schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 3
183
| details
stringlengths 9
12.9k
| severity
stringlengths 2
92
| affected
stringlengths 84
2.74k
| references
stringlengths 99
16.4k
| database_specific
stringlengths 131
210
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-gpqq-952q-5327 | 2022-10-04T21:36:19Z | 2021-10-26T14:55:12Z | null | ['CVE-2021-41184'] | XSS in the `of` option of the `.position()` util in jquery-ui | ### Impact
Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code:
```js
$( "#element" ).position( {
my: "left top",
at: "right bottom",
of: "<img onerror='doEvilThing()' src='/404' />",
collision: "none"
} );
```
will call the `doEvilThing()` function.
### Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector.
### Workarounds
A workaround is to not accept the value of the `of` option from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41184'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-001'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:43Z', 'nvd_published_at': '2021-10-26T15:15:00Z'} |
1.4.0 | GHSA-7c7g-72q7-4xhm | 2021-10-08T22:15:48Z | 2021-10-12T16:27:35Z | null | ['CVE-2020-28274'] | Prototype pollution vulnerability in 'deepref' | Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deepref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274'}, {'type': 'PACKAGE', 'url': 'https://github.com/isaymatato/deepref'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:15:48Z', 'nvd_published_at': '2020-12-08T22:15:00Z'} |
1.4.0 | GHSA-wjw6-2cqr-j4qr | 2021-10-19T18:03:49Z | 2021-10-19T20:14:36Z | null | ['CVE-2021-41131'] | Client metadata path-traversal | ### Impact
In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`).
The impact is mitigated by a few facts:
* It only affects implementations that allow arbitrary rolename selection for delegated targets metadata
* The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata
* The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json.
### Patches
A fix is available in version 0.19 or newer.
### Workarounds
None that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf.
### References
- [The issue where this was discovered](https://github.com/theupdateframework/python-tuf/issues/1527)
- [Proof of Concept demonstrating the flaw](https://github.com/jku/path-traversal-poc)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [python-tuf](https://github.com/theupdateframework/python-tuf/issues)
* Contact the maintainers by email or Slack
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41131'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/issues/1527'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/python-tuf'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:09:34Z', 'nvd_published_at': '2021-10-19T18:15:00Z'} |
1.4.0 | GHSA-97x5-cc53-cv4v | 2021-10-28T17:21:21Z | 2021-10-28T23:14:06Z | null | ['CVE-2020-22864'] | Cross site scripting in froala-editor | A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor allows attackers to execute arbitrary web scripts or HTML. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22864'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/issues/3880'}, {'type': 'WEB', 'url': 'https://github.com/418sec/wysiwyg-editor/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/pull/3911'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/releases/tag/v4.0.11'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=WE3b1iSnWJY'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T17:21:21Z', 'nvd_published_at': '2021-10-26T22:15:00Z'} |
1.4.0 | GHSA-89rj-5ggj-3p9p | 2021-11-18T15:29:39Z | 2021-10-12T22:03:41Z | null | ['CVE-2018-5269'] | Reachable Assertion in OpenCV. | In OpenCV 3.3.1 (corresponds with OpenCV-Python 3.3.1.11), an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5269'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10540'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10563'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}] | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:49:56Z', 'nvd_published_at': '2018-01-08T05:29:00Z'} |
1.4.0 | GHSA-c3xq-cj8f-7829 | 2023-02-13T17:02:33Z | 2021-10-12T16:31:43Z | null | ['CVE-2013-2166'] | Inadequate Encryption Strength in python-keystoneclient | python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['keystoneclient.middleware.auth_token.AuthProtocol._protect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._unprotect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._get_cache_key', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_get', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_store', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_put', 'keystoneclient.middleware.memcache_crypt.generate_aes_key', 'keystoneclient.middleware.memcache_crypt.compute_mac', 'keystoneclient.middleware.memcache_crypt.hash_data', 'keystoneclient.middleware.memcache_crypt.sign_data', 'keystoneclient.middleware.memcache_crypt.verify_signed_data', 'keystoneclient.middleware.memcache_crypt.encrypt_data', 'keystoneclient.middleware.memcache_crypt.decrypt_data']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.3'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2166'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-2166'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/python-keystoneclient'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-2166'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0992.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/06/19/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/60684'}] | {'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:03:40Z', 'nvd_published_at': '2019-12-10T15:15:00Z'} |
1.4.0 | GHSA-83rh-hx5x-q9p5 | 2021-10-07T20:17:07Z | 2021-10-12T22:03:23Z | null | ['CVE-2017-18009'] | Out-of-bounds Read in OpenCV | In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer over-read exists in the function cv::HdrDecoder::checkSignature in modules/imgcodecs/src/grfmt_hdr.cpp. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18009'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10479'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:17:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h9ph-jcgh-gf69 | 2021-10-19T14:51:30Z | 2021-10-12T16:40:28Z | null | ['CVE-2021-42112'] | Cross-site Scripting in Limesurvey | The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'limesurvey/limesurvey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.27.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/pull/2044'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d'}, {'type': 'WEB', 'url': 'https://bugs.limesurvey.org/view.php?id=17562'}, {'type': 'PACKAGE', 'url': 'https://github.com/LimeSurvey/LimeSurvey'}, {'type': 'WEB', 'url': 'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T20:21:13Z', 'nvd_published_at': '2021-10-08T21:15:00Z'} |
1.4.0 | GHSA-cr3f-r24j-3chw | 2023-08-08T19:59:06Z | 2021-10-05T17:53:29Z | null | ['CVE-2021-40325'] | Cobbler before 3.3.0 allows authorization bypass for modification of settings. | Cobbler before 3.3.0 allows authorization bypass for modification of settings. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40325'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T16:00:07Z', 'nvd_published_at': '2021-10-04T06:15:00Z'} |
1.4.0 | GHSA-fj58-h2fr-3pp2 | 2023-01-11T21:59:18Z | 2021-10-12T16:35:45Z | null | ['CVE-2019-18413'] | SQL Injection and Cross-site Scripting in class-validator | In TypeStack class-validator, `validate()` input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional `forbidUnknownValues` parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input.
The default settings for `forbidUnknownValues` has been changed to `true` in 0.14.0.
NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'class-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18413'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/438'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/438#issuecomment-964728471'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/pull/1798'}, {'type': 'PACKAGE', 'url': 'https://github.com/typestack/class-validator'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator#passing-options'}] | {'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:11:08Z', 'nvd_published_at': '2019-10-24T18:15:00Z'} |
1.4.0 | GHSA-wc73-w5r9-x9pc | 2021-10-08T22:07:01Z | 2021-10-12T16:41:36Z | null | ['CVE-2020-29204'] | Cross-site Scripting in XXL-JOB | XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29204'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2083'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:07:01Z', 'nvd_published_at': '2020-12-27T06:15:00Z'} |
1.4.0 | GHSA-jvjp-vh27-r9h5 | 2021-10-27T17:07:08Z | 2021-10-27T18:53:03Z | null | ['CVE-2021-25977'] | Cross-site Scripting in PiranhaCMS | In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Piranha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '9.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977'}, {'type': 'WEB', 'url': 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PiranhaCMS/piranha.core'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:55:07Z', 'nvd_published_at': '2021-10-25T13:15:00Z'} |
1.4.0 | GHSA-7vxr-6cxg-j3x8 | 2021-10-07T18:59:04Z | 2021-10-12T22:33:59Z | null | ['CVE-2013-2512'] | OS Command Injection in ftpd | The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ftpd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512'}, {'type': 'WEB', 'url': 'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ftpd/CVE-2013-2512.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wconrad/ftpd'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210206231123/http://vapidlabs.com/advisory.php?v=34'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T18:59:04Z', 'nvd_published_at': '2021-01-26T23:15:00Z'} |
1.4.0 | GHSA-mcwm-2wmc-6hv4 | 2021-10-06T00:23:01Z | 2021-10-06T00:23:01Z | 2021-10-06T00:23:01Z | ['CVE-2021-31957'] | ASP.NET Core Denial of Service Vulnerability | # Withdrawn
This advisory was initially published and mapped incorrectly to nuget `Microsoft.NETCore.App.Ref`. We later reanalyzed this advisory and found it does not have a direct mapping to a NuGet package. Thus we have withdrawn this advisory.
The underlying ASP.NET Core Denial of Service Vulnerability and CVE-2021-31957 remain legitimate.
# Description.
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A denial of service vulnerability exists when ASP.NET Core improperly handles client disconnect. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.
