elements was based on the len() returned by the ExactSizeIterator. This could result in elements in the array being freed twice if the iterator panics. Uninitialized or previously freed elements could also be exposed if the len() didn't match the number of elements. These issues were fixed in commit `ced70c17` by temporarily setting the length of the array smaller while processing it and adding assertions on the number of elements returned by the iterator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'toodee'}, 'ecosystem_specific': {'affected_functions': ['toodee::TooDee::insert_row']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28028'}, {'type': 'WEB', 'url': 'https://github.com/antonmarsden/toodee/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/antonmarsden/toodee/commit/ced70c172486fb4827c172cd8238053df3d1dcdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/antonmarsden/toodee'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0028.html'}]
{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:56:42Z', 'nvd_published_at': '2021-03-05T09:15:00Z'}
1.4.0
GHSA-3j6g-hxx5-3q26
2022-02-08T20:43:00Z
2021-09-23T23:18:58Z
null
['CVE-2021-38153']
Observable Discrepancy in Apache Kafka
Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.11'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.13'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.13'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka_2.13'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38153'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kafka'}, {'type': 'WEB', 'url': 'https://kafka.apache.org/cve-list'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35322aec467ddae34002690edaa4d9f16e7df9b5bf7164869b75b62c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://support.confluent.io/hc/en-us/articles/4407632156692-CVE-2021-38153-Confluent-Platform-Vulnerability-Timing-attacks'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-23T16:45:11Z', 'nvd_published_at': '2021-09-22T09:15:00Z'}
1.4.0
GHSA-v92m-hhhw-vv9v
2021-08-30T21:59:12Z
2021-09-01T18:27:12Z
null
['CVE-2019-19208']
Code injection in codiad
Codiad Web IDE through 2.8.4 allows PHP Code injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codiad/codiad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19208'}, {'type': 'PACKAGE', 'url': 'https://github.com/Codiad/Codiad'}, {'type': 'WEB', 'url': 'https://github.com/Codiad/Codiad/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/en/security-advisories/'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2019-0049/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/49902'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:59:12Z', 'nvd_published_at': '2020-03-16T15:15:00Z'}
1.4.0
GHSA-q879-9g95-56mx
2021-09-17T20:07:13Z
2021-09-20T19:54:26Z
null
['CVE-2021-39219']
Wrong type for `Linker`-define functions when used across two `Engine`s
### Impact As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Engine` was used to create the `Linker` and then a different `Engine` was used to create a `Store` and then the `Linker` was used to instantiate a module into that `Store`. Cross-`Engine` usage of functions is not supported in Wasmtime and this can result in type confusion of function pointers, resulting in being able to safely call a function with the wrong type. Triggering this bug requires using at least two `Engine` values in an embedding and then additionally using two different values with a `Linker` (one at the creation time of the `Linker` and another when instantiating a module with the `Linker`). It's expected that usage of more-than-one `Engine` in an embedding is relatively rare since an `Engine` is intended to be a globally shared resource, so the expectation is that the impact of this issue is relatively small. The fix implemented is to change this behavior to `panic!()` in Rust instead of silently allowing it. Using different `Engine` instances with a `Linker` is a programmer bug that `wasmtime` catches at runtime. ### Patches This bug has been patched and users should upgrade to Wasmtime version 0.30.0. ### Workarounds If you cannot upgrade Wasmtime and are using more than one `Engine` in your embedding it's recommended to instead use only one `Engine` for the entire program if possible. An `Engine` is designed to be a globally shared resource that is suitable to have only one for the lifetime of an entire process. If using multiple `Engine`s is required then code should be audited to ensure that `Linker` is only used with one `Engine`. ### For more information If you have any questions or comments about this advisory: * Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime) * Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ecosystem_specific': {'affected_functions': ['wasmtime::Linker::func_new', 'wasmtime::Linker::func_wrap', 'wasmtime::Store::gc']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-q879-9g95-56mx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39219'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/b39f087414f27ae40c44449ed5d1154e03449bff'}, {'type': 'WEB', 'url': 'https://crates.io/crates/wasmtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0110.html'}]
{'cwe_ids': ['CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-17T20:07:13Z', 'nvd_published_at': '2021-09-17T20:15:00Z'}
1.4.0
GHSA-hqm2-gwqf-r5g5
2021-08-30T17:26:36Z
2021-09-02T17:17:06Z
null
['CVE-2021-38302']
SQL injection in TYPO3 extension
It has been discovered that the extension is susceptible to SQL Injection when processing bounced emails.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N/E:F/RL:U/RC:C'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ecodev/newsletter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38302'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ecodev/newsletter'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-014'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:26:36Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}
1.4.0
GHSA-55r9-7mf8-m382
2023-09-11T16:20:48Z
2021-09-22T20:36:46Z
null
['CVE-2021-23443']
Cross-site Scripting in edge.js
Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if `{{ }}` are used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'edge.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23443'}, {'type': 'WEB', 'url': 'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'}, {'type': 'PACKAGE', 'url': 'https://github.com/edge-js/edge'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556'}]
{'cwe_ids': ['CWE-79', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T14:25:18Z', 'nvd_published_at': '2021-09-21T17:15:00Z'}
1.4.0
GHSA-f263-c949-w85g
2021-09-28T16:17:25Z
2021-09-28T16:16:52Z
null
['CVE-2020-7692']
Improper Authorization in Google OAuth Client
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.oauth-client:google-oauth-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7692'}, {'type': 'WEB', 'url': 'https://github.com/googleapis/google-oauth-java-client/issues/469'}, {'type': 'WEB', 'url': 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'}, {'type': 'PACKAGE', 'url': 'https://github.com/googleapis/google-oauth-java-client'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc7636%23section-1'}, {'type': 'WEB', 'url': 'https://tools.ietf.org/html/rfc8252%23section-8.1'}]
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-28T16:16:34Z', 'nvd_published_at': '2020-07-09T14:15:00Z'}
1.4.0
GHSA-593v-wcqx-hq2w
2021-09-03T21:34:00Z
2021-09-07T22:57:58Z
null
[]
Incorrect version tags linked to external repository
### Impact A security incident caused a number of incorrect version tags to be pushed to the Parse Server repository. These version tags linked to a personal fork of a contributor who had write access to the repository. The code to which these tags linked has not been reviewed or approved by Parse Platform. Even though no releases were published with these incorrect versions, it was possible to define a Parse Server dependency that pointed to these version tags, for example if you defined this dependency: ```js "parse-server": "git@github.com:parse-community/parse-server.git#4.9.3" ``` We have since deleted the incorrect version tags, but they may still show up in your personal fork on GitHub or locally. We do not know when these tags have been pushed to the Parse Server repository, but we first became aware of this issue on July 21, 2021. We are not aware of any malicious code or concerns related to privacy, security or legality (e.g. proprietary code). However, it has been reported that some functionality does not work as expected and the introduction of security vulnerabilities cannot be ruled out. You may be also affected if you used the Bitnami image for Parse Server. Bitnami picked up the incorrect version tag `4.9.3` and published a new Bitnami image for Parse Server. **If you are using any of the affected versions, we urgently recommend to upgrade to version `4.10.0`.** These are the incorrect tags: ``` 4.0.0-beta1 4.0.0-beta2 4.0.0-beta3 4.0.0-beta4 4.0.0-beta5 4.0.0-beta6 4.0.10 4.0.11 4.0.12 4.0.13 4.0.14 4.0.3 4.0.4 4.0.6 4.0.7 4.0.8 4.0.9 4.6.0 4.6.0-beta 4.7.0 4.8.0 4.8.1 4.8.2 4.8.3 4.8.4 4.8.5 4.9.0 4.9.1 4.9.2 4.9.3 ``` ### Patches Upgrade to version `4.10.0`. ### Workarounds Downgrade to version `4.5.2`. ### References n/a
[]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-593v-wcqx-hq2w'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-03T21:34:00Z', 'nvd_published_at': None}
1.4.0
GHSA-vvf2-ppj9-pp49
2022-05-04T03:24:54Z
2021-09-20T20:42:06Z
null
['CVE-2021-3794']
Inefficient Regular Expression Complexity in vuelidate
vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@vuelidate/validators'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-alpha.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-alpha.21'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794'}, {'type': 'WEB', 'url': 'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d'}, {'type': 'PACKAGE', 'url': 'https://github.com/vuelidate/vuelidate'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7'}]
{'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-16T17:15:49Z', 'nvd_published_at': '2021-09-15T13:15:00Z'}
1.4.0
GHSA-2q95-593f-g7h7
2021-08-26T14:59:25Z
2021-09-02T17:16:06Z
null
['CVE-2020-22345']
OS Command Injection in Centreon
/graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.04.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.10.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22345'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/8467#event-3163627607'}, {'type': 'WEB', 'url': 'https://engindemirbilek.github.io/centreon-19.10-rce'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T14:59:25Z', 'nvd_published_at': '2021-08-18T21:15:00Z'}
1.4.0
GHSA-pc4w-8v5j-29w9
2021-08-30T21:46:09Z
2021-09-01T18:31:29Z
null
['CVE-2021-34371']
Deserialization of Untrusted Data in Neo4j
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j:neo4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34371'}, {'type': 'PACKAGE', 'url': 'https://github.com/neo4j/neo4j'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/50170'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:46:09Z', 'nvd_published_at': '2021-08-05T20:15:00Z'}
1.4.0
GHSA-4jg2-84c2-pj95
2023-01-26T21:57:36Z
2021-09-21T18:41:59Z
null
['CVE-2023-23619']
Improper Control of Generation of Code ('Code Injection') in @asyncapi/modelina
### Impact Anyone who is using the default presets and/or does not handle the functionality themself. ### Patches It is impossible to fully guard against this, because users have access to the original raw information. However, as of version 1, if you only access the constrained models, you will not encounter this issue. Further similar situations are NOT seen as a security issue, but intended behavior. ### Workarounds Fully custom presets that change the entire rendering process which can then escape the user input. ### For more information Even though that I changed all the presets here, the vulnerability is still present throughout. I am using a JSON Schema here for simplicity. ```ts const jsonSchemaDoc = { $id: 'CustomClass', type: 'object', properties: { 'property: any; \n constructor(){console.log("injected")} \n private _temp': { type: 'string' }, } }; generator = new TypeScriptGenerator( { presets: [ { class: { property({ propertyName, content }) { return `private ${propertyName}: any;`; }, ctor() { return ''; }, getter() { return ''; }, setter() { return ''; } } } ] } ); const inputModel = await generator.process(jsonSchemaDoc); ``` This would render ```ts export class CustomClass { private property: any; constructor(){console.log("injected")} private _temp: any; private additionalProperties: any; } ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@asyncapi/modelina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-23619'}, {'type': 'PACKAGE', 'url': 'https://github.com/asyncapi/modelina'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-09-21T16:14:04Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-h9w3-f7x6-v54c
2021-10-28T16:14:46Z
2021-09-20T23:18:54Z
2021-10-28T16:13:59Z
['CVE-2021-23441']
Deserialization of Untrusted Data in com.jsoniter:jsoniter
# Withdrawn was withdrawn by its CNA. Further investigation showed that it was not a security issue. ## Original Description All versions of package com.jsoniter:jsoniter are vulnerable to Deserialization of Untrusted Data via malicious JSON strings. This may lead to a Denial of Service, and in certain cases, code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jsoniter:jsoniter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23441'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMJSONITER-1316198'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-09-20T20:25:57Z', 'nvd_published_at': '2021-09-19T14:15:00Z'}
1.4.0
GHSA-p92x-r36w-9395
2023-09-07T18:41:16Z
2021-09-02T22:02:25Z
null
['CVE-2021-23438']
Type confusion in mpath
This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition `ignoreProperties.indexOf(parts[i]) !== -1` returns `-1` if `parts[i]` is `['__proto__']`. This is because the method that has been called if the input is an array is `Array.prototype.indexOf()` and not `String.prototype.indexOf()`. They behave differently depending on the type of the input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'mpath'}, 'ecosystem_specific': {'affected_functions': ['mpath.get', 'mpath.has', 'mpath.unset', 'mpath.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23438'}, {'type': 'WEB', 'url': 'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc'}, {'type': 'WEB', 'url': 'https://github.com/mongoosejs/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/aheckmann/mpath'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MPATH-1577289'}]
{'cwe_ids': ['CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-02T17:06:28Z', 'nvd_published_at': '2021-09-01T19:15:00Z'}
1.4.0
GHSA-246r-r2wf-frhx
2021-09-03T15:58:46Z
2021-09-01T18:31:36Z
null
['CVE-2021-36804']
Malicious password-reset in Akaunting
Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'akaunting/akaunting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36804'}, {'type': 'WEB', 'url': 'https://github.com/laravel/laravel/pull/5477'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/laravel'}, {'type': 'WEB', 'url': 'https://github.com/laravel/laravel/blob/75a7dba9c44ce3555cc57dd1826467839fd9774f/CHANGELOG.md#v844-2020-12-01'}, {'type': 'WEB', 'url': 'https://www.laravel-enlightn.com/docs/security/host-injection-analyzer.html'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/'}]
{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T21:34:44Z', 'nvd_published_at': '2021-08-04T23:15:00Z'}
1.4.0
GHSA-m489-xr35-fjxr
2021-09-22T20:34:42Z
2021-09-22T20:35:08Z
null
[]
Regular Expression Denial of Service in millisecond
Versions of `millisecond` prior to 0.1.2 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Proof of concept ``` var ms = require('millisecond'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } ms(genstr(process.argv[2], "5") + " minutea"); ``` ## Recommendation Update to version 0.1.2 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'millisecond'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/unshiftio/millisecond/pull/4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/59'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-09-22T20:34:42Z', 'nvd_published_at': None}
1.4.0
GHSA-rh5w-82wh-jhr8
2021-08-30T18:05:54Z
2021-09-01T18:40:31Z
null
['CVE-2021-27912']
XSS vulnerability on asset view
### Impact Mautic versions before 3.3.4 / 4.0.0 are vulnerable to an inline JS XSS attack when viewing Mautic assets by utilizing inline JS in the title and adding a broken image URL as a remote asset. This can only be leveraged by an authenticated user with permission to create or edit assets. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-rh5w-82wh-jhr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27912'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T18:05:54Z', 'nvd_published_at': '2021-08-30T16:15:00Z'}
1.4.0
GHSA-4fr2-j4g9-mppf
2023-09-07T22:37:35Z
2021-09-24T15:42:21Z
null
['CVE-2020-28271']
Prototype Pollution in deephas
Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deephas'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28271'}, {'type': 'WEB', 'url': 'https://github.com/sharpred/deepHas/commit/2fe011713a6178c50f7deb6f039a8e5435981e20'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28271,'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:25:52Z', 'nvd_published_at': '2020-11-12T18:15:00Z'}
1.4.0
GHSA-m72g-42q6-gvc2
2021-10-04T14:22:45Z
2021-10-04T20:13:11Z
null
['CVE-2020-20129']
Cross-site Scripting in LaraCMS
LaraCMS contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wanglelecc/laracms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20129'}, {'type': 'WEB', 'url': 'https://github.com/wanglelecc/laracms/issues/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/wanglelecc/laracms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T20:34:58Z', 'nvd_published_at': '2021-09-29T22:15:00Z'}
1.4.0
GHSA-wpvm-wqr4-p7cw
2022-02-08T21:39:05Z
2021-10-13T15:34:09Z
null
['CVE-2021-26272']
Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26272'}, {'type': 'WEB', 'url': 'https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-829'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:01:30Z', 'nvd_published_at': '2021-01-26T21:15:00Z'}
1.4.0
GHSA-3ww4-cp53-6g2x
2021-10-21T14:56:51Z
2021-10-18T19:44:06Z
null
['CVE-2021-42228']
Cross Site Request Forgery in kindeditor
Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x. First, you upload an html file containing csrf on the website that uses a google editor, (you only need to search in google: inurl:/examples/uploadbutton.html) and then use the authority of this website to trick users into clicking your malicious html link.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'kindeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42228'}, {'type': 'WEB', 'url': 'https://github.com/kindsoft/kindeditor/issues/337'}, {'type': 'PACKAGE', 'url': 'https://github.com/kindsoft/kindeditor'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:38:56Z', 'nvd_published_at': '2021-10-14T17:15:00Z'}
1.4.0
GHSA-fffj-9qwg-qmh5
2021-10-08T18:19:43Z
2021-10-12T22:00:31Z
null
['CVE-2016-1517']
Improper Input Validation in OpenCV
