schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 8
154
| details
stringlengths 31
19.1k
| severity
stringlengths 2
92
| affected
stringlengths 75
28.5k
| references
stringlengths 79
7.48k
| database_specific
stringlengths 131
196
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-77hf-23pq-2g7c | 2022-11-03T22:19:38Z | 2022-06-16T00:00:26Z | null | ['CVE-2022-33140'] | Code injection in Apache NiFi and NiFi Registry | The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi.registry:nifi-registry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '1.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.16.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33140'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2022-33140'}] | {'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:49:10Z', 'nvd_published_at': '2022-06-15T15:15:00Z'} |
1.4.0 | GHSA-54px-mhwv-5v8x | 2022-06-17T00:55:34Z | 2022-06-11T00:00:17Z | null | ['CVE-2022-24429'] | Code injection via SVG file in convert-svg-core | The package convert-svg-core before 0.6.3 are vulnerable to Arbitrary Code Injection when using a specially crafted SVG file. An attacker can read arbitrary files from the file system and then show the file content as a converted PNG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24429'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/commit/a43dffaab0f1e419d5be84e2e7356b86ffac3cf1'}, {'type': 'PACKAGE', 'url': 'https://github.com/neocotic/convert-svg'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859212'}] | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:55:34Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-73pr-g6jj-5hc9 | 2022-07-08T17:05:08Z | 2022-06-29T00:00:27Z | null | ['CVE-2021-3779'] | Externally Controlled Reference to a Resource in Another Sphere in ruby-mysql | A malicious actor can read arbitrary files from a client that uses ruby-mysql to communicate to a rogue MySQL server and issue database queries. In these cases, the server has the option to create a database reply using the LOAD DATA LOCAL statement, which instructs the client to provide additional data from a local file readable by the client (and not a "local" file on the server). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3779'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-mysql/CVE-2021-3779.yml'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2022/06/28/cve-2021-3779-ruby-mysql-gem-client-file-read-fixed/'}, {'type': 'PACKAGE', 'url': 'http://github.com/tmtm/ruby-mysql'}] | {'cwe_ids': ['CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:08:34Z', 'nvd_published_at': '2022-06-28T17:15:00Z'} |
1.4.0 | GHSA-38j3-6fm8-pfgc | 2022-06-23T21:25:08Z | 2022-06-15T00:00:24Z | null | ['CVE-2021-40660'] | Regular expression denial of service in Delight Nashorn Sandbox | An issue was discovered in Delight Nashorn Sandbox. There is an ReDoS vulnerability that can be exploited to launching a denial of service (DoS) attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.javadelight:delight-nashorn-sandbox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40660'}, {'type': 'WEB', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox/issues/117'}, {'type': 'WEB', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox/commit/9c8c3f3afca35e4dd176c959e1c2c5514c9d3131'}, {'type': 'PACKAGE', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:14:44Z', 'nvd_published_at': '2022-06-14T14:15:00Z'} |
1.4.0 | GHSA-49j4-v37g-5gg2 | 2022-07-05T22:59:36Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34204'] | Missing Authorization in Jenkins EasyQA Plugin | A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:36Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-958j-443g-7mm7 | 2022-06-02T20:50:21Z | 2022-06-02T20:50:21Z | null | ['CVE-2022-1884'] | OS Command Injection in gogs | ### Impact
The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All Windows installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.
### Patches
Repository file uploads are prohibited to its `.git` directory. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
### Workarounds
[Disable repository files upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L128-L129).
### References
https://www.huntr.dev/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b/
### For more information
If you have any questions or comments about this advisory, please post on #6968.
| [] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-958j-443g-7mm7'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6968'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6970'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/releases/tag/v0.12.8'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b/'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:50:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q8v3-7h6q-g39q | 2022-12-05T21:44:51Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34205'] | Cross-Site Request Forgery in Jenkins Jianliao Notification Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers to send HTTP POST requests to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jianliao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jianliao-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:36Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-v78m-2q7v-fjqp | 2022-07-12T21:59:11Z | 2022-06-22T17:52:51Z | null | ['CVE-2022-31099'] | Uncontrolled Recursion in rulex | ### Impact
When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately.
This is a security concern for you, if
- your service parses untrusted rulex expressions (expressions provided by an untrusted user), and
- your service becomes unavailable when the process running rulex aborts due to a stack overflow.
### Patches
The crash is fixed in version **0.4.3**. Affected users are advised to update to this version.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [rulex](https://github.com/rulex-rs/rulex/issues)
* Email me at [ludwig.stecher@gmx.de](mailto:ludwig.stecher@gmx.de)
### Credits
Credit for finding these bugs goes to
- [evanrichter](https://github.com/evanrichter)
- [ForAllSecure Mayhem](https://forallsecure.com/)
- [cargo fuzz](https://github.com/rust-fuzz/cargo-fuzz) and [afl.rs](https://github.com/rust-fuzz/afl.rs) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rulex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/security/advisories/GHSA-v78m-2q7v-fjqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31099'}, {'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/commit/60aa2dc03a22d69c8800fec81f99c96958a11363'}, {'type': 'PACKAGE', 'url': 'https://github.com/rulex-rs/rulex'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0030.html'}] | {'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:52:51Z', 'nvd_published_at': '2022-06-27T23:15:00Z'} |
1.4.0 | GHSA-374w-gwqr-fmxg | 2022-07-21T15:23:45Z | 2022-06-17T21:46:14Z | null | ['CVE-2022-33154'] | brotkrueml/schema fails to properly encode user input for output in HTML context, leading to XSS | The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/schema'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/schema'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33154'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/brotkrueml/schema/CVE-2022-33154.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/brotkrueml/schema'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-012'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:14Z', 'nvd_published_at': '2022-07-12T22:15:00Z'} |
1.4.0 | GHSA-72r2-rg28-47v9 | 2023-06-13T16:28:21Z | 2022-06-16T23:44:51Z | null | [] | `read` on uninitialized buffer may cause UB (bite::read::BiteReadExpandedExt::read_framed_max) | Affected versions of this crate calls a user provided `Read` implementation on an uninitialized buffer. `Read` on uninitialized buffer is defined as undefined behavior in Rust.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'bite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hinaria/bite/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinaria/bite'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0153.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:44:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7v4j-8wvr-v55r | 2022-06-20T18:24:00Z | 2022-06-16T23:40:38Z | null | [] | `array!` macro is unsound when its length is impure constant | Affected versions of this crate did substitute the array length provided by an user at compile-time multiple times.
When an impure constant expression is passed as an array length (such as a result of an impure procedural macro), this can result in the initialization of an array with uninitialized types, which in turn can allow an attacker to execute arbitrary code.
The flaw was corrected in commit [d5b63f72](https://github.com/xfix/array-macro/commit/d5b63f72090f3809c21ac28f9cfd84f12559bf7d) by making sure that array length is substituted just once.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'array-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xfix/array-macro/commit/d5b63f72090f3809c21ac28f9cfd84f12559bf7d'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/array-macro/RUSTSEC-2022-0017.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/array-macro'}, {'type': 'WEB', 'url': 'https://gitlab.com/KonradBorowski/array-macro/-/issues/5'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0017.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-88r9-hfj2-54hv | 2022-12-05T21:56:13Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34198'] | Cross-site Scripting in Jenkins Stash Branch Parameter Plugin | Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier does not escape the name and description of Stash Branch parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:StashBranchParameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34198'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/stash-branch-parameters-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:44Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-pmcv-mgcf-rvxg | 2022-06-16T23:51:32Z | 2022-06-16T23:51:32Z | null | [] | Non-aligned u32 read in Chacha20 encryption and decryption | The implementation does not enforce alignment requirements on input slices while incorrectly assuming 4-byte alignment through an unsafe call to `std::slice::from_raw_parts_mut`, which breaks the contract and introduces undefined behavior.