### Patches
* If you're using .NET 5.0, you should download and install Runtime 5.0.7 or SDK 5.0.204 (for Visual Studio 2019 v16.8) or SDK 5.0.301 (for Visual Studio 2019 16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
* If you're using .NET Core 3.1, you should download and install Runtime 3.1.16 or SDK 3.1.116 (for Visual Studio 2019 v16.4) or 3.1.410 (for Visual Studio 2019 v16.5 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
#### Other Details
- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/188
- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/33369
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31957
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-mcwm-2wmc-6hv4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31957'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4PRVVLXXQEF4SEJOBV3VRJHGX7YHY2CG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVCDYIP4A6DDRT7G6P3ZW6PKNK2DNWJ2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMHWHRRYDHKM6BIINW5V7OCSW4SDWB4W/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMAO4NG2OQ4PCXUQWMNSCMYWLIJJY6UY/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31957'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T19:41:18Z', 'nvd_published_at': '2021-06-08T23:15:00Z'} |
1.4.0 | GHSA-v6w3-2prq-h95f | 2021-10-06T13:31:54Z | 2021-10-06T17:48:38Z | null | ['CVE-2021-28170'] | Improper Input Validation in Jakarta Expression Language | In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sun.el:el-ri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/el-ri/issues/155'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j/el-ri'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': ['CWE-20', 'CWE-917'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:31:54Z', 'nvd_published_at': '2021-05-26T22:15:00Z'} |
1.4.0 | GHSA-m8wh-mqgf-rr8g | 2021-10-12T16:59:26Z | 2021-10-12T17:50:25Z | null | ['CVE-2021-25738'] | Code injection in Kubernetes Java Client | Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.kubernetes:client-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25738'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/issues/1698'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes-client/java'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/23/2'}] | {'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:59:26Z', 'nvd_published_at': '2021-10-11T19:15:00Z'} |
1.4.0 | GHSA-c7v4-m269-4995 | 2021-10-20T16:46:12Z | 2021-10-21T17:49:08Z | null | ['CVE-2020-25703'] | Exposure of Sensitive Information to an Unauthorized Actor in Moodle | The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25703'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895439'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413941'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:46:12Z', 'nvd_published_at': '2020-11-19T17:15:00Z'} |
1.4.0 | GHSA-pvh2-pj76-4m96 | 2021-10-25T20:07:57Z | 2021-10-19T15:28:35Z | null | ['CVE-2021-41153'] | Specification non-compliance in JUMPI | ### Impact
In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check.
### Patches
This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`.
This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this.
### Workarounds
If you are dependent on an older version of `evm` and cannot update due to API interface changes, please contact Wei by email (wei@that.world), who will be happy to help you to publish patch releases for older `evm` versions.
### References
Fix PR: https://github.com/rust-blockchain/evm/pull/67
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the `evm` repo.
### Special thanks
Special thanks to @rakita for reporting this issue.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-pvh2-pj76-4m96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41153'}, {'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/pull/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-blockchain/evm'}] | {'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-18T21:06:02Z', 'nvd_published_at': '2021-10-18T21:15:00Z'} |
1.4.0 | GHSA-j23j-q57m-63v3 | 2021-10-13T17:39:25Z | 2021-10-13T18:54:50Z | null | [] | Denial of service in DataCommunicator class in Vaadin 8 | Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.14.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-j23j-q57m-63v3'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12415'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33609'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:39:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4365-fhm5-qcrx | 2021-10-21T20:32:19Z | 2021-10-22T16:19:13Z | null | ['CVE-2021-41127'] | Maliciously Crafted Model Archive Can Lead To Arbitrary File Write | ### Impact
An Archive Extraction (Zip Slip) vulnerability in the functionality that allows a user to load a trained model archive in Rasa 2.8.9 and older allows an attacker arbitrary write capability within specific directories using a malicious crafted archive file.
### Patches
The vulnerability is fixed in Rasa 2.8.10
### Workarounds
Mitigating steps for vulnerable end users are to ensure that they do not upload untrusted model files, and restrict CLI or API endpoint access where a malicious actor could target a deployed Rasa instance.
### For more information
If you have any questions or comments about this advisory:
* Email [the Rasa Security Team](mailto:security@rasa.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rasa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx'}, {'type': 'WEB', 'url': 'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989'}, {'type': 'PACKAGE', 'url': 'https://github.com/RasaHQ/rasa'}] | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T20:32:19Z', 'nvd_published_at': '2021-10-21T21:15:00Z'} |
1.4.0 | GHSA-33h2-69j3-r336 | 2021-11-18T00:07:15Z | 2021-10-12T22:00:51Z | null | ['CVE-2017-12598'] | Out-of-bounds Read in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the cv::RBaseStream::readBlock function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 8-opencv-invalid-read-fread test case. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12598'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:49:53Z', 'nvd_published_at': '2017-08-07T01:29:00Z'} |
1.4.0 | GHSA-r7rh-g777-g5gx | 2021-10-18T14:34:41Z | 2021-10-12T18:49:23Z | null | ['CVE-2021-28661'] | SilverStripe GraphQL Server permission checker not inherited by query subclass. | Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28661'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-graphql'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/3.5.2'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2021-28661'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:35:47Z', 'nvd_published_at': '2021-10-07T15:15:00Z'} |
1.4.0 | GHSA-957j-59c2-j692 | 2023-09-07T18:57:59Z | 2021-10-12T16:26:37Z | null | ['CVE-2020-28282'] | Prototype pollution in getobject | Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'getobject'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28282'}, {'type': 'PACKAGE', 'url': 'https://github.com/cowboy/node-getobject'}, {'type': 'WEB', 'url': 'https://github.com/cowboy/node-getobject/blob/aba04a8e1d6180eb39eff09990c3a43886ba8937/lib/getobject.js#L48'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:07:57Z', 'nvd_published_at': '2020-12-29T18:15:00Z'} |
1.4.0 | GHSA-h7vq-5qgw-jwwq | 2021-10-18T19:11:00Z | 2021-10-18T19:04:16Z | null | ['CVE-2021-41824'] | CSV Injection Vulnerability | ### Impact
In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel.
If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update.
### Patches
This has been patched in Craft 3.7.14.
### References
* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28
* https://twitter.com/craftcmsupdates/status/1442928690145366018
### For more information
If you have any questions or comments about this advisory, email us at support@craftcms.com
----------
Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.7.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28'}, {'type': 'WEB', 'url': 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}] | {'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:36:16Z', 'nvd_published_at': '2021-09-30T00:15:00Z'} |
1.4.0 | GHSA-c7pr-343r-5c46 | 2021-10-06T13:26:05Z | 2021-10-06T17:48:46Z | null | ['CVE-2021-41122'] | missing clamps for decimal args in external functions | ### Impact
The following code does not properly validate that its input is in bounds.
```python
@external
def foo(x: decimal) -> decimal:
return x
```
### Patches
0.3.0 / #2447
### Workarounds
Don't use decimal args
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41122'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2447'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}] | {'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:26:05Z', 'nvd_published_at': '2021-10-05T23:15:00Z'} |
1.4.0 | GHSA-m2r3-8492-vx59 | 2021-10-06T15:13:57Z | 2021-10-06T17:47:46Z | null | ['CVE-2021-23372'] | Denial of Service (DoS) in mongo-express | All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.54.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23372'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongo-express/mongo-express'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1085403'}] | {'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T15:13:57Z', 'nvd_published_at': '2021-04-13T20:15:00Z'} |
1.4.0 | GHSA-g6v7-vqhx-6v6c | 2021-10-18T13:50:38Z | 2021-10-12T17:23:40Z | null | ['CVE-2021-3312'] | XML External Entity Reference in org.opencms:opencms-core | An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '12.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/721'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/725'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/releases'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:55:10Z', 'nvd_published_at': '2021-10-08T15:15:00Z'} |
1.4.0 | GHSA-m5v7-pr32-mjx2 | 2021-11-18T20:37:40Z | 2021-10-12T16:29:13Z | null | ['CVE-2020-13909'] | Critical severity vulnerability in Ignition | The Ignition page before version 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env.
NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13909'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/2316'}, {'type': 'PACKAGE', 'url': 'https://github.com/facade/ignition'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/compare/2.0.4...2.0.5'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/releases/tag/2.0.5'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2020-13909'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:26:02Z', 'nvd_published_at': '2020-06-07T20:15:00Z'} |
1.4.0 | GHSA-vmfh-c547-v45h | 2021-10-06T13:46:32Z | 2021-10-06T17:48:27Z | null | ['CVE-2021-33575'] | Remote code execution in ruby-jss | The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-jss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33575'}, {'type': 'PACKAGE', 'url': 'https://github.com/PixarAnimationStudios/ruby-jss'}, {'type': 'WEB', 'url': 'https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vmfh-c547-v45h'}, {'type': 'WEB', 'url': 'https://github.com/patsplat/plist/tree/ce8f9ae42a114f603ea200c955e420782bffc4ad#label-Security+considerations'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-jss/CVE-2021-33575.yml'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:46:32Z', 'nvd_published_at': '2021-05-25T23:15:00Z'} |
1.4.0 | GHSA-m43c-649m-pm48 | 2021-11-18T15:31:29Z | 2021-10-12T22:03:32Z | null | ['CVE-2017-1000450'] | Integer Overflow or Wraparound in OpenCV. | In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 (corresponding with OpenCV-Python 3.3.0.9) and earlier. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000450'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9723'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9726/commits/c58152d94ba878b2d7d76bcac59146312199b9eb'}, {'type': 'WEB', 'url': 'https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:09:22Z', 'nvd_published_at': '2018-01-02T17:29:00Z'} |
1.4.0 | GHSA-c87f-fq5g-63r2 | 2021-10-08T21:32:32Z | 2021-10-12T17:51:11Z | null | ['CVE-2021-42053'] | Cross-site scripting in Unicorn framework | The Unicorn framework through 0.35.3 for Django allows XSS via component.name. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-unicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42053'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/pull/288/commits/aa5b9835d946bd9893ef02e556859e3ea62cc5e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamghill/django-unicorn'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/compare/0.35.3...0.36.0'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:32:32Z', 'nvd_published_at': '2021-10-07T06:15:00Z'} |
1.4.0 | GHSA-j66h-cc96-c32q | 2021-10-18T14:54:10Z | 2021-10-12T18:42:30Z | null | ['CVE-2021-36150'] | Cross-site Scripting in SilverStripe Framework | SilverStripe Framework through 4.8.1 allows XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36150'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2021-36150'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:42:15Z', 'nvd_published_at': '2021-10-07T14:15:00Z'} |
1.4.0 | GHSA-2p6r-37p9-89p2 | 2021-10-21T14:32:55Z | 2021-10-21T17:46:57Z | null | ['CVE-2021-41135'] | Authz Module Non-Determinism | ### Impact
Consensus failure for 0.43.x and 0.44.{0,1} users.