OpenCV 3.0.0 allows remote attackers to cause a denial of service (segfault) via vectors involving corrupt chunks. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV 3.3.1.11).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1517'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/5956'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/1701.04739.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T18:19:43Z', 'nvd_published_at': None}
1.4.0
GHSA-qh54-9vc5-m9fg
2021-10-11T21:16:02Z
2021-10-12T16:06:30Z
null
[]
MD5 hash support in github.com/foxcpp/maddy
### Impact This vulnerability affects maddy 0.5.1, 0.5.0 users using auth.shadow module and an extremely outdated system that still allows MD5 hashes in /etc/shadows. ### Patches Patch is available as part of the 0.5.2 release. ### Workarounds Ensure MD5 hashes are not present in /etc/shadow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-qh54-9vc5-m9fg'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}]
{'cwe_ids': ['CWE-261'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T21:16:02Z', 'nvd_published_at': None}
1.4.0
GHSA-fxwf-45c7-4ppr
2022-01-07T16:07:29Z
2021-10-12T16:40:58Z
null
['CVE-2020-28270']
Prototype pollution in object-hierarchy-access
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'object-hierarchy-access'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.33.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270'}, {'type': 'WEB', 'url': 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'}, {'type': 'PACKAGE', 'url': 'https://github.com/mjpclab/object-hierarchy-access'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270,'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T21:14:17Z', 'nvd_published_at': '2020-11-12T18:15:00Z'}
1.4.0
GHSA-8849-5h85-98qw
2021-10-06T19:53:25Z
2021-10-12T22:22:17Z
null
['CVE-2019-9423']
Out-of-bounds Write in OpenCV
In opencv calls that use libpng, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges required. User interaction is not required for exploitation. Product: AndroidVersions: Android-10Android ID: A-110986616
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1.26'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9423'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://source.android.com/security/bulletin/android-10'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10/25/17'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10/27/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/07/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/05/1'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T19:53:25Z', 'nvd_published_at': '2019-09-27T19:15:00Z'}
1.4.0
GHSA-x2gw-85w6-fjjw
2021-10-05T16:02:41Z
2021-10-04T20:13:55Z
null
['CVE-2021-40926']
Cross-site scripting in demos/demo.mysqli.php in getID3
Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'james-heinrich/getid3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.9.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40926'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/getID3/issues/341'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/getID3/pull/342'}, {'type': 'PACKAGE', 'url': 'https://github.com/JamesHeinrich/getID3'}, {'type': 'WEB', 'url': 'https://github.com/JamesHeinrich/getID3/releases/tag/v1.9.21'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T13:49:18Z', 'nvd_published_at': '2021-10-01T16:15:00Z'}
1.4.0
GHSA-56wv-2wr9-3h9r
2023-08-30T22:53:57Z
2021-10-12T16:30:37Z
null
['CVE-2020-12607']
Improper Verification of Cryptographic Signature in fastecdsa
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s<sup>-1</sup>, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'fastecdsa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12607'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/commit/4a16daeaf139be20654ef58a9fe4c79dc030458c'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/commit/7b64e3efaa806b4daaf73bb5172af3581812f8de'}, {'type': 'WEB', 'url': 'https://github.com/AntonKueltz/fastecdsa/commit/e592f106edd5acf6dacedfab2ad16fe6c735c9d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/AntonKueltz/fastecdsa'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:28:23Z', 'nvd_published_at': '2020-06-02T21:15:00Z'}
1.4.0
GHSA-68jc-v27h-vhmw
2023-09-08T14:12:06Z
2021-10-12T16:28:25Z
null
['CVE-2020-13671']
Drupal core Unrestricted Upload of File with Dangerous Type
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.9.0'}, {'fixed': '8.9.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.74'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13671'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-012'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:20:20Z', 'nvd_published_at': '2020-11-20T16:15:00Z'}
1.4.0
GHSA-qv95-g3gm-x542
2022-08-10T23:49:29Z
2021-10-12T16:39:01Z
null
['CVE-2021-41802']
Hashicorp Vault Privilege Escalation Vulnerability
HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41802'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-27-vault-merging-multiple-entity-aliases-for-the-same-mount-may-allow-privilege-escalation/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}]
{'cwe_ids': ['CWE-269', 'CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:57:45Z', 'nvd_published_at': '2021-10-08T17:15:00Z'}
1.4.0
GHSA-fvq6-392h-6mjj
2021-11-18T00:06:51Z
2021-10-12T22:01:08Z
null
['CVE-2017-12599']
Out-of-bounds Read in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the function icvCvt_BGRA2BGR_8u_C4C3R when reading an image file by using cv::imread.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12599'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:47:17Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}
1.4.0
GHSA-823f-cwm9-4g74
2021-10-05T21:11:11Z
2021-10-06T17:49:23Z
null
['CVE-2021-41124']
Splash authentication credentials potentially leaked to target websites
### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. ### Patches Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. ### Workarounds If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots). ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy-plugins/scrapy-splash/issues) * [Email us](mailto:opensource@zyte.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'scrapy-splash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41124'}, {'type': 'WEB', 'url': 'https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy-plugins/scrapy-splash'}, {'type': 'WEB', 'url': 'https://github.com/scrapy-plugins/scrapy-splash/releases/tag/0.8.0'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T21:11:11Z', 'nvd_published_at': '2021-10-05T21:15:00Z'}
1.4.0
GHSA-3f99-hvg4-qjwj
2021-10-11T18:36:36Z
2021-10-11T17:09:05Z
null
['CVE-2021-41117']
Insecure random number generation in keypair
## Description and Impact A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging to the victim. We recommend replacing any RSA keys that were generated using keypair version 1.0.3 or earlier. ## Fix * The [bug](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) in the pseudo-random number generator is fixed in commit [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18). * If the crypto module is available, it is used instead of the pseudo-random number generator. Also fixed in [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18) ## Additional Details The specific [line](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) with the flaw is: ```javascript b.putByte(String.fromCharCode(next & 0xFF)) ``` The [definition](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L350-L352) of `putByte` is ```javascript util.ByteBuffer.prototype.putByte = function(b) { this.data += String.fromCharCode(b); }; ``` Simplified, this is `String.fromCharCode(String.fromCharCode(next & 0xFF))`. This results in most of the buffer containing zeros. An example generated buffer: (Note: truncated for brevity) ``` \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x04\x00\x00\x00....\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ``` Since it is masking with 0xFF, approximately 97% of the bytes are converted to zeros. The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion. ## Credit This issue was reported to GitHub Security Lab by Ross Wheeler of Axosoft. It was discovered by Axosoft engineer Dan Suceava, who noticed that [keypair](https://github.com/juliangruber/keypair) was regularly generating duplicate RSA keys. GitHub security engineer [@vcsjones (Kevin Jones)](https://github.com/vcsjones) independently investigated the problem and identified the cause and source code location of the bug.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'keypair'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41117'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18'}, {'type': 'PACKAGE', 'url': 'https://github.com/juliangruber/keypair'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/keypair/releases/tag/v1.0.4'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/'}]
{'cwe_ids': ['CWE-335'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T17:06:03Z', 'nvd_published_at': '2021-10-11T17:15:00Z'}
1.4.0
GHSA-v988-828w-xvf2
2021-10-21T21:36:22Z
2021-10-22T16:21:07Z
null
[]
Authentication Bypass Using an Alternate Path or Channel and Authentication Bypass by Primary Weakness in rucio-webui