This affects Chacha20 encryption and decryption in crypto2.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'crypto2'}, 'ecosystem_specific': {'affected_functions': ['crypto2::streamcipher::Chacha20::decrypt_slice', 'crypto2::streamcipher::Chacha20::encrypt_slice', 'crypto2::streamcipher::xor_si512_inplace']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shadowsocks/crypto2/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/shadowsocks/crypto2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0121.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:51:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5hfm-g799-wjw6 | 2022-06-29T22:42:13Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20058'] | Cross site scripting in Elefant CMS | A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20058'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97255'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:13Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-xwj7-29j7-rw76 | 2022-06-29T22:42:02Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20057'] | Cross site scripting in Elefant CMS | A vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20057'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97254'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:02Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-7v28-g2pq-ggg8 | 2022-08-10T22:15:39Z | 2022-06-17T01:16:03Z | null | [] | Ghost vulnerable to remote code execution in locale setting change | ### Impact
A [vulnerability](https://www.cve.org/CVERecord?id=CVE-2022-24785) in an upstream library means an authenticated attacker can abuse locale input to execute arbitrary commands from a file that has previously been uploaded using the file upload functionality in the post editor.
### Patches
Fixed in 5.2.3, all 5.x sites should update as soon as possible.
Fixed in 4.48.2, all 4.x sites should update as soon as possible.
### Workarounds
Patched versions of Ghost add validation to the locale input to prevent execution of arbitrary files. Updating Ghost is the quickest complete solution.
As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /ghost/api/admin/settings/` endpoint, which will also disable updating settings for your site.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@ghost.org](mailto:security@ghost.org)
### Credits
* devx00 - https://twitter.com/devx00 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.48.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-7v28-g2pq-ggg8'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:16:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cxcc-q839-2cw9 | 2023-06-13T17:06:58Z | 2022-06-16T23:48:53Z | null | [] | columnar: `Read` on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec()) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation (`ColumnarReadExt::read_typed_vec()`).
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'columnar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/frankmcsherry/columnar/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/frankmcsherry/columnar'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0087.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:48:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-52vj-mr2j-f8jh | 2022-06-03T22:20:22Z | 2022-06-03T00:00:58Z | null | ['CVE-2020-28246'] | Server-Side Template Injection in formio | A Server-Side Template Injection (SSTI) was discovered in Form.io 2.0.0. This leads to Remote Code Execution during deletion of the default Email template URL. | [] | [{'package': {'ecosystem': 'npm', 'name': 'formio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28246'}, {'type': 'WEB', 'url': 'https://github.com/formio/enterprise-release/blob/master/API-Server-Change-Log.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/formio/formio'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:20:22Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-f67m-9j94-qv9j | 2022-06-16T23:59:29Z | 2022-06-16T23:59:29Z | null | [] | Parser creates invalid uninitialized value | Affected versions of this crate called `mem::uninitialized()` in the HTTP1 parser to create values of type `httparse::Header` (from the `httparse` crate).
This is unsound, since `Header` contains references and thus must be non-null.
The flaw was corrected by avoiding the use of `mem::uninitialized()`, using `MaybeUninit` instead.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/pull/2545'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0022.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:59:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qx2j-85q5-ffp8 | 2022-07-07T17:14:28Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34296'] | Query predicate bypass in Zalando Skipper | In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/zalando/skipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.218'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34296'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/pull/2028'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/commit/998a658ce5a68a336a98f4e63e4371e200860dfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/zalando/skipper'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/releases/tag/v0.13.218'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:27Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-pgw7-wx7w-2w33 | 2022-07-29T18:13:25Z | 2022-06-17T01:02:29Z | null | ['CVE-2022-32210'] | ProxyAgent vulnerable to MITM | ### Description
`Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server.
### Impact
This affects all use of HTTPS via HTTP proxy using **`Undici.ProxyAgent`** with Undici or Node's global `fetch`. In this case, it removes all HTTPS security from all requests sent using Undici's `ProxyAgent`, allowing trivial MitM attacks by anybody on the network path between the client and the target server (local network users, your ISP, the proxy, the target server's ISP, etc).
This less seriously affects HTTPS via HTTPS proxies. When you send HTTPS via a proxy to a remote server, the proxy can freely view or modify all HTTPS traffic unexpectedly (but only the proxy).
### Patches
This issue was patched in Undici v5.5.1.
### Workarounds
At the time of writing, the only workaround is to not use `ProxyAgent` as a dispatcher for TLS Connections. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.2'}, {'fixed': '5.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-pgw7-wx7w-2w33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32210'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1583680'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:02:29Z', 'nvd_published_at': '2022-07-14T15:15:00Z'} |
1.4.0 | GHSA-pf6p-25r2-fx45 | 2022-08-12T21:03:44Z | 2022-06-29T00:00:27Z | null | ['CVE-2022-0085'] | Server-Side Request Forgery in dompdf/dompdf | Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0085'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/bb1ef65011a14730b7cfbe73506b4bb8a03704bd'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2022-0085.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/73dbcc78-5ba9-492f-9133-13bbc9f31236'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:12:46Z', 'nvd_published_at': '2022-06-28T15:15:00Z'} |
1.4.0 | GHSA-xwx5-5c9g-x68x | 2022-06-10T19:53:55Z | 2022-06-10T19:53:55Z | null | ['CVE-2022-31045'] | Ill-formed headers may lead to unexpected behavior in Istio | ### Impact
Ill-formed headers sent to Envoy in certain configurations can lead to unexpected memory access resulting in undefined behavior or crashing.
You are at most risk if you have an Istio ingress Gateway exposed to external traffic.
### Patches
1.12.8, 1.13.5, 1.14.1
### Workarounds
No.
### References
More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2022-05)
### For more information
If you have any questions or comments about this advisory, please email us at [istio-security-vulnerability-reports@googlegroups.com](mailto:istio-security-vulnerability-reports@googlegroups.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31045'}, {'type': 'PACKAGE', 'url': 'https://github.com/istio/istio'}, {'type': 'WEB', 'url': 'https://istio.io/latest/news/security/istio-security-2022-05'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:55Z', 'nvd_published_at': '2022-06-09T21:15:00Z'} |
1.4.0 | GHSA-hmx9-jm3v-33hv | 2023-06-13T17:07:52Z | 2022-06-16T23:46:08Z | null | [] | InputStream::read_exact : `Read` on uninitialized buffer causes UB | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'buffoon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/carllerche/buffoon/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/carllerche/buffoon'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0154.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:46:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wjh9-344g-vc49 | 2022-06-15T18:57:13Z | 2022-06-09T00:00:24Z | null | ['CVE-2022-1997'] | Cross-site Scripting in RosarioSIS | Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1997'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/6b22c0b5b40fad891c8cf9e7eeff3e42a35c0bf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/28861ae9-7b09-45b7-a003-eccf903db71d'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:39Z', 'nvd_published_at': '2022-06-08T14:15:00Z'} |
1.4.0 | GHSA-hgm9-pww2-93pc | 2022-06-29T22:42:30Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20061'] | Cross site scripting in Elefant CMS | A vulnerability has been found in Elefant CMS 1.3.12-RC and classified as problematic. This vulnerability affects unknown code of the file /admin/extended. The manipulation of the argument name with the input %3Cimg%20src=no%20onerror=alert(1)%3E leads to basic cross site scripting (Reflected). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20061'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97258'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:30Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-5q86-62xr-3r57 | 2022-06-29T21:49:09Z | 2022-06-17T01:02:56Z | null | ['CVE-2022-31054'] | Uses of deprecated API can be used to cause DoS in user-facing endpoints | ### Impact
Several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service.
Eventsources susceptible to an out-of-memory denial-of-service attack:
- AWS SNS
- Bitbucket
- Bitbucket
- Gitlab
- Slack
- Storagegrid
- Webhook
### Patches
A patch for this vulnerability has been released in the following Argo Events version:
v1.7.1
### Credits
Disclosed by [Ada Logics](https://adalogics.com/) in a security audit sponsored by CNCF and facilitated by OSTIF.
### For more information
Open an issue in the [Argo Events issue tracker](https://github.com/argoproj/argo-events/issues) or [discussions](https://github.com/argoproj/argo-events/discussions)
Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-events | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-events'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31054'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/issues/1946'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/pull/1966'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/commit/eaabcb6d65022fc34a0cc9ea7f00681abd326b35'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-events'}] | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:02:56Z', 'nvd_published_at': '2022-06-13T20:15:00Z'} |
1.4.0 | GHSA-9hpw-r23r-xgm5 | 2022-06-17T00:25:46Z | 2022-06-17T00:25:46Z | null | [] | Data race in `Iter` and `IterMut` | In the affected version of this crate, `{Iter, IterMut}::next` used a weaker memory ordering when loading values than what was required, exposing a potential data race
when iterating over a `ThreadLocal`'s values.