Funds and balances are safe.
### Patches
0.44.2
### Workarounds
Manually patch the code.
---
Full details posted in https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.43.0'}, {'fixed': '0.44.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-2p6r-37p9-89p2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41135'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/commit/68ab790a761e80d3674f821794cf18ccbfed45ee'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/releases/tag/v0.44.2'}] | {'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:36:34Z', 'nvd_published_at': '2021-10-20T18:15:00Z'} |
1.4.0 | GHSA-5pcx-vqjp-p34w | 2021-10-01T17:49:59Z | 2021-10-04T20:11:03Z | null | ['CVE-2021-25963'] | Cross-site Scripting in shuup | In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'shuup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '2.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25963'}, {'type': 'WEB', 'url': 'https://github.com/shuup/shuup/commit/75714c37e32796eb7cbb0d977af5bcaa26573588'}, {'type': 'PACKAGE', 'url': 'https://github.com/shuup/shuup'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T17:49:59Z', 'nvd_published_at': '2021-09-30T08:15:00Z'} |
1.4.0 | GHSA-5rpc-gwh9-q9fg | 2021-11-18T15:33:54Z | 2021-10-12T22:02:21Z | null | ['CVE-2017-12862'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV | In modules/imgcodecs/src/grfmt_pxm.cpp, the length of buffer AutoBuffer _src is small than expected, which will cause copy buffer overflow later. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12862'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9370'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:44:45Z', 'nvd_published_at': '2017-08-15T16:29:00Z'} |
1.4.0 | GHSA-mc7w-4cjf-c973 | 2021-10-07T19:30:03Z | 2021-10-12T22:06:57Z | null | ['CVE-2019-10061'] | OS Command Injection in node-opencv | utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'opencv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10061'}, {'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b'}, {'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563'}, {'type': 'PACKAGE', 'url': 'https://github.com/peterbraden/node-opencv/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/789'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/opencv'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:30:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fr58-2xhv-qp3w | 2021-10-08T14:44:47Z | 2021-10-12T22:01:16Z | null | ['CVE-2017-12600'] | Denial of Service in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (CPU consumption) issue, as demonstrated by the 11-opencv-dos-cpu-exhaust test case. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12600'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9311'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:44:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6gjf-7w99-j7x7 | 2022-10-13T18:02:46Z | 2021-10-06T17:46:40Z | null | ['CVE-2021-41126'] | Deleted Admin Can Sign In to Admin Interface | ### Impact
Assuming an administrator once had previous access to the admin interface, they may still be able to sign in to the backend using October CMS v2.0.
### Patches
The issue has been patched in v2.1.12
### Workarounds
- Reset the password of the deleted accounts to prevent them from signing in.
- Please contact hello@octobercms.com for code change instructions if you are unable to upgrade.
### References
Credits to:
• Daniel Bidala
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41126'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://octobercms.com/changelog'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:27:51Z', 'nvd_published_at': '2021-10-06T18:15:00Z'} |
1.4.0 | GHSA-3374-7h99-xr85 | 2021-10-29T13:52:23Z | 2021-10-25T19:43:05Z | null | ['CVE-2020-23049'] | Cross-site scripting in forkcms | Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23049'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=2208'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:26:04Z', 'nvd_published_at': '2021-10-22T20:15:00Z'} |
1.4.0 | GHSA-5h9g-x5rv-25wg | 2021-10-22T13:49:23Z | 2021-10-22T16:24:02Z | null | [] | Cross-site scripting vulnerability in TinyMCE | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.9.0 or higher
- Manually sanitize the content using the `BeforeSetContent` event (see below)
#### Example: Manually sanitize content
```js
editor.on('BeforeSetContent', function(e) {
var sanitizedContent = ...; // Manually sanitize content here
e.content = sanitizedContent;
});
```
### Acknowledgements
Tiny Technologies would like to thank William Bowling for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T13:49:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r838-q6jp-58xx | 2021-10-08T23:00:17Z | 2021-10-12T16:31:22Z | null | ['CVE-2013-1895'] | Improper Restriction of Excessive Authentication Attempts in py-bcrypt | The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py-bcrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1895'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83039'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/58702'}] | {'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:00:17Z', 'nvd_published_at': '2020-01-28T15:15:00Z'} |
1.4.0 | GHSA-m49f-hcxp-6hm6 | 2023-09-20T19:07:20Z | 2021-10-25T19:42:46Z | null | ['CVE-2021-41176'] | pterodactyl/panel CSRF allowing an external page to trigger a user logout event | ### Impact
A malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.**
### Patches
None.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory please contact `Tactical Fish#8008` on Discord, or email `dane@pterodactyl.io`.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-m49f-hcxp-6hm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41176'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/releases/tag/v1.6.3'}] | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T16:51:25Z', 'nvd_published_at': '2021-10-25T17:15:00Z'} |
1.4.0 | GHSA-grh7-935j-hg6w | 2023-01-24T15:03:47Z | 2021-10-06T17:47:17Z | null | ['CVE-2021-30151'] | Cross-site Scripting in Sidekiq | Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30151'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/issues/4852'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8'}, {'type': 'PACKAGE', 'url': 'https://github.com/mperham/sidekiq'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:52:11Z', 'nvd_published_at': '2021-04-06T06:15:00Z'} |
1.4.0 | GHSA-jfmf-w293-8xr8 | 2021-10-13T17:43:34Z | 2021-10-13T18:55:52Z | null | [] | Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8 | Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.13.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.12.4'}}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-jfmf-w293-8xr8'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/framework'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31409'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:43:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3w73-fmf3-hg5c | 2022-02-23T22:19:32Z | 2021-10-19T20:15:50Z | null | ['CVE-2021-42575'] | Policies not properly enforced in OWASP Java HTML Sanitizer | The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the `SELECT`, `STYLE`, and `OPTION` elements. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20211018.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42575'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:10:40Z', 'nvd_published_at': '2021-10-18T15:15:00Z'} |
1.4.0 | GHSA-5vfx-8w6m-h3v4 | 2022-08-15T20:12:39Z | 2021-10-04T20:14:13Z | null | ['CVE-2021-41129'] | Pterodactyl Panel vulnerable to authentication bypass due to improper user-provided security token verification | A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user.
## Impact
Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user.
This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`.
There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user.
## Scope
At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably:
1.) The account referenced by the malicious cache key **must** have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow.
2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they **must** provide a valid two-factor authentication token.
However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met:
3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker.
### About the Severity
As you may have noticed, this is not a trivial authentication bypass bug to exploit, and is likely incredibly difficult for a layperson to pull off. However, the severity of this disclosure has been prepared based on the nature of the bug and the potential for unexpected administrative account access under very rare conditions.
## Mitigation
In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere.
If you have any questions or concerns about the content of this disclosure please contact `Tactical Fish#8008` on Discord, or email `dane ät pterodactyl.io`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41129'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2'}] | {'cwe_ids': ['CWE-287', 'CWE-502', 'CWE-639', 'CWE-807'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T16:51:31Z', 'nvd_published_at': '2021-10-06T20:15:00Z'} |
1.4.0 | GHSA-5f38-9jw2-6r6h | 2022-05-04T03:42:48Z | 2021-10-12T16:22:04Z | null | ['CVE-2021-23447'] | Cross-site Scripting in teddy | Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'teddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/pull/518'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'}, {'type': 'PACKAGE', 'url': 'https://github.com/rooseveltframework/teddy'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TEDDY-1579557'}] | {'cwe_ids': ['CWE-79', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:52:26Z', 'nvd_published_at': '2021-10-07T17:15:00Z'} |
1.4.0 | GHSA-3448-vrgh-85xr | 2021-11-18T15:27:30Z | 2021-10-12T22:21:43Z | null | ['CVE-2019-14493'] | NULL Pointer Dereference in OpenCV. | An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14493'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15127'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}] | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T14:48:09Z', 'nvd_published_at': '2019-08-01T17:15:00Z'} |
1.4.0 | GHSA-284f-f2hw-j2gx | 2021-10-18T18:15:50Z | 2021-10-12T18:41:59Z | null | ['CVE-2021-22958'] | Server-Side Request Forgery vulnerability in concrete5 | A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22958'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/pull/8826'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/863221'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/855-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concrete5/concrete5'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:44:32Z', 'nvd_published_at': '2021-10-07T14:15:00Z'} |
1.4.0 | GHSA-6p52-jr3q-c94g | 2023-09-01T21:39:22Z | 2021-10-19T15:28:57Z | null | ['CVE-2021-41078'] | Nameko Arbitrary code execution due to YAML deserialization | ### Impact
Nameko can be tricked to perform arbitrary code execution when deserialising a YAML config file. Example:
``` yaml
# malicious.yaml
!!python/object/new:type
args: ['z', !!python/tuple [], {'extend': !!python/name:exec }]
listitems: "__import__('os').system('cat /etc/passwd')"
```
``` shell
$ nameko run --config malicious.yaml test
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
...