### Impact `rucio-webui` installations of the `1.26` release line potentially leak the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the `webui` within a close timeframe, thus allowing users to access the `webui` with the leaked authentication token. Privileges are therefore also escalated. Rucio server / daemons are not affected by this issue, it is isolated to the webui. ### Patches This issue is fixed in the `1.26.7` release of the `rucio-webui`. ### Workarounds Installation of the `1.25.7` `webui` release. The `1.25` and previous webui release lines are not affected by this issue. ### References https://github.com/rucio/rucio/issues/4928
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'rucio-webui'}, 'ecosystem_specific': {'affected_functions': ['rucio-webui.lib.rucio.web.ui.flask.common.utils.add_cookies', 'rucio-webui.lib.rucio.web.ui.flask.common.utils.redirect_to_last_known_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.26.0'}, {'fixed': '1.26.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rucio/rucio/security/advisories/GHSA-v988-828w-xvf2'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/issues/4810'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/issues/4928'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/commit/8f832404ae88d6300e17d7e706b40fe58e0df90c'}, {'type': 'PACKAGE', 'url': 'https://github.com/rucio/rucio'}, {'type': 'WEB', 'url': 'https://github.com/rucio/rucio/releases/tag/1.26.7'}]
{'cwe_ids': ['CWE-288', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T21:36:22Z', 'nvd_published_at': None}
1.4.0
GHSA-x95h-979x-cf3j
2021-10-19T16:10:19Z
2021-10-19T20:15:30Z
null
['CVE-2021-42576']
Policies not properly enforced in bluemonday
The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Python (in pybluemonday), does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pybluemonday'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/microcosm-cc/bluemonday'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42576'}, {'type': 'WEB', 'url': 'https://github.com/microcosm-cc/bluemonday/commit/c788a2a4d42e081ad54a31368478820bb4a42fb4'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/'}, {'type': 'PACKAGE', 'url': 'https://github.com/microcosm-cc/bluemonday'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0588'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:10:19Z', 'nvd_published_at': '2021-10-18T15:15:00Z'}
1.4.0
GHSA-j7qv-pgf6-hvh4
2021-10-27T17:00:26Z
2021-10-26T14:55:21Z
null
['CVE-2021-41183']
XSS in `*Text` options of the Datepicker widget in jquery-ui
### Impact Accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $( "#datepicker" ).datepicker( { showButtonPanel: true, showOn: "both", closeText: "<script>doEvilThing( 'closeText XSS' )</script>", currentText: "<script>doEvilThing( 'currentText XSS' )</script>", prevText: "<script>doEvilThing( 'prevText XSS' )</script>", nextText: "<script>doEvilThing( 'nextText XSS' )</script>", buttonText: "<script>doEvilThing( 'buttonText XSS' )</script>", appendText: "<script>doEvilThing( 'appendText XSS' )</script>", } ); ``` will call `doEvilThing` with 6 different parameters coming from all `*Text` options. ### Patches The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. ### Workarounds A workaround is to not accept the value of the `*Text` options from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1953'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'WEB', 'url': 'https://bugs.jqueryui.com/ticket/15284'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-001'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:45Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}
1.4.0
GHSA-pjwm-rvh2-c87w
2023-07-28T15:38:48Z
2021-10-22T20:38:14Z
null
[]
Embedded malware in ua-parser-js
The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.29'}, {'fixed': '0.7.30'}]}], 'versions': ['0.7.29']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.1'}]}], 'versions': ['0.8.0']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496'}, {'type': 'PACKAGE', 'url': 'https://github.com/faisalman/ua-parser-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ua-parser-js'}]
{'cwe_ids': ['CWE-829', 'CWE-912'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T20:37:42Z', 'nvd_published_at': None}
1.4.0
GHSA-w729-7633-2fw5
2021-10-29T13:51:56Z
2021-10-27T18:52:06Z
null
['CVE-2021-40865']
Deserialization of Untrusted Data leading to Remote Code Execution in Apache Storm
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40865'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/45'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:53:48Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}
1.4.0
GHSA-634c-v2xv-ffpg
2021-10-07T20:28:55Z
2021-10-12T22:02:51Z
null
['CVE-2017-14136']
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14136'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9443'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9448'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:28:55Z', 'nvd_published_at': None}
1.4.0
GHSA-9g3v-j3cr-6fc6
2021-10-25T20:08:05Z
2021-10-21T17:48:26Z
null
['CVE-2021-3879']
Cross-site Scripting in snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3879'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:51:59Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}
1.4.0
GHSA-9g8h-pjm4-q92p
2021-11-18T15:31:47Z
2021-10-12T22:23:41Z
null
['CVE-2018-5268']
Out-of-bounds Write in OpenCV.
In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10541'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}]
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:55:52Z', 'nvd_published_at': '2018-01-08T05:29:00Z'}
1.4.0
GHSA-rjf2-j2r6-q8gr
2021-10-19T14:18:05Z
2021-10-19T15:28:45Z
null
['CVE-2021-23449']
Prototype Pollution in vm2
This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/363'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0010/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VM2-1585918'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T14:18:05Z', 'nvd_published_at': '2021-10-18T17:15:00Z'}
1.4.0
GHSA-cpqf-3c3r-c9g2
2021-10-05T15:57:32Z
2021-10-05T17:53:20Z
null
['CVE-2021-40323']
Cobbler before 3.3.0 allows log poisoning
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:57:32Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}
1.4.0
GHSA-9gj3-hwp5-pmwc
2021-10-27T17:00:10Z
2021-10-26T14:55:02Z
null
['CVE-2021-41182']
XSS in the `altField` option of the Datepicker widget in jquery-ui
### Impact Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $( "#datepicker" ).datepicker( { altField: "<img onerror='doEvilThing()' src='/404' />", } ); ``` will call the `doEvilThing` function. ### Patches The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. ### Workarounds A workaround is to not accept the value of the `altField` option from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2021-41182.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:41Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}
1.4.0
GHSA-5rg2-6qr5-2xp8
2021-10-25T20:08:18Z
2021-10-21T17:49:18Z
null
['CVE-2021-3863']
Cross-site Scripting in snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:52:33Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}
1.4.0
GHSA-jggw-2q6g-c3m6
2021-10-06T18:06:55Z
2021-10-12T22:22:58Z
null
['CVE-2019-19624']
Out-of-bounds Read in OpenCV
An out-of-bounds read was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.0.25). Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocated arrays Ux and Uy.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19624'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/14554'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-19624'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T18:06:55Z', 'nvd_published_at': '2019-12-06T15:15:00Z'}
1.4.0
GHSA-j8fq-86c5-5v2r
2022-03-21T19:58:43Z
2021-10-27T18:53:48Z
null
['CVE-2021-42343']
Remote code execution in dask
An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'distributed'}, 'ecosystem_specific': {'affected_functions': ['dask.distributed.LocalCluster', 'dask.distributed.Client']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42343'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/pull/5427'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b'}, {'type': 'WEB', 'url': 'https://docs.dask.org/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dask/distributed'}]
{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:16:11Z', 'nvd_published_at': '2021-10-26T11:15:00Z'}
1.4.0
GHSA-rqxg-xvcq-3v2f
2021-11-18T15:33:23Z
2021-10-12T22:02:04Z
null
['CVE-2017-12605']
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12605'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:53:47Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}
1.4.0
GHSA-m836-gxwq-j2pm
2021-10-27T18:58:30Z
2021-10-28T16:27:03Z
null
[]
Improper Access Control in github.com/treeverse/lakefs
### Impact 1. [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name. 1. [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them. 1. [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them. 1. [low] A user allowed to list objects in a repository _or_ read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit. ### For more information If you have any questions or comments about this advisory please: * Email us at security@treeverse.io. * Open an issue on https://github.com/treeverse/lakeFS/issues/new.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.53.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-m836-gxwq-j2pm'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/f2117281cadb14fdf9ac7fe287f84d5c10308b88'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:58:30Z', 'nvd_published_at': None}
1.4.0
GHSA-4mvj-rq4v-2fxw
2022-12-03T03:56:39Z
2021-10-21T17:50:44Z
null
['CVE-2021-23452']
Prototype Pollution in x-assign
This vulnerability affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'x-assign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23452'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvoorberg/x-assign'}, {'type': 'WEB', 'url': 'https://runkit.com/embed/sq8qjwemyn8t'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T14:54:57Z', 'nvd_published_at': '2021-10-20T13:15:00Z'}
1.4.0
GHSA-9cxh-gqpx-qc5m