Crates using `Iter::next`, or `IterMut::next` are affected by this issue.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'thread_local'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Amanieu/thread_local-rs/issues/33'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/thread_local-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0006.html'}] | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:25:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rcxc-3w2m-mp8h | 2022-06-22T21:22:42Z | 2022-06-22T21:22:42Z | null | ['CVE-2022-31604'] | Unsafe deserialisation in the PKI implementation scheme of NVFlare | ### Impact
NVFLARE contains a vulnerability in its PKI implementation module, where The CA credentials are transported via pickle and no safe deserialization. The deserialization of Untrusted Data may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
All versions before 2.1.2 are affected.
CVSS Score = 9.8
[AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln-metrics%2Fcvss%2Fv3-calculator%3Fvector%3DAV%3AN%2FAC%3AL%2FPR%3AN%2FUI%3AN%2FS%3AU%2FC%3AH%2FI%3AH%2FA%3AH&data=05%7C01%7Cchesterc%40nvidia.com%7Ce9600bde16854b0b380008da4fc544f7%7C43083d15727340c1b7db39efd9ccc17a%7C0%7C0%7C637910005925574215%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5kBrXEmAbqp8R31JCH%2FG95MUly72UPVihnBwiRFmvBY%3D&reserved=0)
### Patches
The patch will be included in nvflare==2.1.2
### Workarounds
Replace pickle serialization with JSON and change the code accordingly
Additional information
Issue Found by: Oliver Sellwood (@Nintorac)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.lighter.impl.cert.CertBuilder.initialize', 'nvflare.lighter.impl.cert.CertBuilder._build_write_cert_pair', 'nvflare.lighter.impl.cert.CertBuilder.finalize']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-rcxc-3w2m-mp8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31604'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/fd018eea9dff925a765079a94c2f017920fcda67'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NVFlare'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/nvflare/PYSEC-2022-231.yaml'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T21:22:42Z', 'nvd_published_at': '2022-07-01T18:15:00Z'} |
1.4.0 | GHSA-77mv-4rg7-r8qv | 2022-06-17T21:43:45Z | 2022-06-17T21:43:45Z | null | ['CVE-2022-31070'] | Potential Sensitive Cookie Exposure in NPM Packages @finastra/nestjs-proxy, @ffdc/nestjs-proxy | The nestjs-proxy library did not have a way to block sensitive cookies (e.g. session cookies) from being forwarded to backend services configured by the application developer. This could have led to sensitive cookies being inadvertently exposed to such services that should not see them.
The patched version now blocks cookies from being forwarded by default. However developers can configure an allow-list of cookie names by using the `allowedCookies` config setting. Further details of this feature can be found in the library's README on [Github](https://github.com/Finastra/finastra-nodejs-libs/tree/develop/libs/proxy) or [NPM](https://www.npmjs.com/package/@finastra/nestjs-proxy).
### Patches
- This issue has been fixed in version 0.7.0 of `@finastra/nestjs-proxy`.
- Users of `@ffdc/nestjs-proxy` are advised that this package has been deprecated and is no longer being maintained or receiving updates. Please update your package.json file to use `@finastra/nestjs-proxy` instead.
### References
- https://github.com/Finastra/finastra-nodejs-libs/pull/232
- https://github.com/Finastra/finastra-nodejs-libs/blob/master/libs/proxy/README.md
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@finastra/nestjs-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/security/advisories/GHSA-77mv-4rg7-r8qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31070'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/pull/232'}, {'type': 'PACKAGE', 'url': 'https://github.com/Finastra/finastra-nodejs-libs'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:43:45Z', 'nvd_published_at': '2022-06-15T19:15:00Z'} |
1.4.0 | GHSA-jpp7-7chh-cf67 | 2022-07-07T17:16:00Z | 2022-06-28T00:01:01Z | null | ['CVE-2022-2218'] | Cross site scripting in parse-url | Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url prior to 7.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2218'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-url'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/024912d3-f103-4daf-a1d0-567f4d9f2bf5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:51Z', 'nvd_published_at': '2022-06-27T13:15:00Z'} |
1.4.0 | GHSA-5gc4-cx9x-9c43 | 2022-06-20T22:01:28Z | 2022-06-09T00:00:29Z | null | ['CVE-2022-21122'] | Code Injection in metacalc | The package metacalc before 0.0.2 is vulnerable to Arbitrary Code Execution when it exposes JavaScript's Math class to the v8 context. As the Math class is exposed to user-land, it can be used to get access to JavaScript's Function constructor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'metacalc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21122'}, {'type': 'WEB', 'url': 'https://github.com/metarhia/metacalc/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/metarhia/metacalc/commit/625c23d63eabfa16fc815f5832b147b08d2144bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/metarhia/metacalc'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-METACALC-2826197'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:50Z', 'nvd_published_at': '2022-06-08T09:15:00Z'} |
1.4.0 | GHSA-28p5-7rg4-8v99 | 2023-06-13T17:33:19Z | 2022-06-16T23:59:12Z | null | [] | Reading on uninitialized buffer may cause UB ( `gfx_auxil::read_spirv()` ) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'gfx-auxil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gfx-rs/gfx/issues/3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/gfx-rs/gfx'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0091.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:59:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhqp-vf4w-rpwq | 2022-06-21T22:51:05Z | 2022-06-21T22:51:05Z | null | ['CVE-2022-31016'] | DoS through large manifest files in Argo CD | ### Impact
All versions of Argo CD starting with v0.7.0 are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the [repo-server](https://argo-cd.readthedocs.io/en/stable/operator-manual/architecture/#repository-server) service. The repo-server is a critical component of Argo CD, so crashing the repo-server effectively denies core Argo CD services (such as syncing Application updates).
To achieve denial of service, the attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.4.1
* v2.3.5
* v2.2.10
* v2.1.16
**The patch introduces a new `reposerver.max.combined.directory.manifests.size` config parameter, which you should tune before upgrading in production.** It caps the maximum total file size of .yaml/.yml/.json files in directory-type (raw manifest) Applications. The default max is `10M` per Application. This max is designed to keep any single app from consuming more than 3G of memory in the repo-server (manifests consume more space in memory than on disk). The 300x ratio assumes a maliciously-crafted manifest file. If you only want to protect against accidental excessive memory use, it is probably safe to use a smaller ratio.
If your organization uses directory-type Applications with very many manifests or very large manifests then **check the size of those manifests and tune the config parameter before deploying this change to production**. When testing, make sure to do a "hard refresh" in either the CLI or UI to test your directory-type App. That will make sure you're using the new max logic instead of relying on cached manifest responses from Redis.
### Workarounds
There is no workaround besides upgrading.
To mitigate the issue, carefully limit 1) who can configure repos (determined by [RBAC](https://argo-cd.readthedocs.io/en/stable/getting_started/)), 2) which repos are allowed (determined by [Project](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/) limitations), and 3) who has push access to those repos (determined by your SCM provider configuration).
### Credits
Disclosed by ADA Logics in a security audit of the Argo project sponsored by CNCF and facilitated by OSTIF. Thanks to Adam Korczynski and David Korczynski for their work on the audit.
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}], 'versions': ['2.4.0']}] | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhqp-vf4w-rpwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31016'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T22:51:05Z', 'nvd_published_at': '2022-06-25T08:15:00Z'} |
1.4.0 | GHSA-3r95-23jp-mhvg | 2022-06-24T19:55:29Z | 2022-06-17T20:55:48Z | null | ['CVE-2022-31048'] | Cross-Site Scripting in TYPO3's Form Framework | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.