```
### Patches
The problem was fixed in https://github.com/nameko/nameko/pull/722 and released in version 2.14.0, and in rc10 of the v3 pre-release.
Versions prior to 2.14.0, and v3.0.0rc0 through v3.0.0rc9 are still vulnerable.
### Workarounds
The vulnerability is exploited by config files with malicious content. It can be avoided by only using config files that you trust. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nameko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nameko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0rc0'}, {'fixed': '3.0.0rc10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0rc9'}}] | [{'type': 'WEB', 'url': 'https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41078'}, {'type': 'PACKAGE', 'url': 'https://github.com/nameko/nameko'}, {'type': 'WEB', 'url': 'https://github.com/nameko/nameko/releases/tag/v2.14.0'}, {'type': 'WEB', 'url': 'https://github.com/nameko/nameko/releases/tag/v3.0.0-rc10'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T15:14:24Z', 'nvd_published_at': '2021-10-26T13:15:00Z'} |
1.4.0 | GHSA-pgh6-m65r-2rhq | 2021-10-21T14:57:14Z | 2021-10-12T16:04:17Z | null | ['CVE-2021-22964'] | DOS and Open Redirect with user input | ### Impact
A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.
A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."`
The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
### Patches
The issue has been patched in `fastify-static@4.4.1`
### Workarounds
If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
### References
+ Bug founder: drstrnegth
+ [hackerone Report](https://hackerone.com/reports/1361804)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastify-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.4'}, {'fixed': '4.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22964'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1361804'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-static'}] | {'cwe_ids': ['CWE-248', 'CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:38:24Z', 'nvd_published_at': '2021-10-14T15:15:00Z'} |
1.4.0 | GHSA-m6m5-pp4g-fcc8 | 2021-10-06T16:48:49Z | 2021-10-06T17:47:35Z | null | [] | S3 storage write is not aborted on errors leading to unbounded memory usage | ### Impact
Anyone using storage.blob.s3 introduced in 0.5.0 with storage.imapsql.
```
storage.imapsql local_mailboxes {
...
msg_store s3 {
...
}
}
```
### Patches
The relevant commit is pushed to master and will be included in the 0.5.1 release.
No special handling of the issue has been done due to the small amount of affected users.
### Workarounds
None.
### References
* Original report: https://github.com/foxcpp/maddy/issues/395
* Fix: https://github.com/foxcpp/maddy/commit/07c8495ee4394fabbf5aac4df8aebeafb2fb29d8 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-m6m5-pp4g-fcc8'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}] | {'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:48:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pvv8-8fx9-h673 | 2021-10-25T20:07:48Z | 2021-10-19T15:28:03Z | null | ['CVE-2021-41151'] | Path Traversal in @backstage/plugin-scaffolder-backend | ### Impact
A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in the published pull request.
This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request.
### Patches
The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.4'}, {'fixed': '0.15.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-10-16'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-18T20:47:02Z', 'nvd_published_at': '2021-10-18T21:15:00Z'} |
1.4.0 | GHSA-m6j4-8r7p-wpp3 | 2021-10-06T16:57:01Z | 2021-10-06T17:46:55Z | null | ['CVE-2021-21389'] | BuddyPress privilege escalation via REST API | ### Impact
It's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the BuddyPress REST API members endpoint.
### Patches
The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
### References
https://buddypress.org/2021/03/buddypress-7-2-1-security-release/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [HackerOne](https://hackerone.com/wordpress) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'buddypress/buddypress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21389'}, {'type': 'WEB', 'url': 'https://buddypress.org/2021/03/buddypress-7-2-1-security-release/'}, {'type': 'WEB', 'url': 'https://codex.buddypress.org/releases/version-7-2-1/'}, {'type': 'PACKAGE', 'url': 'https://github.com/buddypress/BuddyPress'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:57:01Z', 'nvd_published_at': '2021-03-26T21:15:00Z'} |
1.4.0 | GHSA-c2h3-6mxw-7mvq | 2021-10-15T17:31:03Z | 2021-10-04T20:14:47Z | null | ['CVE-2021-41103'] | Insufficiently restricted permissions on plugin directories | ### Impact
A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.
### Patches
This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability.
### Workarounds
Limit access to the host to trusted users. Update directory permission on container bundles directories.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/containerd/containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41103'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.11'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5002'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T17:05:03Z', 'nvd_published_at': '2021-10-04T17:15:00Z'} |
1.4.0 | GHSA-4286-h47h-m5v6 | 2023-09-21T22:49:27Z | 2021-10-25T19:43:24Z | null | ['CVE-2021-41745'] | Showdoc File Upload Vulnerability | A file upload vulnerability exists in Showdoc 2.8.3, which can be exploited by an attacker to gain server privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}, {'type': 'WEB', 'url': 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480'}] | {'cwe_ids': ['CWE-287', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:46:11Z', 'nvd_published_at': '2021-10-22T12:15:00Z'} |
1.4.0 | GHSA-7534-mm45-c74v | 2021-10-05T18:52:50Z | 2021-10-05T20:24:41Z | null | ['CVE-2021-34552'] | Buffer Overflow in Pillow | Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34552'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5567'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202211-10'}] | {'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:52:50Z', 'nvd_published_at': '2021-07-13T17:15:00Z'} |
1.4.0 | GHSA-wph7-x527-w3h5 | 2022-02-08T20:42:53Z | 2021-10-15T18:51:34Z | null | ['CVE-2021-42340'] | Missing Release of Resource after Effective Lifetime in Apache Tomcat | The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.0-M6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.0-M5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.40'}, {'fixed': '9.0.54'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.60'}, {'fixed': '8.5.72'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42340'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10379'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211104-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5009'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T13:59:01Z', 'nvd_published_at': '2021-10-14T20:15:00Z'} |
1.4.0 | GHSA-g92x-8m54-p89v | 2021-10-22T13:56:56Z | 2021-10-21T17:48:55Z | null | ['CVE-2021-3858'] | Cross-Site Request Forgery in snipe-it | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:45:53Z', 'nvd_published_at': '2021-10-19T13:15:00Z'} |
1.4.0 | GHSA-q799-q27x-vp7w | 2021-10-06T17:39:57Z | 2021-10-12T22:23:21Z | null | ['CVE-2019-5064'] | Out-of-bounds Write in OpenCV | An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0 (corresponds with OpenCV-Python version 4.1.2.30). A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5064'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15857'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/32'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/releases/tag/4.2.0'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}] | {'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:39:57Z', 'nvd_published_at': '2020-01-03T17:15:00Z'} |
1.4.0 | GHSA-g67g-hvc3-xmvf | 2021-10-14T18:50:58Z | 2021-10-14T21:19:23Z | null | ['CVE-2021-41132'] | Inconsistent input sanitisation leads to XSS vectors | ### Background
A variety of templates do not perform proper sanitization through HTML escaping.
Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of XSS possibilities with specially crafted input to a variety of fields.
### Impact
OMERO.web before 5.11.0 and OMERO.figure before 4.4.1.
### Patches
Users should upgrade OMERO.web to 5.11.0 or higher and OMERO.figure to 4.4.1 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ecosystem_specific': {'affected_functions': ['omeroweb.webclient.views.load_metadata_preview']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'omero-figure'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41132'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'}, {'type': 'PACKAGE', 'url': 'https://github.com/ome/omero-web'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2021-SV3/'}] | {'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-14T18:50:58Z', 'nvd_published_at': '2021-10-14T16:15:00Z'} |
1.4.0 | GHSA-qcgx-crrx-38v5 | 2021-10-20T19:22:21Z | 2021-10-13T18:54:09Z | null | ['CVE-2021-33609'] | Denial of service in DataCommunicator class in Vaadin 8 | Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.14.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-qcgx-crrx-38v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33609'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12415'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/framework'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33609'}] | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:39:24Z', 'nvd_published_at': '2021-10-13T11:15:00Z'} |
1.4.0 | GHSA-q324-q795-2q5p | 2021-10-11T18:40:44Z | 2021-10-12T16:05:11Z | null | [] | Path traversal when using `preview-docs` when working dir contains files with question mark `?` in name | ### Impact
`preview-docs` command allows path traversal if current working dir contains files with question mark `?` in name and attacker knows the name.
### Patches
It was patched starting from 1.0.0-beta.59
### Workarounds
Do not run openapi-cli preview-docs command in the folder which contains files with question mark `?` in name.