2022-02-08T20:42:44Z
2021-10-12T17:49:25Z
null
['CVE-2021-41355']
Credential Disclosure in System.DirectoryServices.Protocols
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux. ### Patches Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux. Package name | Vulnerable versions | Secure versions ------------ | ---------------- | ------------------------- System.DirectoryServices.Protocols | 5.0.0 | 5.0.1 ### Other Details - Announcement for this issue can be found at dotnet/announcements#202 - An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301 - MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.DirectoryServices.Protocols'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/60301'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:48:55Z', 'nvd_published_at': '2021-10-13T01:15:00Z'}
1.4.0
GHSA-q9p4-qfc8-fvpp
2021-10-08T23:09:47Z
2021-10-12T16:32:38Z
null
['CVE-2019-10762']
SQL Injection in medoo
columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'catfan/medoo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762'}, {'type': 'WEB', 'url': 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}, {'type': 'PACKAGE', 'url': 'https://github.com/catfan/Medoo'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:09:47Z', 'nvd_published_at': '2019-10-30T22:15:00Z'}
1.4.0
GHSA-9378-f4v7-jgm4
2021-10-08T21:29:34Z
2021-10-04T20:12:30Z
null
['CVE-2021-41616']
Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ddlutils:ddlutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41616'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ddlutils'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T18:36:23Z', 'nvd_published_at': '2021-09-30T08:15:00Z'}
1.4.0
GHSA-x3rm-644h-67m8
2021-10-06T20:21:31Z
2021-10-12T22:22:05Z
null
['CVE-2019-16249']
Out-of-bounds Read in OpenCV
OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16249'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15481'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/15531'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/30'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T20:21:31Z', 'nvd_published_at': '2019-09-11T23:15:00Z'}
1.4.0
GHSA-frqg-7g38-6gcf
2021-10-11T18:39:06Z
2021-10-05T20:23:18Z
null
['CVE-2021-41116']
Improper escaping of command arguments on Windows leading to command injection
### Impact Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected. ### Patches 1.10.23 and 2.1.9 fix the issue ### Workarounds None
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.1.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116'}, {'type': 'WEB', 'url': 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/composer/composer'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:44:04Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}
1.4.0
GHSA-5xvc-vgmp-jgc3
2021-10-29T13:44:43Z
2021-10-28T23:13:57Z
null
['CVE-2021-41194']
Improper Access Control in jupyterhub-firstuseauthenticator
### Impact When JupyterHub is used with FirstUseAuthenticator, the vulnerability allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. ### Patches Upgrade to jupyterhub-firstuseauthenticator to 1.0, or apply patch https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch ### Workarounds If you cannot upgrade, there is no complete workaround, but it can be mitigated. If you cannot upgrade yet, you can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until you can patch or upgrade.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub-firstuseauthenticator'}, 'ecosystem_specific': {'affected_functions': ['firstuseauthenticator.firstuseauthenticator.FirstUseAuthenticator.authenticate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/security/advisories/GHSA-5xvc-vgmp-jgc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41194'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/commit/953418e2450dbc2d854e332350849533b0ebc7ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/firstuseauthenticator'}]
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T16:52:16Z', 'nvd_published_at': '2021-10-28T20:15:00Z'}
1.4.0
GHSA-ppj4-34rq-v8j9
2023-08-30T00:32:37Z
2021-10-25T19:43:15Z
null
['CVE-2021-42836']
github.com/tidwall/gjson Vulnerable to REDoS attack
GJSON is a Go package that provides a fast and simple way to get values from a json document. GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42836'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0265'}]
{'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:27:20Z', 'nvd_published_at': '2021-10-22T18:15:00Z'}
1.4.0
GHSA-4cfr-gjfx-fj3x
2021-10-05T15:51:30Z
2021-10-05T17:53:11Z
null
['CVE-2021-40324']
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40324'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:51:30Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}
1.4.0
GHSA-w7x8-cq7r-g5g9
2021-10-22T19:37:10Z
2021-10-25T19:43:39Z
null
['CVE-2021-33988']
Cross Site Scripting in Microweber
Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33988'}, {'type': 'WEB', 'url': 'https://github.com/nck0099/osTicket/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T19:37:10Z', 'nvd_published_at': '2021-10-19T17:15:00Z'}
1.4.0
GHSA-wq8f-wvqp-xvvm
2021-11-18T15:34:09Z
2021-10-12T22:02:35Z
null
['CVE-2017-12863']
Integer Overflow or Wraparound in OpenCV
In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function PxMDecoder::readData has an integer overflow when calculate src_pitch. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12863'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9371'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:39:41Z', 'nvd_published_at': '2017-08-15T16:29:00Z'}
1.4.0
GHSA-fm39-cw8h-3p63
2021-10-07T15:12:30Z
2021-10-12T22:07:14Z
null
['CVE-2019-14491']
Out-of-bounds Read in OpenCV
An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read in the function cv::predictOrdered<cv::HaarEvaluator> in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14491'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15125'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPFLN6QAX6SUA4XR4NMKKXX26H3TYCVQ/'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:12:30Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}
1.4.0
GHSA-pgjj-866w-fc5c
2021-10-11T16:14:26Z
2021-10-12T16:03:43Z
null
['CVE-2021-21278']
Risk of code injection
### Impact Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues ### Patches Temporarily removed the problematic route and added a `no-new-func` rule to eslint Self-built users should upgrade to 7f1c430 and later as soon as possible ### Credits Tencent Woodpecker Security Team ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues) * Email us at [i@diygod.me](mailto:i@diygod.me)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rsshub'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T16:14:26Z', 'nvd_published_at': '2021-01-26T21:15:00Z'}
1.4.0
GHSA-3pcq-34w5-p4g2
2022-08-15T20:14:42Z
2021-10-21T17:49:30Z
null
['CVE-2021-41167']
modern-async's `forEachSeries` and `forEachLimit` functions do not limit the number of requests
### Impact This is a bug affecting two of the functions in this library: `forEachSeries` and `forEachLimit`. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. ### Patches The problem has been patched in 1.0.4. ### Workarounds There is no workaround aside from upgrading to 1.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'modern-async'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}, {'type': 'PACKAGE', 'url': 'https://github.com/nicolas-van/modern-async'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T17:39:03Z', 'nvd_published_at': '2021-10-20T19:15:00Z'}
1.4.0
GHSA-37hx-4mcq-wc3h
2021-10-06T14:09:30Z
2021-10-06T17:48:16Z
null
['CVE-2021-28128']
Weak Password Recovery Mechanism for Forgotten Password in Strapi
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28128'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/issues/9657'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.6.0'}, {'type': 'WEB', 'url': 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt'}]
{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:09:30Z', 'nvd_published_at': '2021-05-06T14:15:00Z'}
1.4.0
GHSA-4vr9-8cjf-vf9c
2021-10-08T22:14:28Z
2021-10-12T16:00:37Z
null
['CVE-2020-26281']
Async-h1 request smuggling possible with long unread bodies
### Impact This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications. If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body. One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request. Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to specify a long content and capture another user's request in its body. This content could be captured in a post request to an endpoint that allows the content to be subsequently retrieved by the adversary. ### Patches This has been addressed in async-h1 2.3.0 and previous versions have been yanked. ### Workarounds none ### References https://github.com/http-rs/async-h1/releases/tag/v2.3.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [async-h1](https://github.com/http-rs/async-h1) * Contact a core team member on [zulip](https://http-rs.zulip-chat.com) or [discord](https://discord.gg/x2gKzst)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'async-h1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/security/advisories/GHSA-4vr9-8cjf-vf9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26281'}, {'type': 'PACKAGE', 'url': 'https://github.com/http-rs/async-h1'}, {'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0093.html'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:14:28Z', 'nvd_published_at': '2020-12-21T22:15:00Z'}
1.4.0
GHSA-69j6-29vr-p3j9
2021-11-18T15:13:27Z
2021-10-05T20:24:02Z
null
['CVE-2021-39226']
Authentication bypass for viewing and deletions of snapshots
Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. 8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly. ## CVE-2021-39226 Snapshot authentication bypass ### Summary CVSS Score: 9.8 Critical CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H We received a security report to [security@grafana.com](mailto:security@grafana.com) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability. ### Impact Unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: * `/dashboard/snapshot/:key`, or * `/api/snapshots/:key` If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: * `/api/snapshots-delete/:deleteKey` Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: * `/api/snapshots/:key`, or * `/api/snapshots-delete/:deleteKey` The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. ### Attack audit While we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment. #### Through reverse proxy/load balancer logs To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK). For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job="nginx-ingress-controller"} |= "\"status\": 200" |= "\"uri\": \"/api/snapshots/:key\""`. #### Through the Grafana Enterprise audit feature If you enabled “Log web requests” in your configuration with `router_logging = true`, look for `"requestUri":"/api/snapshots-delete/”`,`“requestUri":"/api/snapshots/:key"`, or `"type":"snapshot"` in combination with `"action":"delete"`. ### Patched versions Release 8.1.6: - [Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/) Release 7.5.11: - [Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/) ### Solutions and mitigations Download and install the appropriate patch for your version of Grafana. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ### Workaround If for some reason you cannot upgrade: You can use a reverse proxy or similar to block access to the literal paths * `/api/snapshots/:key` * `/api/snapshots-delete/:deleteKey` * `/dashboard/snapshot/:key` * `/api/snapshots/:key` They have no normal function and can be disabled without side effects. ### Timeline and postmortem Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC. * 2021-09-15 14:49: Tuan Tran theblackturtle0901@gmail.com sends initial report about viewing snapshots without authentication * 2021-09-15 15:56: Initial reproduction * 2021-09-15 17:10: MEDIUM severity declared * 2021-09-15 18:58: Workaround deployed on Grafana Cloud * 2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well * 2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud * 2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more. * 2021-09-16 09:35: HIGH severity declared * 2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS * 2021-09-16 11:19: CRITICAL declared * 2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited * 2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation * 2021-09-23: Grafana Cloud instances updated * 2021-09-28 12:00: Grafana Enterprise images released to customers under embargo * 2021-10-05 17:00: Public release ## Reporting security issues If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is: F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA The key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index. ## Security announcements We maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements), where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss). ## Acknowledgement We would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39226'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0008/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/05/4'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:49:35Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}
1.4.0
GHSA-mx3x-ghqm-r43h
2021-10-08T22:13:34Z
2021-10-12T16:27:18Z
null
['CVE-2020-28280']
Prototype pollution vulnerability in 'predefine'
Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'predefine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28280'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/commit/1a86a013c0b37c9d6ca078ba34017052af38b7fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/bigpipe/predefine'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:13:34Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}
1.4.0
GHSA-xpv2-8ppj-79hh
2021-10-08T21:30:48Z
2021-10-04T20:14:31Z
null
['CVE-2021-41862']
Expression injection in AviatorScript
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.aviator:aviator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41862'}, {'type': 'WEB', 'url': 'https://github.com/killme2008/aviatorscript/issues/421'}, {'type': 'PACKAGE', 'url': 'https://github.com/killme2008/aviatorscript'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T16:58:38Z', 'nvd_published_at': '2021-10-02T00:15:00Z'}
1.4.0
GHSA-6v6p-p97v-g2p7
2021-11-18T15:32:35Z
2021-10-12T22:01:44Z
null
['CVE-2017-12603']
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12603'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T21:00:22Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}
1.4.0
GHSA-pfwg-rxf4-97c3
2022-06-01T22:01:45Z
2021-10-06T17:47:53Z
null
['CVE-2021-28125']
Open Redirect in Apache Superset
Apache Superset prior to 1.1.0 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.34.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28125'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/eb35b804acf4d84cb70d02743e04b8afebbee029'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pfwg-rxf4-97c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-superset/PYSEC-2021-128.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/27/2'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:11:38Z', 'nvd_published_at': '2021-04-27T10:15:00Z'}
1.4.0
GHSA-5fvx-5p2r-4mvp
2021-10-25T20:08:26Z
2021-10-21T17:48:41Z
null
['CVE-2021-3851']
Open Redirect in firefly-iii
firefly-iii is vulnerable to URL Redirection to Untrusted Site
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3851'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:06:15Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}
1.4.0
GHSA-84g3-cv89-m9gm
2021-10-06T22:34:42Z
2021-10-13T15:33:20Z
null
['CVE-2021-25916']
Prototype pollution vulnerability in 'patchmerge'
Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'patchmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916'}, {'type': 'WEB', 'url': 'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}, {'type': 'PACKAGE', 'url': 'https://github.com/pjshumphreys/patchmerge'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T22:34:42Z', 'nvd_published_at': '2021-03-16T16:15:00Z'}
1.4.0
GHSA-c7gp-2pch-qh2v
2021-11-18T15:33:02Z
2021-10-12T22:01:55Z
null
['CVE-2017-12604']
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillUniColor function in utils.cpp when reading an image file by using cv::imread.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12604'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:57:19Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}
1.4.0
GHSA-xv8x-pr4h-73jv
2021-10-18T16:33:54Z
2021-10-12T15:59:29Z
null
['CVE-2021-41121']
Memory corruption when returning a literal struct with a private call inside of it
### Impact When performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. ### Patches 0.3.0 / #2447 *
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41121'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2447'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:47:24Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}
1.4.0
GHSA-vw27-fwjf-5qxm
2021-10-21T20:46:42Z
2021-10-22T16:20:10Z
null
['CVE-2021-41146']
Arbitrary command execution on Windows via qutebrowserurl: URL handler
### Impact Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. Only Windows installs where qutebrowser is registered as URL handler are affected. It does *not* have to be set as default browser for the exploit to work. ### Patches The issue has been fixed in [qutebrowser v2.4.0](https://github.com/qutebrowser/qutebrowser/releases/tag/v2.4.0) in commit 8f46ba3f6dc7b18375f7aa63c48a1fe461190430. The fix also adds additional hardening for potential similar issues on Linux (by adding the new `--untrusted-args` flag to the `.desktop` file), though no such vulnerabilities are known. Backported patches for older versions are available, but no further releases are planned: - v1.7.x: d1ceaab - v1.8.x: ca7155d - v1.9.x: 157d871 - v1.10.x: 94a6125 - v1.11.x: 10acfbb - v1.12.x: 363a18f - v1.13.x: 410f262 - v1.14.x: e4f4d93 - v2.0.x: 15a1654 - v2.1.x: 509ddf2 - v2.2.x: 03dcba5 - v2.3.x: 00a694c (commits are referring to qutebrowser/qutebrowser on GitHub) ### Workarounds Remove qutebrowser from the default browser settings entirely, so that it does not handle any kind of URLs. Make sure to remove *all* handlers, including an (accidental) `qutebrowserURL` handler, e.g. using [NirSoft URLProtocolView](https://www.nirsoft.net/utils/url_protocol_view.html). ### Timeline 2021-10-15: Issue reported via security@qutebrowser.org by Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group (VXRL)](https://www.vxrl.hk/) 2021-10-15: Issue confirmed by @The-Compiler (lead developer), author of installer (@bitraid) contacted for help/review 2021-10-15: CVE assigned by GitHub 2021-10-15 to 2021-10-17: Fix developed 2021-10-17: Additional core developer (@toofar) contacted for help/review 2021-10-21: v2.4.0 released containing the fix 2021-10-21: Advisory and fix published ### References See the [commit message](https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430) for additional information and references to various similar issues in other projects. ### Acknowledgements Thanks to Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group](https://www.vxrl.hk/) (VXRL/@vxresearch) for finding and responsibly disclosing this issue. ### Contact If you have any questions or comments about this advisory, please email [security@qutebrowser.org](mailto:security@qutebrowser.org).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}]
{'cwe_ids': ['CWE-641', 'CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T20:46:42Z', 'nvd_published_at': '2021-10-21T18:15:00Z'}