### Credits
Thanks to Gabe Troyan who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2022-003](https://typo3.org/security/advisory/typo3-core-sa-2022-003) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.47'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-3r95-23jp-mhvg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31048'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/6f2554dc4ea0b670fd5599c54fd788d4db96c4a0'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-31048.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31048.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-003'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:55:48Z', 'nvd_published_at': '2022-06-14T21:15:00Z'} |
1.4.0 | GHSA-q56h-x9h5-q53c | 2022-06-17T21:48:55Z | 2022-06-10T00:00:56Z | null | ['CVE-2022-31830'] | Server-Side Request Forgery in kityminder | Kity Minder v1.3.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the init function at ImageCapture.class.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'kityminder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31830'}, {'type': 'WEB', 'url': 'https://github.com/fex-team/kityminder/issues/345'}, {'type': 'PACKAGE', 'url': 'https://github.com/fex-team/kityminder'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:48:55Z', 'nvd_published_at': '2022-06-09T14:15:00Z'} |
1.4.0 | GHSA-gwpf-95jc-63rv | 2022-06-17T01:01:48Z | 2022-06-03T00:00:41Z | null | ['CVE-2022-1982'] | Uncontrolled Resource Consumption in Mattermost server | Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.5.0'}, {'fixed': '6.5.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.4.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1982'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/mattermost-server/pull/19988'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:01:48Z', 'nvd_published_at': '2022-06-02T18:15:00Z'} |
1.4.0 | GHSA-c7q8-m4xw-c674 | 2022-07-14T21:36:35Z | 2022-06-29T22:09:53Z | null | ['CVE-2022-24444'] | Hybridsessions does not expire session id on logout | When using the hybridsessions module is used without the session-manager module installed and sessions IDs are saved to disk, unexpired SessionIDs of logged out users can still be used to make authenticated requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/hybridsessions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/hybridsessions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24444'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.10.1/'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/hybridsessions/CVE-2022-24444.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-24444'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:09:53Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-3885-8gqc-3wpf | 2022-07-08T17:03:07Z | 2022-06-14T21:57:52Z | null | ['CVE-2022-30184'] | Potential leak of NuGet.org API key | ### Description
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET Core 3.1, NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0). This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0) where a nuget.org api key could leak due to an incorrect comparison with a server url.
### Affected software
#### NuGet & NuGet Packages
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.2.0 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.0.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.11.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.9.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.7.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 4.9.4 version or earlier.
#### .NET SDK(s)
- Any .NET 6.0 application running on .NET 6.0.5 or earlier.
- Any .NET 3.1 application running on .NET Core 3.1.25 or earlier.
### Patches
- If you're using NuGet.exe 6.2.0 or lower, you should download and install 6.2.1 from https://dist.nuget.org/win-x86-commandline/v6.2.1/nuget.exe.
- If you're using NuGet.exe 6.0.1 or lower, you should download and install 6.0.2 from https://dist.nuget.org/win-x86-commandline/v6.0.2/nuget.exe.
- If you're using NuGet.exe 5.11.1 or lower, you should download and install 5.11.2 from https://dist.nuget.org/win-x86-commandline/v5.11.2/nuget.exe.
- If you're using NuGet.exe 5.9.1 or lower, you should download and install 5.9.2 from https://dist.nuget.org/win-x86-commandline/v5.9.2/nuget.exe.
- If you're using NuGet.exe 5.7.1 or lower, you should download and install 5.7.2 from https://dist.nuget.org/win-x86-commandline/v4.7.2/nuget.exe.
- If you're using NuGet.exe 4.9.4 or lower, you should download and install 4.9.5 from https://dist.nuget.org/win-x86-commandline/v4.9.5/nuget.exe.
- If you're using .NET Core 6.0, you should download and install Runtime 6.0.6 or SDK 6.0.106 (for Visual Studio 2022 v17.0) or SDK 6.0.301 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
- If you're using .NET Core 3.1, you should download and install Runtime 3.1.26 or SDK 3.1.420 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1
.NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
### Other Details
Announcement for this issue can be found at https://github.com/NuGet/Announcements/issues/62
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30184 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.9.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.10.0'}, {'fixed': '5.11.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.9.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.10.0'}, {'fixed': '5.11.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.8.0'}, {'fixed': '5.9.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.10.0'}, {'fixed': '5.11.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine.XPlat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-3885-8gqc-3wpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30184'}, {'type': 'PACKAGE', 'url': 'https://github.com/NuGet/NuGet.Client'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-14T21:57:52Z', 'nvd_published_at': '2022-06-15T22:15:00Z'} |
1.4.0 | GHSA-4263-q746-94mw | 2022-06-20T22:35:46Z | 2022-06-18T00:00:20Z | null | ['CVE-2022-22138'] | Uncontrolled Resource Consumption in fast-string-search | All versions of package fast-string-search are vulnerable to Denial of Service (DoS) when computations are incorrect for non-string inputs. One can cause the V8 to attempt reading from non-permitted locations and cause a segmentation fault due to the violation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-string-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22138'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367'}] | {'cwe_ids': ['CWE-400', 'CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:35:46Z', 'nvd_published_at': '2022-06-17T20:15:00Z'} |
1.4.0 | GHSA-q579-9wp9-gfp2 | 2023-06-13T20:10:22Z | 2022-06-17T00:14:18Z | null | [] | Window can read out of bounds if Read instance returns more bytes than buffer size | `rdiff` performs a diff of two provided strings or files. As part of its reading code it uses the return value of a `Read` instance to set the length of its internal character vector.
If the `Read` implementation claims that it has read more bytes than the length of the provided buffer, the length of the vector will be set to longer than its capacity. This causes `rdiff` APIs to return uninitialized memory in its API
methods.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'rdiff'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dyule/rdiff/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/dyule/rdiff'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0094.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:14:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6923-546p-6rrc | 2022-12-05T22:16:44Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34189'] | Cross-site Scripting in Jenkins Image Tag Parameter Plugin | Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:image-tag-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34189'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/image-tag-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:33Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-g5fm-jp9v-2432 | 2022-07-08T17:05:36Z | 2022-06-21T20:06:36Z | null | ['CVE-2022-31093'] | Improper Handling of `callbackUrl` parameter in next-auth | ### Impact
An attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally we convert to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to our **API route handler timing out and logging in to fail**. This has been remedied in the following releases:
next-auth v3 users before version 3.29.5 are impacted. (We recommend upgrading to v4, as v3 is considered unmaintained. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4))
next-auth v4 users before version 4.5.0 are impacted.
### Patches
We've released patches for this vulnerability in:
- v3 - `3.29.5`
- v4 - `4.5.0`
You can do:
```sh
npm i next-auth@latest
```
or
```sh
yarn add next-auth@latest
```
or
```sh
pnpm add next-auth@latest
```
(This will update to the latest v4 version, but you can change `latest` to `3` if you want to stay on v3. This is not recommended.)
### Workarounds
If for some reason you cannot upgrade, the workaround requires you to rely on [Advanced Initialization](https://next-auth.js.org/configuration/initialization#advanced-initialization). Here is an example:
**Before:**
```js
// pages/api/auth/[...nextauth].js
import NextAuth from "next-auth"
export default NextAuth(/* your config */)
```
**After:**
```js
// pages/api/auth/[...nextauth].js
import NextAuth from "next-auth"
function isValidHttpUrl(url) {
try {
return /^https?:/.test(url).protocol
} catch {
return false;
}
}
export default async function handler(req, res) {
if (
req.query.callbackUrl &&
!isValidHttpUrl(req.query.callbackUrl)
) {
return res.status(500).send('');
}
return await NextAuth(req, res, /* your config */)
}
```
### References
This vulnerability was discovered not long after https://github.com/nextauthjs/next-auth/security/advisories/GHSA-q2mx-j4x2-2h74 was published and is very similar in nature.