### References
https://github.com/Redocly/openapi-cli/pull/347
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [@redocly/openapi-cli](https://github.com/Redocly/openapi-cli)
* Email us at [security@redocly.com](mailto:security@redocly.com)
| [] | [{'package': {'ecosystem': 'npm', 'name': '@redocly/openapi-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-beta.59'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-beta.58'}}] | [{'type': 'WEB', 'url': 'https://github.com/Redocly/openapi-cli/security/advisories/GHSA-q324-q795-2q5p'}, {'type': 'WEB', 'url': 'https://github.com/Redocly/openapi-cli/pull/347'}, {'type': 'PACKAGE', 'url': 'https://github.com/Redocly/openapi-cli'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:40:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j28r-j54m-gpc4 | 2021-10-15T17:28:26Z | 2021-10-05T17:53:59Z | null | ['CVE-2021-22557'] | Code Injection in SLO Generator | SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'slo-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22557'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/pull/173'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/commit/36318beab1b85d14bb860e45bea186b184690d5d'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/releases/tag/v2.0.1'}, {'type': 'PACKAGE', 'url': '://github.com/google/slo-generator'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html'}] | {'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T16:01:42Z', 'nvd_published_at': '2021-10-04T10:15:00Z'} |
1.4.0 | GHSA-3r3g-g73x-g593 | 2022-06-01T21:25:06Z | 2021-10-12T16:06:47Z | null | ['CVE-2021-20319'] | coreos-installer improperly verifies GPG signature when decompressing gzipped artifact | ### Impact
coreos-installer fails to correctly verify GPG signatures when decompressing gzip-compressed artifacts. This allows bypass of signature verification in cases where coreos-installer decompresses a downloaded OS image, allowing an attacker who can modify the OS image to compromise a newly-installed system.
Default installations from ISO or PXE media in Fedora CoreOS, RHEL CoreOS, and RHEL for Edge are **not** affected, as coreos-installer installs from an OS image shipped as part of the install media.
These flows are affected:
1. Installing with `--image-file`, `--image-url`, or `coreos.inst.image_url`. For example, if a user has a local mirror of installation images, an attacker could replace an image with a gzip-compressed alternative (even if the file extension is `.xz`). The result:
```
$ coreos-installer install --image-url http://localhost:8080/image.xz /dev/loop0
Downloading image from http://localhost:8080/image.xz
Downloading signature from http://localhost:8080/image.xz.sig
> Read disk 749.9 MiB/749.9 MiB (100%)
gpg: Signature made Mon 20 Sep 2021 02:41:50 PM EDT
gpg: using RSA key 8C5BA6990BDB26E19F2A1A801161AE6945719A39
gpg: BAD signature from "Fedora (34) <fedora-34-primary@fedoraproject.org>" [ultimate]
Install complete.
```
Notice that GPG reports a bad signature, but coreos-installer continues anyway. Automation that relies on coreos-installer's exit status will not notice either.
2. `coreos-installer download --decompress --image-url`:
```
$ coreos-installer download --decompress --image-url http://localhost:8080/image.xz
> Read disk 749.9 MiB/749.9 MiB (100%)
gpg: Signature made Mon 20 Sep 2021 02:41:50 PM EDT
gpg: using RSA key 8C5BA6990BDB26E19F2A1A801161AE6945719A39
gpg: BAD signature from "Fedora (34) <fedora-34-primary@fedoraproject.org>" [ultimate]
./image
```
Again, coreos-installer reports success.
3. Installing with default parameters, when **not** installing from the image built into live ISO or PXE media, if the hosting service is compromised or if an active attacker gains control of the HTTPS response.
4. `coreos-installer download --decompress` if the hosting service is compromised or if an active attacker gains control of the HTTPS response.
### Patches
The vulnerability is [fixed](https://github.com/coreos/coreos-installer/pull/659) in coreos-installer 0.10.1.
### Workarounds
For `coreos-installer download`, do not use the `-d` or `--decompress` options.
For `coreos-installer install`, manually inspect the stderr output. If `BAD signature` appears, do not boot from the target disk. Note, however, that some OS services may have already accessed data on the compromised disk.
### References
For more information, see [PR 655](https://github.com/coreos/coreos-installer/pull/655).
### For more information
If you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'coreos-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/security/advisories/GHSA-3r3g-g73x-g593'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20319'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/pull/655'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2011862'}, {'type': 'PACKAGE', 'url': 'https://github.com/coreos/coreos-installer'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T21:17:04Z', 'nvd_published_at': '2022-03-04T18:15:00Z'} |
1.4.0 | GHSA-x3r5-q6mj-m485 | 2021-10-19T18:04:34Z | 2021-10-19T20:16:15Z | null | ['CVE-2021-41149'] | Improper sanitization of target names | ### Impact
The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system.
AWS would like to thank https://github.com/jku for reporting this issue.
### Patches
A fix is available in version 0.12.0.
### Workarounds
No workarounds to this issue are known.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tough'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41149'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/tough'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T18:04:34Z', 'nvd_published_at': '2021-10-19T18:15:00Z'} |
1.4.0 | GHSA-cq6w-w5rj-p9x8 | 2021-10-06T16:55:25Z | 2021-10-06T17:47:05Z | null | ['CVE-2021-30109'] | Cross-site Scripting in Froala Editor | Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30109'}, {'type': 'WEB', 'url': 'https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor-release'}, {'type': 'WEB', 'url': 'http://froala.com'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:55:25Z', 'nvd_published_at': '2021-04-05T13:15:00Z'} |
1.4.0 | GHSA-mpjm-v997-c4h4 | 2022-08-11T16:56:02Z | 2021-10-12T21:59:13Z | null | ['CVE-2021-39184'] | Electron's sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API | ### Impact
This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.
All current stable versions of Electron are affected.
### Patches
This was fixed with #30728, and the following Electron versions contain the fix:
- 15.0.0-alpha.10
- 14.0.0
- 13.3.0
- 12.1.0
- 11.5.0
### Workarounds
If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit.
Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event:
```js
delete require('electron').nativeImage.createThumbnailFromPath
```
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39184'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/30728'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}] | {'cwe_ids': ['CWE-668', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T18:54:44Z', 'nvd_published_at': '2021-10-12T19:15:00Z'} |
1.4.0 | GHSA-qh9q-34h6-hcv9 | 2021-10-18T20:15:47Z | 2021-10-12T18:48:24Z | null | ['CVE-2021-40978'] | Directory traversal in mkdocs | The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mkdocs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40978'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/issues/2601'}, {'type': 'WEB', 'url': 'https://github.com/nisdn/CVE-2021-40978/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/pull/2604'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/pull/2604/commits/cddc453c9d49298e60e7d56fb71130c151cbcbe5'}, {'type': 'PACKAGE', 'url': 'https://github.com/mkdocs/mkdocs'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/releases/tag/1.2.3'}, {'type': 'WEB', 'url': 'https://github.com/nisdn/CVE-2021-40978'}] | {'cwe_ids': ['CWE-12', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:41:01Z', 'nvd_published_at': '2021-10-07T14:15:00Z'} |
1.4.0 | GHSA-3r9x-mjrm-2725 | 2021-10-08T22:09:39Z | 2021-10-12T16:27:02Z | null | ['CVE-2020-28283'] | Prototype pollution vulnerability in 'libnested' | Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'libnested'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'last_affected': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28283'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/libnested'}, {'type': 'WEB', 'url': 'https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:09:39Z', 'nvd_published_at': '2020-12-29T18:15:00Z'} |
1.4.0 | GHSA-657m-v5vm-f6rw | 2021-11-01T21:06:16Z | 2021-10-05T20:23:47Z | null | ['CVE-2021-41113'] | Cross-Site-Request-Forgery in Backend | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2)
### Problem
It has been discovered that the new TYPO3 v11 feature that allows users to create and share [deep links in the backend user interface](https://typo3.org/article/typo3-version-112-escape-the-orbit#c12178) is vulnerable to cross-site-request-forgery.
The impact is the same as described in [TYPO3-CORE-SA-2020-006 (CVE-2020-11069)](https://typo3.org/security/advisory/typo3-core-sa-2020-006). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system.
To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time.