1.4.0
GHSA-pqjj-6f5q-gqph
2021-10-08T14:35:41Z
2021-10-12T22:01:34Z
null
['CVE-2017-12602']
Denial of Service in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (memory consumption) issue, as demonstrated by the 10-opencv-dos-memory-exhaust test case.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12602'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9311'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:35:41Z', 'nvd_published_at': None}
1.4.0
GHSA-8w3x-457r-wg53
2021-11-18T00:08:10Z
2021-10-12T22:00:41Z
null
['CVE-2017-12597']
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to opencv-python and opencv-contrib-python through 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12597'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T17:28:40Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}
1.4.0
GHSA-vc29-rj92-gc7j
2021-11-18T15:33:38Z
2021-10-12T22:02:12Z
null
['CVE-2017-12606']
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow4 in utils.cpp when reading an image file by using cv::imread.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12606'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:49:52Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}
1.4.0
GHSA-fw99-f933-rgh8
2021-10-07T15:09:42Z
2021-10-12T22:09:31Z
null
['CVE-2019-14492']
Out-of-bounds Read and Out-of-bounds Write in OpenCV
An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14492'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15124'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html'}]
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:09:42Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}
1.4.0
GHSA-xrpj-f9v6-2332
2021-10-18T19:08:54Z
2021-10-04T20:12:45Z
2021-10-18T19:05:16Z
[]
CSV injection in Craft CMS
# Withdrawn Duplicate of GHSA-h7vq-5qgw-jwwq
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28'}, {'type': 'WEB', 'url': 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}]
{'cwe_ids': ['CWE-1236', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T19:01:45Z', 'nvd_published_at': None}
1.4.0
GHSA-fr26-qjc8-mvjx
2021-10-13T17:45:05Z
2021-10-13T18:56:12Z
null
[]
Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19
Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '6.0.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31412'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:45:05Z', 'nvd_published_at': None}
1.4.0
GHSA-w96g-3p64-63wr
2021-11-18T00:06:27Z
2021-10-12T22:01:23Z
null
['CVE-2017-12601']
Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a buffer overflow in the cv::BmpDecoder::readData function in modules/imgcodecs/src/grfmt_bmp.cpp when reading an image file by using cv::imread, as demonstrated by the 4-buf-overflow-readData-memcpy test case.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12601'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]
{'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:40:39Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}
1.4.0
GHSA-m6vm-8g8v-xfjh
2022-04-20T19:15:08Z
2021-10-12T22:23:13Z
null
['CVE-2019-5063']
Out-of-bounds Write in OpenCV
An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0 (corresponds with OpenCV-Python 4.1.0.25). A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5063'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/16951'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:40:07Z', 'nvd_published_at': '2020-01-03T17:15:00Z'}
1.4.0
GHSA-qf6q-qfwp-vp44
2021-10-08T22:34:05Z
2021-10-12T16:30:58Z
null
['CVE-2020-8818']
Origin Validation Error in Magento 2
An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cardgate/magento2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8818'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/issues/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/cardgate/magento2'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/releases/tag/v2.0.33'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html'}]
{'cwe_ids': ['CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:34:05Z', 'nvd_published_at': '2020-02-25T02:15:00Z'}
1.4.0
GHSA-59hh-656j-3p7v
2023-08-29T18:55:39Z
2021-10-25T19:42:57Z
null
['CVE-2021-41173']
Geth Node Vulnerable to DoS via maliciously crafted p2p message
### Impact A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package. ### Details On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to crash the snap request handler . By using this vulnerability, a peer connected on the `snap/1` protocol could cause a vulnerable node to crash with a `panic`. In the `trie.TryGetNode` implementation, if the requested path is reached, the associated node will be returned. However the nilness is not checked there. ```golang func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) { // If we reached the requested path, return the current node if pos >= len(path) { // Although we most probably have the original node expanded, encoding // that into consensus form can be nasty (needs to cascade down) and // time consuming. Instead, just pull the hash up from disk directly. var hash hashNode if node, ok := origNode.(hashNode); ok { hash = node } else { hash, _ = origNode.cache() } ``` More specifically the `origNode` can be nil(e.g. the child of fullnode) and system can panic at line `hash, _ = origNode.cache()`. When investigating this, @holiman tried to find it via fuzzing, which uncovered a second crasher, also related to the snap `GetTrieNodes` package. If the caller requests a storage trie: ```golang // Storage slots requested, open the storage trie and retrieve from there account, err := snap.Account(common.BytesToHash(pathset[0])) loads++ // always account database reads, even for failures if account == nil { break } stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb) ``` The code assumes that `snap.Account` returns _either_ a non-nil response unless `error` is also provided. This is however not the case, since `snap.Account` can return `nil, nil`. ### Patches ```diff --- a/eth/protocols/snap/handler.go +++ b/eth/protocols/snap/handler.go @@ -469,7 +469,7 @@ func handleMessage(backend Backend, peer *Peer) error { // Storage slots requested, open the storage trie and retrieve from there account, err := snap.Account(common.BytesToHash(pathset[0])) loads++ // always account database reads, even for failures - if err != nil { + if err != nil || account == nil { break } stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb) diff --git a/trie/trie.go b/trie/trie.go index 7ea7efa835..d0f0d4e2bc 100644 --- a/trie/trie.go +++ b/trie/trie.go @@ -174,6 +174,10 @@ func (t *Trie) TryGetNode(path []byte) ([]byte, int, error) { } func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) { + // If non-existent path requested, abort + if origNode == nil { + return nil, nil, 0, nil + } // If we reached the requested path, return the current node if pos >= len(path) { // Although we most probably have the original node expanded, encoding @@ -193,10 +197,6 @@ func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, new } // Path still needs to be traversed, descend into children switch n := (origNode).(type) { - case nil: - // Non-existent path requested, abort - return nil, nil, 0, nil - case valueNode: // Path prematurely ended, abort return nil, nil, 0, nil ``` The fixes were merged into [#23657](https://github.com/ethereum/go-ethereum/pull/23657), with commit [f1fd963](https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8), and released as part of Geth [v1.10.9](https://github.com/ethereum/go-ethereum/tree/v1.10.9) on Sept 29, 2021. ### Workarounds Apply the patch above or upgrade to a version which is not vulnerable. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41173'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23801'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0256'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:23:10Z', 'nvd_published_at': '2021-10-26T14:15:00Z'}
1.4.0
GHSA-gw97-f6h8-gm94
2021-10-20T17:07:20Z
2021-10-13T18:55:04Z
null
['CVE-2021-42009']
Email relay in Apache Traffic Control
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42009'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78d471d8a4fd268a4c5ae6c47327c09d9d4b4467c31da2c97422febb@%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dfa9a89b39d06caeeeb7b5cdc41b3493a9b86cc6cfa059d3f349d87@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re384fd0f44c6d230f31376153c6e8b59e4a669f927c1533d06d702af%40%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf0481b9e38ece1ece458d3ce7b2d671df819e3555597f31fc34f084e%40%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/12/1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:43:05Z', 'nvd_published_at': '2021-10-12T08:15:00Z'}
1.4.0
GHSA-pm77-c4q7-3fwj
2021-10-08T22:58:55Z
2021-10-12T16:31:12Z
null
['CVE-2019-20455']
Improper Certificate Validation in Heartland & Global Payments PHP SDK
Gateways/Gateway.php in Heartland & Global Payments PHP SDK before 2.0.0 does not enforce SSL certificate validations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'globalpayments/php-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20455'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8/commits/c86e18f28c5eba0d6ede7d557756d978ea83d3c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/globalpayments/php-sdk'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/compare/1.3.3...2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://winterdragon.ca/global-payments-vulnerability/'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:58:55Z', 'nvd_published_at': '2020-02-14T16:15:00Z'}