Related documentation:
- https://next-auth.js.org/getting-started/client#specifying-a-callbackurl
- https://next-auth.js.org/configuration/callbacks#redirect-callback
A test case has been added so this kind of issue will be checked before publishing. See: https://github.com/nextauthjs/next-auth/commit/e498483b23273d1bfc81be68339607f88d411bd6
### For more information
If you have any concerns, we request responsible disclosure, outlined here: https://next-auth.js.org/security#reporting-a-vulnerability
### Timeline
The issue was reported 2022 June 10th, a response was sent out to the reporter in less than 2 hours, and a patch was published within 3 hours. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-g5fm-jp9v-2432'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31093'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/25517b73153332d948114bacdff3b5908de91d85'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/e498483b23273d1bfc81be68339607f88d411bd6'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuration/initialization#advanced-initialization'}] | {'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:06:36Z', 'nvd_published_at': '2022-06-27T22:15:00Z'} |
1.4.0 | GHSA-x95w-qf3m-pqpx | 2022-12-05T22:22:26Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34187'] | Cross-site Scripting in Jenkins Filesystem List Parameter Plugin | Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'aendter.jenkins.plugins:filesystem-list-parameter-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34187'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/filesystem-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:22Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-jhfv-8936-g652 | 2022-12-05T22:18:07Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34188'] | Cross-site Scripting in Jenkins Hidden Parameter Plugin | Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:hidden-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34188'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/hidden-parameter-plugin/commit/b1cf577b0fe6c5db1e25031a653d84dc424e6bb9#diff-4ef68932c4bd2675faf307ce8adc92598e41c5aed65cc7bf9d86cc8d41010eedR5-R6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hidden-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:25Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-342c-vcff-2ff2 | 2022-06-02T20:53:43Z | 2022-06-02T20:53:43Z | null | [] | Login timing attack in ezsystems/ezplatform-kernel | Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-342c-vcff-2ff2'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-006-vulnerabilities-in-page-builder-login-and-commerce'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel/'}] | {'cwe_ids': ['CWE-208'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:53:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pv38-mqpp-v72h | 2022-12-05T22:14:30Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34191'] | Cross-site Scripting in Jenkins NS-ND Integration Performance Publisher Plugin | Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.129'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34191'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/5b6dc5957edc3eff1b7ef2c3b52264524161b734'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/6321f09aa9518eeeaeaa2f81182e1eae079dbdf2'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:11Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-85q9-7467-r53q | 2022-06-17T21:51:45Z | 2022-06-17T21:51:45Z | null | [] | XSS Vulnerability in Markdown Editor | ### Impact
InvenTree uses [EasyMDE](https://github.com/Ionaru/easy-markdown-editor) for displaying markdown text in various places (e.g. for the various "notes" fields associated with various models).
By default, EasyMDE does not sanitize input data, and it is possible for malicious code to be injected into the markdown editor, and executed in the users browser.
*Note: This malicious data must be first uploaded to the database by an authorized user, so the risk here is limited to trusted users*
### Solution
The solution here is two-fold:
- Enable data sanitization for the EasyMDE renderer - [#3205](https://github.com/inventree/InvenTree/pull/3205)
- Enforce cleaning of all data uploaded to the database via the API - [#3204](https://github.com/inventree/InvenTree/pull/3204) *(This will be ready for the 0.8.0 release)*
### Patches
- The issue is addressed in the upcoming 0.8.0 release
- This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.3 release
### Workarounds
There is no workaround for this issue without upgrading InvenTree to the specified version.
### References
- https://huntr.dev/bounties/ab296cf5-7a3e-4f49-8f63-5b35fc707f03/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github](http://github.com/inventree/inventree)
* Email us at [security@inventree.org](mailto:security@inventree.org)
| [] | [{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.7.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-85q9-7467-r53q'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:51:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4hpr-hh77-6q9p | 2022-06-17T21:03:23Z | 2022-06-10T00:00:55Z | null | ['CVE-2022-2036'] | Cross site scripting in francoisjacquet/rosariosis | A Cross-site Scripting (XSS) vulnerability exists in in GitHub repository francoisjacquet/rosariosis prior to 9.1. HTML entities are not properly decoded from the URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2036'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/6e213b17e6ac3a3961e1eabcdaba1c892844398a'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c7715149-f99c-4d62-a5c6-c78bfdb41905'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:03:23Z', 'nvd_published_at': '2022-06-09T17:15:00Z'} |
1.4.0 | GHSA-26qj-cr27-r5c4 | 2023-07-10T13:04:36Z | 2022-06-15T21:24:14Z | null | ['CVE-2022-31071'] | Octopoller gem published with world-writable files | ### Impact
Version [0.2.0](https://rubygems.org/gems/octopoller/versions/0.2.0) of the octopoller gem was published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644).
This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem.
Malicious code already present and running on your machine, separate from this package, could modify the gem’s files and change its behavior during runtime.
### Patches
* octopoller 0.3.0
### Workarounds
Users can use the previous version of the gem [v0.1.0](https://rubygems.org/gems/octopoller/versions/0.1.0). Alternatively, users can modify the file permissions manually until they are able to upgrade to the latest version.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'octopoller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.3.0'}]}], 'versions': ['0.2.0']}] | [{'type': 'WEB', 'url': 'https://github.com/octokit/octopoller.rb/security/advisories/GHSA-26qj-cr27-r5c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31071'}, {'type': 'WEB', 'url': 'https://github.com/octokit/octopoller.rb/commit/abed2b8d05abe2cc3eb6bdfb34e53d465e7c7874'}, {'type': 'PACKAGE', 'url': 'https://github.com/octokit/octopoller'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/octopoller/CVE-2022-31071.yml'}] | {'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-15T21:24:14Z', 'nvd_published_at': '2022-06-15T23:15:00Z'} |
1.4.0 | GHSA-pj96-4jhv-v792 | 2022-06-02T20:46:30Z | 2022-06-02T20:46:30Z | null | [] | Cross site scripting via cookies in gogs | ### Impact
There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.
### Patches
Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
### Workarounds
No need for workarounds.
### References
N/A
### For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6953.
| [] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-pj96-4jhv-v792'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6953'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:46:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3jhm-87m6-x959 | 2022-06-25T07:12:08Z | 2022-06-25T07:12:08Z | null | [] | Path traversal mitigation bypass in OctoRPKI | ### Impact
The existing URI path filters in OctoRPKI (version < 1.4.3) mitigating Path traversal vulnerability could be bypassed by an attacker. In case a malicious TAL file is parsed, it was possible to write files outside the base cache folder.
### Patches
The issue was fixed in version 1.4.3
### References
[CVE-2021-3907](https://www.cvedetails.com/cve/CVE-2021-3907/)
| [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3jhm-87m6-x959'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3907'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.3'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:12:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cxgw-r5jg-7xwq | 2022-07-11T19:27:57Z | 2022-06-30T00:00:29Z | null | ['CVE-2022-2073'] | Code injection in grav | Grav is vulnerable to Server Side Template Injection via Twig. According to a previous vulnerability report, Twig should not render dangerous functions by default, such as system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.34'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2073'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:13:18Z', 'nvd_published_at': '2022-06-29T19:15:00Z'} |
1.4.0 | GHSA-3fvg-4v2m-98jf | 2022-07-05T21:25:54Z | 2022-06-25T07:19:06Z | null | ['CVE-2022-25898'] | JWS and JWT signature validation vulnerability with special characters | ### Impact
Jsrsasign supports JWS(JSON Web Signatures) and JWT(JSON Web Token) validation. However JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake.
For example, even if a string of non Base64URL encoding characters such as `!@$%` or `\11` is inserted into a valid JWS or JWT signature value string, it will still be a valid JWS or JWT signature by mistake.
When jsrsasign's JWS or JWT validation is used in OpenID connect or OAuth2, this vulnerability will affect to authentication or authorization.
By our internal assessment, CVSS 3.1 score will be 8.6.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
### Patches
Users validate JWS or JWT signatures should upgrade to 10.5.25.
### Workarounds
Validate JWS or JWT signature if it has Base64URL and dot safe string before
executing JWS.verify() or JWS.verifyJWT() method.
### ACKNOWLEDGEMENT
Thanks to Adi Malyanker and Or David for this vulnerability report. Also thanks for [Snyk security team](https://snyk.io/) for this coordination.