The following [Same-Site cookie settings](https://docs.typo3.org/c/typo3/cms-core/master/en-us/Changelog/8.7.x/Feature-90351-ConfigureTYPO3-shippedCookiesWithSameSiteFlag.html) in _$GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite]_ are required for an attack to be successful:
* _SameSite=_***strict***: malicious evil.**example.org** invoking TYPO3 application at good.**example.org**
* _SameSite=_***lax*** or ***none***: malicious **evil.com** invoking TYPO3 application at **example.org**
### Solution
Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 core & security team members Benni Mack and Oliver Hader who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-014](https://typo3.org/security/advisory/typo3-core-sa-2021-014)
* [CVE-2020-11069](https://nvd.nist.gov/vuln/detail/CVE-2020-11069) reintroduced in TYPO3 v11.2.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.2.0'}, {'fixed': '11.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41113'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-006'}] | {'cwe_ids': ['CWE-309', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:48:07Z', 'nvd_published_at': '2021-10-05T18:15:00Z'} |
1.4.0 | GHSA-pfj7-w373-gqch | 2021-10-29T13:49:08Z | 2021-10-28T23:14:21Z | null | ['CVE-2021-3900'] | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T21:13:22Z', 'nvd_published_at': '2021-10-27T18:15:00Z'} |
1.4.0 | GHSA-gxmc-5wj3-jx64 | 2021-10-05T16:02:20Z | 2021-10-04T20:13:25Z | null | ['CVE-2021-41467'] | Cross-site scripting in application/controllers/dropbox.php in JustWriting | Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'hjue/justwriting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41467'}, {'type': 'WEB', 'url': 'https://github.com/hjue/JustWriting/issues/106'}, {'type': 'PACKAGE', 'url': 'https://github.com/hjue/JustWriting'}, {'type': 'WEB', 'url': 'https://github.com/hjue/JustWriting/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T13:46:27Z', 'nvd_published_at': '2021-10-01T16:15:00Z'} |
1.4.0 | GHSA-2w3f-9w3q-qw77 | 2021-10-20T17:12:24Z | 2021-10-12T18:30:37Z | null | ['CVE-2021-23448'] | Prototype Pollution in config-handler | All versions of package config-handler are vulnerable to Prototype Pollution when loading config files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'config-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23448'}, {'type': 'WEB', 'url': 'https://github.com/jarradseers/config-handler/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarradseers/config-handler'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947'}] | {'cwe_ids': ['CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:01:08Z', 'nvd_published_at': '2021-10-11T21:15:00Z'} |
1.4.0 | GHSA-cx2r-mf6x-55rx | 2021-10-08T22:31:21Z | 2021-10-12T16:01:36Z | null | ['CVE-2020-5273'] | Stored XSS with custom URLs in PrestaShop module ps_linklist | ### Impact
Stored XSS when using custom URLs.
### Patches
The problem is fixed in 3.1.0
### References
[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_linklist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/ps_linklist'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:31:21Z', 'nvd_published_at': '2020-04-16T22:15:00Z'} |
1.4.0 | GHSA-wv83-jrfh-rp33 | 2021-10-21T14:56:27Z | 2021-10-18T19:44:32Z | null | ['CVE-2021-42227'] | Cross site scripting in kindeditor | Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'kindeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42227'}, {'type': 'WEB', 'url': 'https://github.com/kindsoft/kindeditor/issues/336'}, {'type': 'PACKAGE', 'url': 'https://github.com/kindsoft/kindeditor'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:38:42Z', 'nvd_published_at': '2021-10-14T17:15:00Z'} |
1.4.0 | GHSA-hxfw-jm98-v4mq | 2021-11-18T15:27:49Z | 2021-10-12T22:21:56Z | null | ['CVE-2019-15939'] | Divide By Zero in OpenCV. | An issue was discovered in OpenCV 4.1.0 (OpenCV-Python 4.1.0.25). There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15939'}, {'type': 'WEB', 'url': 'https://github.com/OpenCV/opencv/issues/15287'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/15382'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html'}] | {'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T20:35:29Z', 'nvd_published_at': '2019-09-05T16:15:00Z'} |
1.4.0 | GHSA-7m27-3587-83xf | 2021-10-20T15:06:01Z | 2021-10-21T17:46:27Z | null | ['CVE-2019-10170'] | Privilege Defined With Unsafe Actions in Keycloak | A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10170'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10170'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-267'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:06:01Z', 'nvd_published_at': '2020-05-08T14:15:00Z'} |
1.4.0 | GHSA-267x-w5hx-8hjr | 2021-11-18T15:30:14Z | 2021-10-12T22:02:45Z | null | ['CVE-2017-12864'] | Integer Overflow or Wraparound in OpenCV | In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding with OpenCV-Python version 3.3.0.9) and earlier. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12864'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9372'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:35:35Z', 'nvd_published_at': '2017-08-15T16:29:00Z'} |
1.4.0 | GHSA-p75j-wc34-527c | 2021-10-08T23:04:41Z | 2021-10-12T16:31:59Z | null | ['CVE-2019-10217'] | Exposure of Sensitive Information to an Unauthorized Actor in ansible | A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10217'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/56269'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/59427'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10217'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:04:41Z', 'nvd_published_at': '2019-11-25T16:15:00Z'} |
1.4.0 | GHSA-h4m5-qpfp-3mpv | 2021-10-27T17:06:39Z | 2021-10-21T17:49:59Z | null | ['CVE-2021-42771'] | Directory Traversal in Babel | Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'babel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42771'}, {'type': 'WEB', 'url': 'https://github.com/python-babel/babel/pull/782'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-babel/babel/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts/2021/10/msg00040.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5018'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2021-14'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T14:33:55Z', 'nvd_published_at': '2021-10-20T21:15:00Z'} |
1.4.0 | GHSA-m2jh-fxw4-gphm | 2021-10-05T18:47:01Z | 2021-10-05T20:23:35Z | null | ['CVE-2021-41114'] | HTTP Host Header Injection | ### Meta
* CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5)
### Problem
It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment.
This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability.
### Solution
Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
### Credits
Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015)
* [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-015'}] | {'cwe_ids': ['CWE-20', 'CWE-644'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:47:01Z', 'nvd_published_at': '2021-10-05T18:15:00Z'} |
1.4.0 | GHSA-r56q-vv3c-6g9c | 2021-10-19T18:06:09Z | 2021-10-19T20:16:26Z | null | ['CVE-2021-41150'] | Improper sanitization of delegated role names | ### Impact
The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system.
AWS would like to thank https://github.com/jku for reporting this issue.
### Patches
A fix is available in version 0.12.0.
### Workarounds
No workarounds to this issue are known.
### References
https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tough'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/awslabs/tough/security/advisories/GHSA-r56q-vv3c-6g9c'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41150'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/tough'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T18:06:09Z', 'nvd_published_at': '2021-10-19T20:15:00Z'} |
1.4.0 | GHSA-wqgp-vphw-hphf | 2021-10-08T22:24:29Z | 2021-10-12T16:01:12Z | null | ['CVE-2020-8897'] | Security issues in AWS KMS and AWS Encryption SDKs: in-band protocol negotiation and robustness | Authors: Thai "[thaidn](https://twitter.com/xorninja)" Duong
# Summary
The following security vulnerabilities was discovered and reported to Amazon, affecting AWS KMS and all versions of [AWS Encryption SDKs](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html) prior to version 2.0.0:
* **Information leakage**: an attacker can create ciphertexts that would leak the user’s AWS account ID, encryption context, user agent, and IP address upon decryption
* **Ciphertext forgery**: an attacker can create ciphertexts that are accepted by other users
* **Robustness**: an attacker can create ciphertexts that decrypt to different plaintexts for different users
The first two bugs are somewhat surprising because they show that the ciphertext format can lead to vulnerabilities. These bugs (and the infamous [alg: "None"](https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/) bugs in JWT) belong to a class of vulnerabilities called **in-band protocol negotiation**. This is the second time we’ve found in-band protocol negotiation vulnerabilities in AWS cryptography libraries; see this [bug](https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw) in S3 Crypto SDK discovered by my colleague Sophie Schmieg.
In JWT and S3 SDK the culprit is the algorithm field—here it is the key ID. Because the key ID is used to determine which decryption key to use, it can’t be meaningfully authenticated despite being under the attacker’s control. If the key ID is a URL indicating where to fetch the key, the attacker can replace it with their own URL, and learn side-channel information such as the timing and machines on which the decryption happens (this can also lead to [SSRF](https://portswigger.net/web-security/ssrf) issues, but that’s another topic for another day).
In AWS, the key ID is a unique [Amazon Resource Name](https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html). If an attacker were to capture a ciphertext from a user and replace its key ID with their own, the victim’s AWS account ID, encryption context, user agent, and IP address would be logged to the attacker’s AWS account whenever the victim attempted to decrypt the modified ciphertext.
The last bug shows that the non-committing property of AES-GCM (and other AEAD ciphers such as [AES-GCM-SIV](https://keymaterial.net/2020/09/07/invisible-salamanders-in-aes-gcm-siv/) or (X)ChaCha20Poly1305) is especially problematic in multi-recipient settings. These ciphers have a property that can cause nonidentical plaintexts when decrypting a single ciphertext with two different keys! For example, you can send a single encrypted email to Alice and Bob which, upon decryption, reads “attack” to Alice and “retreat” to Bob. The AWS Encryption SDKs are vulnerable to this attack because they allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. I believe this kind of problem is prevalent. I briefly looked at [JWE](https://tools.ietf.org/html/rfc7516) and I think it is vulnerable.
# Mitigations
Amazon has fixed these bugs in release 2.0.0 of the SDKs. A new major version was required because, unfortunately, the fix for the last bug requires a breaking change from earlier versions. All users are recommended to upgrade. More details about Amazon’s mitigations can be found in [their announcement](https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/).
We’re collaborating with Shay Gueron on a paper regarding fast committing AEADs.
# Vulnerabilities
## Information Leakage
The [Encrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Encrypt.html) API in AWS KMS encrypts plaintext into ciphertext by using a customer master key (CMK). The ciphertext format is undocumented, but it contains metadata that specifies the CMK and the encryption algorithm. I reverse-engineered the format and found the location of the CMK. Externally the CMK is identified by its key ARN, but within a ciphertext it is represented by an internal ID, which remained stable during my testing.
When I replaced the internal ID of a CMK in a ciphertext with the internal ID of another CMK, I found that AWS KMS attempted to decrypt the ciphertext with the new CMK. The encryption failed and the failure event—including the AWS Account ID, the user agent and the IP address of the caller—was logged to Cloud Trail in the account that owned the replacement CMK.