1.4.0
GHSA-362v-wg5p-64w2
2021-10-20T17:28:19Z
2021-10-12T18:41:16Z
null
['CVE-2021-42135']
Incorrect Privilege Assignment in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'last_affected': '1.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42135'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-28-vaults-google-cloud-secrets-engine-policies-with-globs-may-provide-additional-privileges-in-vault-1-8-0-onwards/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#180'}]
{'cwe_ids': ['CWE-266', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:53:55Z', 'nvd_published_at': '2021-10-11T03:15:00Z'}
1.4.0
GHSA-ggmv-6q9p-9gm6
2021-10-19T14:51:11Z
2021-10-12T17:51:04Z
null
['CVE-2021-42134']
Cross-site Scripting in django-unicorn
The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-unicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42134'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/commit/3a832a9e3f6455ddd3b87f646247269918ad10c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamghill/django-unicorn'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/compare/0.36.0...0.36.1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:56:03Z', 'nvd_published_at': '2021-10-11T01:15:00Z'}
1.4.0
GHSA-h58v-g3q6-q9fx
2021-10-21T21:33:34Z
2021-10-22T16:20:53Z
null
['CVE-2021-41169']
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu
### Impact _What kind of vulnerability is it? Who is impacted?_ It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form. Only admin users are affected and only admin users can create tags. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem is patched with Version 1.6.42. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Create a custom request listener to avoid that this kind of tags are created. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues) * Email us at [security@sulu.io](mailto:security@sulu.io)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.43'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T21:33:34Z', 'nvd_published_at': '2021-10-21T21:15:00Z'}
1.4.0
GHSA-p6vg-p826-qp3v
2021-10-21T15:01:19Z
2021-10-05T20:24:49Z
null
['CVE-2021-22963']
URL Redirection to Untrusted Site ('Open Redirect') in fastify-static
### Impact A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`. The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. ### Patches The issue has been patched in `fastify-static@4.2.4` ### Workarounds If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option. ### References + Bug founder: drstrnegth + [hackerone Report](https://hackerone.com/reports/1354255) ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-static](https://github.com/fastify/fastify-static) * Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastify-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1354255'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-static'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:55:33Z', 'nvd_published_at': '2021-10-14T15:15:00Z'}
1.4.0
GHSA-4p3x-8qw9-24w9
2021-10-26T17:56:23Z
2021-10-27T18:53:18Z
null
['CVE-2021-41188']
Authenticated Stored XSS in shopware/shopware
### Impact Authenticated Stored XSS in Administration ### Patches Use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### Workarounds If you cannot use the security plugin, add the following config to your `.htaccess` file ``` <IfModule mod_headers.c> <FilesMatch "\.(?i:svg)$"> Header set Content-Security-Policy "script-src 'none'" </FilesMatch> </IfModule> ``` If you are using nginx as server config, you can add the following to your configuration: ``` server { # ... location ~* ^.+\.svg$ { add_header Content-Security-Policy "script-src 'none'"; } } ``` ### References https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4p3x-8qw9-24w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41188'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/37213e91d525c95df262712cba80d1497e395a58'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/releases/tag/v5.7.6'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:56:23Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}
1.4.0
GHSA-6768-mcjc-8223
2022-10-19T15:36:14Z
2021-10-27T18:51:22Z
null
['CVE-2021-38294']
Command injection leading to Remote Code Execution in Apache Storm
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38294'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/storm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/44'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html'}]
{'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:52:52Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}
1.4.0
GHSA-48w2-rm65-62xx
2022-08-16T19:48:45Z
2021-10-12T17:53:00Z
null
['CVE-2021-41136']
Puma with proxy which forwards LF characters as line endings could allow HTTP request smuggling
### Impact Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as "low". Puma is only aware of a single proxy server which has this behavior. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. ### Patches This vulnerability was patched in Puma 5.5.1 and 4.3.9. ### Workarounds This vulnerability only affects Puma installations without any proxy in front. Use a proxy which does not forward LF characters as line endings. Proxies which do not forward LF characters as line endings: * Nginx * Apache (>2.4.25) * Haproxy * Caddy * Traefik ### Possible Breakage If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error. ### References * [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling) ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v4.3.9'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v5.5.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2021-41136.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-28'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5146'}]
{'cwe_ids': ['CWE-444'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:06:36Z', 'nvd_published_at': '2021-10-12T16:15:00Z'}
1.4.0
GHSA-jcxv-2j3h-mg59
2021-11-18T15:31:01Z
2021-10-12T22:03:09Z
null
['CVE-2017-17760']
Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV
OpenCV 3.3.1 (corresponding with opencv-python and opencv-contrib-python 3.3.1.11) has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17760'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10351'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102974'}]
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:20:01Z', 'nvd_published_at': '2017-12-29T18:29:00Z'}
1.4.0
GHSA-25fx-mxc2-76g7
2022-08-15T20:11:12Z
2021-10-06T17:49:11Z
null
['CVE-2021-41120']
Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS
### Impact URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last name. Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication. ### Patches The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1** ### Workarounds One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback. ### For more information If you have any questions or comments about this advisory: - Open an issue in Sylius/PayPalPlugin issues - Email us at security at sylius dot com
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41120'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/PayPalPlugin'}]
{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T21:12:27Z', 'nvd_published_at': '2021-10-05T21:15:00Z'}
1.4.0
GHSA-jwqp-28gf-p498
2021-10-06T17:32:00Z
2021-10-06T17:46:22Z
null
['CVE-2021-41125']
HTTP authentication credentials potentially leaked to target websites
### Impact If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. ### Patches Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. ### Workarounds If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the [`w3lib.http.basic_auth_header`](https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header) function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). ### For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/scrapy/scrapy/issues) * [Email us](mailto:opensource@zyte.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy/scrapy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html'}, {'type': 'WEB', 'url': 'https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header'}, {'type': 'WEB', 'url': 'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth'}]
{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:32:00Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}
1.4.0
GHSA-q6j2-g8qf-wvf7
2022-06-29T21:54:06Z
2021-10-12T22:34:28Z
null
['CVE-2020-19003']
Verification check bypass in Gate One
An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gateone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003'}, {'type': 'WEB', 'url': 'https://github.com/liftoff/GateOne/issues/728'}, {'type': 'PACKAGE', 'url': 'https://github.com/liftoff/GateOne'}]
{'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T13:57:49Z', 'nvd_published_at': '2021-10-06T13:15:00Z'}
1.4.0
GHSA-q854-j362-cfq9
2021-10-08T21:54:35Z
2021-10-12T16:22:30Z
null
['CVE-2020-23849']
Cross-site Scripting in jsoneditor
Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsoneditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/jsoneditor/issues/1029'}, {'type': 'PACKAGE', 'url': 'https://github.com/josdejong/jsoneditor'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:54:35Z', 'nvd_published_at': '2021-01-11T14:15:00Z'}
1.4.0
GHSA-rqgp-ccph-5w65
2021-11-02T18:42:29Z
2021-10-28T23:14:14Z
null
['CVE-2021-3901']
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464'}]
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T21:12:18Z', 'nvd_published_at': '2021-10-27T21:15:00Z'}