### References
https://github.com/kjur/jsrsasign/releases/tag/10.5.25
https://github.com/kjur/jsrsasign/security/advisories/GHSA-3fvg-4v2m-98jf kjur's advisories
https://github.com/advisories/GHSA-3fvg-4v2m-98jf github advisories
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898
https://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verifyJWT
https://kjur.github.io/jsrsasign/api/symbols/KJUR.jws.JWS.html#.verify
https://kjur.github.io/jsrsasign/api/symbols/global__.html#.isBase64URLDot
https://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWS-verification
https://github.com/kjur/jsrsasign/wiki/Tutorial-for-JWT-verification
https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '10.5.25'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25898'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898'}, {'type': 'PACKAGE', 'url': 'https://github.com/kjur/jsrsasign'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.5.25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:19:06Z', 'nvd_published_at': '2022-07-01T20:15:00Z'} |
1.4.0 | GHSA-5hh2-f4h9-446g | 2022-12-05T22:24:22Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34185'] | Cross-site Scripting in Jenkins Date Parameter Plugin | Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'me.leejay.jenkins:date-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34185'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/date-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:18Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-67hm-27mx-9cg7 | 2022-06-23T06:44:34Z | 2022-06-13T00:00:19Z | null | ['CVE-2021-41641'] | Link Following in Deno | Deno <=1.14.0 file sandbox does not handle symbolic links correctly. When running Deno with specific write access, the Deno.symlink method can be used to gain access to any directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41641'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/issues/12152'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/12554'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/d44011a69e0674acfa9c59bd7ad7f0523eb61d42'}, {'type': 'WEB', 'url': 'https://hackers.report/report/614876917a7b150012836bb8'}] | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:44:34Z', 'nvd_published_at': '2022-06-12T13:15:00Z'} |
1.4.0 | GHSA-vhfw-v69p-crcw | 2022-09-01T20:11:21Z | 2022-06-17T21:44:58Z | null | ['CVE-2022-29864'] | Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vhfw-v69p-crcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29864'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29864.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:58Z', 'nvd_published_at': '2022-06-16T18:15:00Z'} |
1.4.0 | GHSA-62wf-24c4-8r76 | 2022-12-06T00:12:32Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34170'] | Cross-site Scripting vulnerability in Jenkins | Since Jenkins 2.320 and LTS 2.332.1, help icon tooltips no longer escape the feature name, effectively undoing the fix for [SECURITY-1955](https://www.jenkins.io/security/advisory/2020-08-12/#SECURITY-1955).
This vulnerability is known to be exploitable by attackers with Job/Configure permission.
Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability, the feature name in help icon tooltips is now escaped. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.350'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.320'}, {'fixed': '2.332.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.346'}, {'fixed': '2.346.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34170'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:12:32Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-w24x-87mr-4r23 | 2022-06-25T07:21:52Z | 2022-06-24T00:00:30Z | null | ['CVE-2022-22980'] | SpEL Injection in Spring Data MongoDB | A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}], 'versions': ['3.4.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22980'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22980'}] | {'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:21:52Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-67mx-jc2f-jgjm | 2022-06-17T19:21:46Z | 2022-06-08T22:34:21Z | null | ['CVE-2022-1986'] | OS Command Injection in file editor in Gogs | ### Impact
The malicious user is able to update a crafted `config` file into repository's `.git` directory in combination with crafted file deletion to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.
### Patches
File deletions are prohibited to repository's `.git` directory. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
### Workarounds
N/A
### References
https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930/
### For more information
If you have any questions or comments about this advisory, please post on #7000.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-67mx-jc2f-jgjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1986'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/38aff73251cc46ced96dd608dab6190415032a82'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930/'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:34:21Z', 'nvd_published_at': '2022-06-09T17:15:00Z'} |
1.4.0 | GHSA-v6h8-5cp2-j9w4 | 2022-07-05T22:59:40Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34206'] | Missing Authorization in Jenkins Jianliao Notification Plugin | A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jianliao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34206'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:40Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-x9jp-4w8m-4f3c | 2022-06-10T19:51:18Z | 2022-06-10T19:51:18Z | null | [] | Cross Site Scripting vulnerability in django-jsonform's admin form. | ### Description
django-jsonform stores the raw JSON data of the db field in a hidden textarea on the admin page. However, that data was kept in the textarea after unescaping it using the `safe` template filter. This opens up possibilities for XSS attacks.
This only affects the admin pages where the django-jsonform is rendered.
### Mitigation
Upgrade to django-jsonform version 2.10.1 or later.
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/bhch/django-jsonform/issues).
* Email the maintainer at `Bharat Chauhan <tell.bhch@gmail.com>`.
| [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-jsonform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bhch/django-jsonform/security/advisories/GHSA-x9jp-4w8m-4f3c'}, {'type': 'PACKAGE', 'url': 'https://github.com/bhch/django-jsonform'}] | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:51:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2gqg-2rg7-gh33 | 2022-06-15T19:47:49Z | 2022-06-03T00:01:06Z | null | ['CVE-2022-29711'] | Cross site scripting in librenms | LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29711'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13931'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/cc6112b8fb36039b862b42d86eb79ef7ee89d31b'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:28:33Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-5phc-849h-vcxg | 2023-06-13T17:07:59Z | 2022-06-16T23:45:49Z | null | [] | `Read` on uninitialized buffer can cause UB (impl of `ReadKVExt`) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'bronzedb-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Hexilee/BronzeDB/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Hexilee/BronzeDB'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0084.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:45:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5h75-pvq4-82c9 | 2022-06-23T17:49:22Z | 2022-06-23T00:00:33Z | null | ['CVE-2022-23080'] | Server-Side Request Forgery in Directus | Directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality, which allows a low privileged user to perform internal network port scans. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-beta.2'}, {'fixed': '9.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23080'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-database/CVE-2022-23080'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:49:22Z', 'nvd_published_at': '2022-06-22T16:15:00Z'} |
1.4.0 | GHSA-gfg9-x6px-r7gr | 2022-06-16T23:09:17Z | 2022-06-16T23:09:17Z | null | [] | Library exclusively intended to obfuscate code. | This crate allows you to write safe functions with unsafe bodies without the `unsafe` keyword.
The value this adds is questionable, and hides `unsafe` usages from naive analysis.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'plutonium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/mxxo/plutonium'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0011.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:09:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-39r3-h8q6-2phq | 2022-12-05T23:25:33Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34178'] | Reflected Cross site scripting in Jenkins Embeddable Build Status Plugin | Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
Embeddable Build Status Plugin 2.0.4 limits URLs to `http` and `https` protocols and correctly escapes the provided value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34178'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/0fc4a199506328b08dcd0aca572a2ca79ca38714'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2567'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:54Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rq99-93c5-33f6 | 2022-12-05T21:43:41Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34209'] | Cross-Site Request Forgery in Jenkins ThreadFix Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:threadfix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34209'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/threadfix-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:01Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-77vq-4j66-46m5 | 2022-12-05T21:42:03Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34210'] | Missing permission check in Jenkins ThreadFix Plugin | A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:threadfix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34210'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/threadfix-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:02Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-mcqm-6ff4-53qx | 2022-06-24T00:53:31Z | 2022-06-14T00:00:38Z | null | ['CVE-2022-29894'] | Cross-site Scripting in Strapi | Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.6.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29894'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN44550983/index.html'}, {'type': 'WEB', 'url': 'https://strapi.io/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:31Z', 'nvd_published_at': '2022-06-13T05:15:00Z'} |
1.4.0 | GHSA-fqx3-r75h-vc89 | 2022-06-07T21:07:31Z | 2022-06-07T21:07:31Z | null | [] | Improperly checked IDs on itemstacks received from the client leading to server crash in PocketMine-MP | ### Impact
Due to a workaround for unmapped network items implemented in 4.0.0-BETA5 (8ac16345a3bc099b62c1f5cfbf3b736e621c3f76), arbitrary item IDs are able to be written into an item's NBT. The intended purpose of this is to make said unmapped network items able to be moved around the inventory without issues.
This led to an exploit due to internal limits on the range that item IDs can occupy (-32768 - 32767), while the tag type used to represent the replacement IDs for unknown items is a `TAG_Int`, allowing a range from -(2^31) - 2^31 - 1. This leads to an uncaught exception which crashes the server.
### Patches
5fd685e07d61ef670584ed11a52fd5f4b99a81a7
### Workarounds
In theory this can be checked by plugins using a custom `TypeConverter`, but this is likely to be very cumbersome.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-BETA5'}, {'fixed': '4.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fqx3-r75h-vc89'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/5fd685e07d61ef670584ed11a52fd5f4b99a81a7'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/8ac16345a3bc099b62c1f5cfbf3b736e621c3f76'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:07:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3pp4-64mp-9cg9 | 2022-06-17T00:27:30Z | 2022-06-17T00:27:30Z | null | [] | Memory Safety Issue when using `patch` or `merge` on `state` and assign the result back to `state` | Affected versions of this crate maintains references to memory that might have been freed already.