This enables the following attack:
* The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim.
* The attacker intercepts a ciphertext from the victim, and replaces its CMK with their CMK.
* Whenever the victim attempts to decrypt the modified ciphertext, the attacker learns the timing of such actions, the victim’s AWS Account ID, user agent, encryption context, and IP address.
This attack requires the victim to have an IAM policy that allows them to access the attacker’s CMK. I found that this practice was allowed by the AWS Visual Policy Editor, but I don’t know whether it is common.
The AWS Encryption SDKs also succumb to this attack. The SDKs implement envelope encryption: encrypting data with a data encryption key (DEK) and then wrapping the DEK with a CMK using the Encrypt API in AWS KMS. The wrapped DEK is stored as part of the final ciphertext (format is defined [here](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/message-format.html)). The attacker can mount this attack by replacing the CMK in the wrapped DEK with their own.
```
{
"eventVersion": "1.05",
"userIdentity": {
"type": "AWSAccount",
"principalId": "<redacted this is the principal ID of the victim>",
"accountId": "<redacted - this is the AWS account ID of the victim>"
},
"eventTime": "2020-06-21T21:05:04Z",
"eventSource": "kms.amazonaws.com",
"eventName": "Decrypt",
"awsRegion": "us-west-2",
"sourceIPAddress": "<redacted - this is the IP address of the victim>",
"userAgent": "<redacted - this is the user agent of the victim>",
"errorCode": "InvalidCiphertextException",
"requestParameters": {
// The encryption context might include other data from the victim
"encryptionContext": {
"aws-crypto-public-key": "AzfNOGOnNYFmpHspKrAm1L6XtRybONkmkhmB/IriKSA7b2NsV4MEPMph9yX2KTPKWw=="
},
"encryptionAlgorithm": "SYMMETRIC_DEFAULT"
},
"responseElements": null,
"requestID": "aeced8e8-75a2-42c3-96ac-d1fa2a1c5ee6",
"eventID": "780a0a6e-4ad8-43d4-a426-75d05022f870",
"readOnly": true,
"resources": [
{
"accountId": "<redacted - this is the account ID of the attacker>",
"type": "AWS::KMS::Key",
"ARN": <redacted - this is the key ARN of the attacker>
}
],
"eventType": "AwsApiCall",
"recipientAccountId": "<redacted - this is the account ID of the attacker>",
"sharedEventID": "033e147c-8a36-42f5-9d6c-9e071eb752b7"
}
```
**Figure 1: A failure event logged to the attacker’s Cloud Trail when the victim attempted to decrypt a modified ciphertext containing the attacker’s CMK.**
## Ciphertext Forgery
The [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) API in AWS KMS doesn’t require the caller to specify the CMK. This parameter is required only when the ciphertext was encrypted under an asymmetric CMK. Otherwise, AWS KMS uses the metadata that it adds to the ciphertext blob to determine which CMK was used to encrypt the ciphertext.
This leads to the following attack:
* The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim.
* The attacker generates a ciphertext by calling the Encrypt API with their key.
* The attacker intercepts a ciphertext from the victim, and replaces it entirely with their ciphertext.
* The victim successfully decrypts the ciphertext, as if it was encrypted under their own key. The attacker also learns when this happened, the victim’s AWS Account ID, user agent, encryption context, and IP address.
Similar to the information leakage attack, this attack also requires the victim to have an IAM policy that allows them to access the attacker’s CMK.
The AWS Encryption SDKs also succumb to this attack. They don’t specify the CMK when they call the Decrypt API to unwrap the DEK.
## Robustness
The AWS Encryption SDKs allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. To that end, it wraps the DEK multiple times, each under a different CMK. The wrapped DEKs can be combined to form a single ciphertext which can be sent to multiple recipients who can use their own credentials to decrypt it. It’s reasonable to expect that all recipients should decrypt the ciphertext to an identical plaintext. However, because of the use of AES-GMAC and AES-GCM, it’s possible to create a ciphertext that decrypts to two valid yet different plaintexts for two different users. In other words, the AWS Encryption SDKs are [not](https://eprint.iacr.org/2008/440.pdf) [robust](https://eprint.iacr.org/2019/016.pdf).
The encryption of a message under two CMKs can be summarized as follows:
* A DEK is randomly generated, and two wrapped DEKs are produced by calling the Encrypt API using the two CMKs
* A per-message AES-GCM key (K) is derived using HKDF from the DEK, a randomly generated message ID, and a fixed algorithm ID.
* A header is formed from the wrapped DEKs, the encryption context, and other metadata. A header authentication tag is computed on the header using AES-GMAC with K and a zero IV.
* The message is encrypted using AES-GCM with K, a non-zero IV, and fixed associated additional data. This produces a message authentication tag.
* The ciphertext consists of the header, the header authentication tag, the encrypted message, and the message authentication tag.
(There’s also a self-signed digital signature that is irrelevant to this discussion).
In order to decrypt a ciphertext, the AWS Encryption SDKs loops over the list of wrapped DEKs and returns the first one that it can successfully unwrap. The attacker therefore can wrap a unique DEK for each recipient. Next, the attacker exploits the non-committing property of GMAC to produce two messages that have the same GMAC tag under two different keys. The attacker has to do this twice, one for the header authentication tag and one for the message authentication tag.
```
Given a data blob B of one 128-bit block B_1, a GMAC tag is computed as follows:
B_1 * H^2 + B_len * H + J
where H and J depends on the key and B_len depends on the length of B.
To find a message that can produce the same tag under two different keys, one
can add append to B a new block B_2 whose value can be deduced by solving
an algebraic equation. That is, we want to find B_2 such that:
B_1 * H^3 + B_2 * H^2 + B_len * H + J = B_1 * H’^3 + B_2 * H’^2 + B_len * H’ + J’
where H’ and J’ are the corresponding H and J of the other key.
B_2 is the only unknown value in this equation, thus it can be computed using
finite field arithmetics of GF(2^128):
B_2 = [B_1 * (H^3+H’^3) + B_len * (H + H’) + J + J’] * (H^2 + H’^2)^-1.
```
**Figure 2: How to find a message that has the same GMAC tag under two different keys.**
The overall attack works as follows:
* The attacker generates a random DEK, derives a per-message key K, and encrypts message M with it using AES in counter mode. This generates a ciphertext C.
* The attacker generates another random DEK’, derives a per-message key K’, and performs trial decryption of C until the decrypted message M’ has desirable properties. For example, if the attacker wants the first bit of M’ different from that of M, this process should only take a few attempts.
* The attacker finds a block C* such that the GMAC of C’ = C || C* under K and K’ are identical. Denote this tag C’_tag.
* The attacker wraps DEK and DEK’ under two recipients’ CMK.
* The attacker forms a header H and adds a block H* to the encryption context such that the new H’ has the same authentication tag H’_tag under K and K’.
* The attacker output H’, H’_tag, C’, C’_tag.
This attack is similar to the one discovered in [Facebook Messenger](https://eprint.iacr.org/2019/016.pdf).
# Acknowledgement
I’m grateful to Jen Barnason for carefully editing this advisory. I will never publish anything without her approval! I want to thank my friend and coworker Sophie “Queen of Hashing” Schmieg for wonderful discussions and for showing me how the arithmetic in GF(2^128) works. I want to thank Jonathan Bannet for asking the questions that led to this work. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-encryption-sdk-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8897'}, {'type': 'WEB', 'url': 'https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/'}] | {'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:24:29Z', 'nvd_published_at': '2020-11-16T12:15:00Z'} |
1.4.0 | GHSA-vj62-g63v-f8mf | 2021-10-13T17:34:31Z | 2021-10-13T18:53:38Z | null | ['CVE-2021-41138'] | Validity check missing in Frontier | ### Impact
In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block.
The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors.
### Patches
The issue is patched in commit 146bb48849e5393004be5c88beefe76fdf009aba.
### References
Patch PR: https://github.com/paritytech/frontier/pull/495
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Frontier repo](https://github.com/paritytech/frontier/issues)
### Special thanks
Special thanks to @librelois, @nanocryk and the Moonbeam team for reporting and fixing this security vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-vj62-g63v-f8mf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41138'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/497'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/frontier'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:34:31Z', 'nvd_published_at': '2021-10-13T16:15:00Z'} |
1.4.0 | GHSA-cvhw-2593-5j2q | 2021-11-18T15:34:33Z | 2021-10-12T22:00:08Z | null | ['CVE-2016-1516'] | Double Free in OpenCV | OpenCV 3.0.0 has a double free issue that allows attackers to execute arbitrary code. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV-Python and and OpenCV-Contrib-Python 3.3.1.11). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1516'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/5956'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/1701.04739.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}] | {'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T18:44:07Z', 'nvd_published_at': '2017-04-10T03:59:00Z'} |
1.4.0 | GHSA-6cc6-66f5-mxjj | 2021-07-27T13:43:59Z | 2021-07-28T18:58:03Z | null | ['CVE-2020-0826'] | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0826'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0826'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T13:43:59Z', 'nvd_published_at': '2020-03-12T16:15:00Z'} |
1.4.0 | GHSA-g8jx-66p8-vcm2 | 2021-07-28T17:37:01Z | 2021-07-13T17:42:31Z | null | ['CVE-2021-23405'] | SQL injection in pimcore/pimcore | This affects the package pimcore/pimcore before 10.0.7. This issue exists due to the absence of check on the storeId parameter in the method collectionsActionGet and groupsActionGet method within the ClassificationstoreController class. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23405'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/9572'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T16:18:51Z', 'nvd_published_at': '2021-07-09T13:15:00Z'} |
1.4.0 | GHSA-jxhc-q857-3j6g | 2021-08-30T22:21:20Z | 2021-07-12T16:58:33Z | null | ['CVE-2021-32740'] | Regular Expression Denial of Service in Addressable templates | ### Impact
Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected.