If affects the following two `tremor-script` language constructs:
* A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression
and the expression to be merged needs to reference the `event`:
```
let state = merge state of event end;
```
* A [Patch](https://www.tremor.rs/docs/tremor-script/index#patch) where we assign the result back to the target expression
and the patch operations used need to reference the `event`:
```
let state = patch state of insert event.key => event.value end;
```
For constructs like this (it doesnt matter what is references in the expression to be merged or the patch operations) an optimization
was applied to manipulate the target value in-place, instead of cloning it.
Our `Value` struct which underpins all event data in `tremor-script`, is representing as borrowed strings `beef::Cow<'lifetime, str>`
that reference the actual `Vec<u8>` the event is based upon. We keep the raw byte-array next to the event structure inside our `Event` struct as a self-referential struct,
so we make sure that the structured `Value` and its references are valid across its whole lifetime.
The optimization was considered safe as long as it was only possible to merge or patche `event` data or static data.
When `state` was introduced to `tremor-script` a new possibility existed, to keep `Value` data around for longer than the lifetime of an event.
If `event` data is merged or patched into `state` without cloning `state` first, it can still reference keys or values from
the previous event, which will now be invalid. This allows access to those already freed regions of memory and to get their content out over the wire.
## Workaround
If an upgrade is not possible, a possible workaround is to avoid the optimization
by introducing a temporary variable and not immediately reassigning to `state`:
```
let tmp = merge state of event end;
let state = tmp
```
## Fix
The flaw was corrected in `tremor-script` version 0.11.6 via commit [1a2efcd](https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e) by removing the optimization
and always clone the target expression of a [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) or [Patch](https://www.tremor.rs/docs/tremor-script/index#patch.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.2'}, {'fixed': '0.11.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'PACKAGE', 'url': 'https://github.com/tremor-rs/tremor-runtime'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0111.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:27:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5f47-rcg5-9m24 | 2022-06-20T21:37:08Z | 2022-06-11T00:00:18Z | null | ['CVE-2022-24278'] | Directory traversal in convert-svg-core | The package convert-svg-core before 0.6.4 is vulnerable to Directory Traversal due to improper sanitization of SVG tags. Exploiting this vulnerability is possible by using a specially crafted SVG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24278'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/issues/86'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/pull/87'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/commit/2bbc498c5029238637206661dbac9e44d37d17c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/neocotic/convert-svg'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:56:38Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-7558-6q45-6x7m | 2022-12-05T22:23:30Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34186'] | Cross-site Scripting in Jenkins Dynamic Extended Choice Parameter Plugin | Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34186'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynamic-extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:29Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-w248-ffj2-4v5q | 2022-06-20T21:59:37Z | 2022-06-09T23:47:23Z | null | ['CVE-2022-31043'] | Fix failure to strip Authorization header on HTTP downgrade | ### Impact
`Authorization` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. This is much the same as to how we don't forward on the header if the host changes. Prior to this fix, `https` to `http` downgrades did not result in the `Authorization` header being removed, only changes to the host.
### Patches
Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4.
### Workarounds
An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.
### References
* [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx)
### For more information
If you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however - please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.5.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31043'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31043.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/guzzle'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5246'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-011'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx'}] | {'cwe_ids': ['CWE-200', 'CWE-212', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:47:23Z', 'nvd_published_at': '2022-06-10T00:15:00Z'} |
1.4.0 | GHSA-pc9c-547w-hhmc | 2022-12-05T21:59:40Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34196'] | Cross-site Scripting in Jenkins REST List Parameter Plugin | Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:rest-list-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34196'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rest-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:58Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-vqpp-q5x5-qj4r | 2022-12-05T21:44:20Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34207'] | Cross-Site Request Forgery in Jenkins Beaker builder Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34207'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/beaker-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:39Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rj88-4777-828h | 2022-06-03T22:33:18Z | 2022-06-03T00:00:58Z | null | ['CVE-2021-34079'] | Command injection in docker-tester | OS Command injection vulnerability in Mintzo Docker-Tester through 1.2.1 allows attackers to execute arbitrary commands via shell metacharacters in the 'ports' entry of a crafted docker-compose.yml file. | [] | [{'package': {'ecosystem': 'npm', 'name': 'docker-tester'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34079'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4786'}, {'type': 'PACKAGE', 'url': 'https://github.com/mintzo/docker-testing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/docker-tester'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:33:18Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-j8c7-3jpq-8985 | 2022-06-17T19:21:49Z | 2022-06-10T00:00:55Z | null | ['CVE-2022-2016'] | Cross-site Scripting in FacturaScripts | Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts. A patch is available on the `master` branch of the repository in commit 7b4ddb92. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2022.08'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2016'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/7b4ddb9269a230e2dd07c6a8d3211c9a88f4f09f'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5fa17e9b-c767-46b4-af64-aafb8c2aa521'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:42Z', 'nvd_published_at': '2022-06-09T16:15:00Z'} |
1.4.0 | GHSA-gwp3-f7mr-qpfv | 2022-06-03T22:21:32Z | 2022-06-03T00:00:59Z | null | ['CVE-2021-34084'] | OS Command Injection in s3-uploader | OS command injection vulnerability in Turistforeningen node-s3-uploader through 2.0.3 for Node.js allows attackers to execute arbitrary commands via the metadata() function. | [] | [{'package': {'ecosystem': 'npm', 'name': 's3-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34084'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4776'}, {'type': 'PACKAGE', 'url': 'https://github.com/Turistforeningen/node-s3-uploader'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:21:32Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-q754-vwc4-p6qj | 2022-07-08T17:05:54Z | 2022-06-22T17:53:34Z | null | ['CVE-2022-31057'] | Authenticated Stored Cross-site Scripting in Shopware | ### Impact
Authenticated Stored XSS in Administration
### Patches
We recommend updating to version 5.7.12. You can get the update to 5.7.12 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/de/changelog-sw5/#5-7-12
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2022 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-q754-vwc4-p6qj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31057'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/3e025a0a3e123f4108082645b1ced6fb548f7b6f'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2022'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2022?_ga=2.237805696.1286760707.1655914110-2145019146.1655914110'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/shopware/shopware'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelog-sw5/#5-7-12'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:53:34Z', 'nvd_published_at': '2022-06-27T20:15:00Z'} |
1.4.0 | GHSA-qfr5-wjpw-q4c4 | 2022-06-29T21:52:17Z | 2022-06-19T00:00:21Z | null | ['CVE-2021-46823'] | Denial of Service in python-ldap | python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-ldap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46823'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/221507'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-ldap/python-ldap'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:36:32Z', 'nvd_published_at': '2022-06-18T16:15:00Z'} |
1.4.0 | GHSA-3j8f-xvm3-ffx4 | 2022-07-08T17:05:50Z | 2022-06-29T00:00:57Z | null | ['CVE-2022-0624'] | Authorization Bypass in parse-path | Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0624'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-path/commit/f9ad8856a3c8ae18e1cf4caef5edbabbc42840e8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-path'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388'}] | {'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:13:37Z', 'nvd_published_at': '2022-06-28T09:15:00Z'} |
1.4.0 | GHSA-65r6-w7vr-c75r | 2022-12-05T22:27:45Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34183'] | Cross-site Scripting in Jenkins Agent Server Parameter Plugin | Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:agent-server-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34183'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/agent-server-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T23:00:00Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-9grj-j43m-mjqr | 2022-12-05T23:37:15Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34174'] | Observable timing discrepancy allows determining username validity in Jenkins | In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm. This allows attackers to determine the validity of attacker-specified usernames.
Login attempts with an invalid username now validate a synthetic password to eliminate the timing discrepancy in Jenkins 2.356, LTS 2.332.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.334'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.332.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34174'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2566'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:37:15Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rxhx-9fj6-6h2m | 2022-06-20T18:15:47Z | 2022-06-16T23:53:32Z | null | [] | enum_map macro can cause UB when `Enum` trait is incorrectly implemented | Affected versions of this crate did not properly check the length of an enum when using `enum_map!` macro, trusting user-provided length.
When the `LENGTH` in the `Enum` trait does not match the array length in the `EnumArray` trait, this can result in the initialization of the enum map with uninitialized types, which in turn can allow an attacker to execute arbitrary code.