### Patches
The vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0.
### Workarounds
The vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking.
### References
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
- https://cwe.mitre.org/data/definitions/1333.html
- https://www.regular-expressions.info/catastrophic.html
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/sporkmonger/addressable/issues)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'addressable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32740'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/92685096b1f7235ed8986c03ce30a24972eed848#diff-fb36d3dc67e6565ffde17e666a98697f48e76dac38fabf1bb9e97cdf3b583d76'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jxhc-q857-3j6g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/addressable/CVE-2021-32740.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sporkmonger/addressable'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDFQM2NHNAZ3NNUQZEJTYECYZYXV4UDS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYPVOOQU7UB277UUERJMCNQLRCXRCIQ5/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T15:25:32Z', 'nvd_published_at': '2021-07-06T15:15:00Z'} |
1.4.0 | GHSA-f3pg-qwvg-p99c | 2021-09-07T21:49:21Z | 2021-07-12T16:54:20Z | null | ['CVE-2021-32715'] | Lenient Parsing of Content-Length Header When Prefixed with Plus Sign | ### Summary
hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in "request smuggling" or "desync attacks".
### Vulnerability
The flaw exists in all prior versions of hyper, if built with [`rustc` v1.5.0 or newer](https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739).
Example:
```
GET / HTTP/1.1
Host: example.com
Content-Length: +3
abc
```
This request gets accepted and hyper reads the body as abc. The request _should_ be rejected, according to RFC 7230, since the ABNF for `Content-Length` only allows for `DIGIT`s. This is due to using the `FromStr` implementation for `u64` in the standard library. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause "desync attacks".
In this particular case, an upstream proxy would need to error when parsing the `Content-Length`, but _not_ reject the request (swallowing its own error), and forwarding the request as-is with the `Content-Length` still included. _Then_ the upstream proxy and hyper would disagree on the length of the request body. The combination of these factors would be extremely rare.
Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
### Impact
To determine if vulnerable, all these things must be true:
- **Using hyper as an HTTP server**. While the lenient decoder also exists in the client, a vulnerability does not exist around _responses_.
- **Using HTTP/1**. The HTTP/2 code uses a stricter parser.
- **Using a vulnerable HTTP proxy upstream to hyper**. If an upstream proxy correctly rejects the illegal `Content-Length` header, *OR* can parse the length with the plus sign, the desync attack cannot succeed.
### Patches
We have released the following patch versions:
- v0.14.10 (to be released when this advisor is published)
### Workarounds
Besides upgrading hyper, you can take the following options:
- Reject requests manually that contain a plus sign prefix in the `Content-Length` header.
- Ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix.
### Credits
This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/commit/1fb719e0b61a4f3d911562a436a2ff05fd7cb759'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html'}] | {'cwe_ids': ['CWE-444'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-07T20:08:46Z', 'nvd_published_at': '2021-07-07T20:15:00Z'} |
1.4.0 | GHSA-2qgv-2cv4-g4cg | 2021-07-27T14:12:10Z | 2021-07-28T18:57:27Z | null | ['CVE-2020-0832'] | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0832'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0832'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:12:10Z', 'nvd_published_at': '2020-03-12T16:15:00Z'} |
1.4.0 | GHSA-3x9f-74h4-2fqr | 2022-02-08T21:02:16Z | 2021-07-22T19:48:17Z | null | ['CVE-2021-32012'] | Denial of Service in SheetJS Pro | SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32012'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:44:38Z', 'nvd_published_at': '2021-07-19T14:15:00Z'} |
1.4.0 | GHSA-r9w6-rhh9-7v53 | 2021-07-27T15:08:01Z | 2021-07-28T17:57:57Z | null | ['CVE-2020-7955'] | Incorrect Authorization in HashiCorp Consul | HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'fixed': '1.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7955'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/7160'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul/'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:08:01Z', 'nvd_published_at': '2020-01-31T13:15:00Z'} |
1.4.0 | GHSA-7638-r9r3-rmjj | 2023-08-29T18:32:51Z | 2021-07-19T15:19:09Z | null | ['CVE-2021-3602'] | Buildah processes using chroot isolation may leak environment values to intermediate processes | ### Impact
When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original `buildah` process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN instructions or during `buildah run`. The commands that `buildah` is instructed to run can read that information if they choose to.
### Patches
Users should upgrade packages, or images which contain packages, to include version 1.21.3 or later.
### Workarounds
As a workaround, invoking `buildah` in a container under `env -i` to have it started with a reinitialized environment should prevent the leakage.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [buildah](https://github.com/containers/buildah/issues)
* Email us at [the buildah general mailing list](mailto:buildah@lists.buildah.io), or [the podman security mailing list](mailto:security@lists.podman.io) if it's sensitive. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17.0'}, {'fixed': '1.17.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.17.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.19.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.19.8'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.21.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1969264'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/buildah'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0345'}, {'type': 'WEB', 'url': 'https://ubuntu.com/security/CVE-2021-3602'}] | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:26:57Z', 'nvd_published_at': '2022-03-03T19:15:00Z'} |
1.4.0 | GHSA-qc36-q22q-cjw3 | 2021-08-18T18:52:26Z | 2021-07-12T17:03:27Z | null | ['CVE-2021-38189'] | SMTP command injection in lettre | ### Impact
Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP commands after it.
### Fix
The flaw is fixed by correctly handling consecutive CRLF sequences.
### References
* [RUSTSEC-2021-0069](https://rustsec.org/advisories/RUSTSEC-2021-0069.html)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'lettre'}, 'ecosystem_specific': {'affected_functions': ['lettre::smtp::SmtpTransport::send', 'lettre::transport::smtp::SmtpTransport::send', 'lettre::transport::smtp::SmtpTransport::send_raw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.9.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/lettre/lettre/security/advisories/GHSA-qc36-q22q-cjw3'}, {'type': 'WEB', 'url': 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'}, {'type': 'WEB', 'url': 'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/lettre/lettre'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0069.html'}] | {'cwe_ids': ['CWE-147'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:41:39Z', 'nvd_published_at': '2021-08-08T06:15:00Z'} |
1.4.0 | GHSA-j89m-gcjf-6ghp | 2021-07-27T14:28:19Z | 2021-07-28T18:57:02Z | null | ['CVE-2020-0825'] | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0825'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0825'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:28:19Z', 'nvd_published_at': '2020-03-12T16:15:00Z'} |
1.4.0 | GHSA-rgcg-28xm-8mmw | 2021-07-22T19:37:32Z | 2021-07-22T19:37:41Z | null | ['CVE-2021-32669'] | Cross-Site Scripting in Backend Grid View | ### Problem
Failing to properly encode settings for _backend layouts_, the corresponding grid view is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
### Credits
Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.41'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-rgcg-28xm-8mmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32669'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-011'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:43:42Z', 'nvd_published_at': '2021-07-20T16:15:00Z'} |
1.4.0 | GHSA-w9jg-gvgr-354m | 2022-03-30T21:15:14Z | 2021-07-02T18:33:34Z | null | ['CVE-2021-22119'] | Resource Exhaustion in Spring Security | Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22119'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security/pull/9513'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22119'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-400', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:30:10Z', 'nvd_published_at': '2021-06-29T17:15:00Z'} |
1.4.0 | GHSA-g973-978j-2c3p | 2022-02-08T21:02:26Z | 2021-07-22T19:47:15Z | null | ['CVE-2021-32014'] | Denial of Service in SheetJS Pro | SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32014'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-345', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:44:42Z', 'nvd_published_at': '2021-07-19T14:15:00Z'} |
1.4.0 | GHSA-h8jc-jmrf-9h8f | 2023-09-25T17:30:03Z | 2021-07-26T21:19:27Z | null | ['CVE-2020-8828'] | Argo CD Insecure default administrative password | In Argo CD versions 1.8.0 and prior, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
#### Workaround:
The recommended mitigation as described in the user documentation is to use SSO integration. The default admin password should only be used for initial configuration and then [disabled](https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#disable-admin-user) or at least changed to a more secure password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8828'}, {'type': 'WEB', 'url': 'https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8828-insecure-default-administrative-password'}, {'type': 'WEB', 'url': 'https://argoproj.github.io/argo-cd/security_considerations/'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/blob/129cf5370f9e2c6f99c9a5515099250a7ba42099/docs/security_considerations.md#cve-2020-8828---insecure-default-administrative-password'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo/releases'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}] | {'cwe_ids': ['CWE-1188', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:14:45Z', 'nvd_published_at': '2020-04-08T20:15:00Z'} |