This problem can only occur with a manual implementation of the Enum trait, it will never occur for enums that use `#[derive(Enum)]`.
Example code that triggers this vulnerability looks like this:
```rust
enum E {
A,
B,
C,
}
impl Enum for E {
const LENGTH: usize = 2;
fn from_usize(value: usize) -> E {
match value {
0 => E::A,
1 => E::B,
2 => E::C,
_ => unimplemented!(),
}
}
fn into_usize(self) -> usize {
self as usize
}
}
impl<V> EnumArray<V> for E {
type Array = [V; 3];
}
let _map: EnumMap<E, String> = enum_map! { _ => "Hello, world!".into() };
```
The flaw was corrected in commit [b824e23](https://github.com/xfix/enum-map/commit/b824e232f2fb47837740070096ac253df8e80dfc) by putting `LENGTH` property on sealed trait for macro to read.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'enum-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-2'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xfix/enum-map/commit/b824e232f2fb47837740070096ac253df8e80dfc'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/enum-map/RUSTSEC-2022-0010.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/enum-map'}, {'type': 'WEB', 'url': 'https://github.com/xfix/enum-map/blob/master/CHANGELOG.md#version-202'}, {'type': 'WEB', 'url': 'https://gitlab.com/KonradBorowski/enum-map/-/blob/master/CHANGELOG.md#version-202'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0010.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:53:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7495-24mx-hph2 | 2022-12-05T21:53:31Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34201'] | Missing permission check in Jenkins Convertigo Mobile Platform Plugin | A missing permission check in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:47Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-5g4r-2qhx-vqfm | 2022-06-06T21:22:05Z | 2022-06-06T21:22:05Z | null | ['CVE-2022-31026'] | Use of Uninitialized Variable in trilogy | ### Impact
When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory.
### Patches
Users of the trilogy gem should upgrade to version 2.1.1
### Workarounds
This issue can be avoided by only connecting to trusted servers.
### Acknowledgements
We would like to thank Sergei Volokitin for reporting this vulnerability
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [trilogy](https://github.com/github/trilogy)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'trilogy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/github/trilogy/security/advisories/GHSA-5g4r-2qhx-vqfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31026'}, {'type': 'WEB', 'url': 'https://github.com/github/trilogy/commit/6bed62789eaf119902b0fe247d2a91d56c31a962'}, {'type': 'PACKAGE', 'url': 'https://github.com/github/trilogy'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/trilogy/CVE-2022-31026.yml'}] | {'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:22:05Z', 'nvd_published_at': '2022-06-09T13:15:00Z'} |
1.4.0 | GHSA-8fvr-7945-mg7w | 2022-06-20T21:36:42Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2060'] | Cross site scripting in dolibarr | A Cross-site Scripting (XSS) vulnerability exists in the admin/accountant.php file. The fields `town`, `name`, and `Accountant code` can be used to escape double quote protection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2060'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/2b5b9957c3010a5db9d1988c2efe5b209b16b47f'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2acfc8fe-247c-4f88-aeaa-042b6b8690a0'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:10:52Z', 'nvd_published_at': '2022-06-13T09:15:00Z'} |
1.4.0 | GHSA-jx34-gqqq-r6gm | 2022-07-11T19:25:29Z | 2022-06-29T22:14:03Z | null | ['CVE-2022-25238'] | Stored XSS via HTML fields in SilverStripe Framework | SilverStripe Framework through 4.10.8 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25238'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.10.1/'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-25238.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-25238'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:14:03Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-mmh6-m7v9-5956 | 2022-06-03T22:25:16Z | 2022-06-03T00:01:00Z | null | ['CVE-2021-43308'] | Regular expression denial of service in markdown-link-extractor | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function | [] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-link-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'markdown-link-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43308'}, {'type': 'PACKAGE', 'url': 'https://github.com/tcort/markdown-link-extractor'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/markdown-link-extractor-redos-xray-211350/'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:25:16Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-xfjq-5m4w-cc6h | 2022-07-05T22:59:47Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34208'] | Missing Authorization in Jenkins Beaker builder Plugin | A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34208'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/beaker-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:47Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-jmwx-r3gq-qq3p | 2022-06-17T00:27:57Z | 2022-06-17T00:27:57Z | null | [] | vec-const attempts to construct a Vec from a pointer to a const slice | Affected versions of this crate claimed to construct a const `Vec` with nonzero length and capacity, but that cannot be done because such a `Vec` requires a pointer from an allocator.
The implementation was later changed to just construct a `std::borrow::Cow`.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'vec-const'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Eolu/vec-const/issues/1#issuecomment-898908241'}, {'type': 'PACKAGE', 'url': 'https://github.com/Eolu/vec-const/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0082.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:27:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wwh2-r387-g5rm | 2023-06-13T22:06:25Z | 2022-06-17T00:26:05Z | null | [] | tower-http's improper validation of Windows paths could lead to directory traversal attack | `tower_http::services::fs::ServeDir` didn't correctly validate Windows paths meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem. This only impacts Windows. Linux and other unix likes are not impacted by this. | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_specific': {'affected_functions': ['tower_http::services::fs::ServeDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_specific': {'affected_functions': ['tower_http::services::fs::ServeDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tower-rs/tower-http/pull/204'}, {'type': 'PACKAGE', 'url': 'https://github.com/tower-rs/tower-http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0135.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:26:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6692-8qqf-79jc | 2022-06-17T00:24:29Z | 2022-06-17T00:24:29Z | null | [] | `Read` on uninitialized buffer may cause UB ('tectonic_xdv' crate) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
The problem was fixed in commit `cdff034` by zero-initializing the buffer before passing it to a user-provided `Read` implementation.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'tectonic_xdv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/issues/752'}, {'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/commit/cdff034e6d93cdfdafd13d8c6956e22fa5a57b79'}, {'type': 'PACKAGE', 'url': 'https://github.com/tectonic-typesetting/tectonic'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0112.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:24:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h79-5m2f-mqj2 | 2022-12-05T21:39:19Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34213'] | Squash TM Publisher (Squash4Jenkins) Plugin stores passwords stored in plain text | Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file `org.jenkinsci.squashtm.core.SquashTMPublisher.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:squashtm-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34213'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/squashtm-publisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089'}] | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:14:56Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-q4qm-xhf9-4p8f | 2022-09-13T21:28:10Z | 2022-06-03T00:01:07Z | null | ['CVE-2022-30034'] | Flower OAuth authentication bypass | All versions of Flower, a web UI for the Celery Python RPC framework, as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes. A fix was released in version 1.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flower'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30034'}, {'type': 'WEB', 'url': 'https://github.com/mher/flower/issues/1217'}, {'type': 'WEB', 'url': 'https://github.com/mher/flower/pull/1216'}, {'type': 'PACKAGE', 'url': 'https://github.com/mher/flower'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/flower/PYSEC-2022-42973.yaml'}, {'type': 'WEB', 'url': 'https://tprynn.github.io/2022/05/26/flower-vulns.html'}, {'type': 'WEB', 'url': 'http://githubcommherflower.com'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:29:21Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-qmx3-m648-hr74 | 2022-07-05T18:03:15Z | 2022-06-23T00:00:34Z | null | ['CVE-2022-32549'] | Log Injection in Apache Sling Commons Log and Apache Sling API | Apache Sling Commons Log <= 5.4.0 and Apache Sling API <= 2.25.0 are vulnerable to log injection. The ability to forge logs may allow an attacker to cover tracks by injecting fake logs and potentially corrupt log files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.commons.log'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.25.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32549'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7z6h3806mwcov5kx6l96pq839sn0po1v'}] | {'cwe_ids': ['CWE-116', 'CWE-117'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:48:50Z', 'nvd_published_at': '2022-06-22T15:15:00Z'} |
1.4.0 | GHSA-5c5f-7vfq-3732 | 2022-07-05T21:24:30Z | 2022-06-07T00:00:31Z | null | ['CVE-2022-32511'] | JMESPath for Ruby uses unsafe JSON.load when safe JSON.parse is preferable | jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'jmespath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32511'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/pull/55'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/commit/e8841280053a9d9a0c90f36223f926c8b9e4ec49'}, {'type': 'PACKAGE', 'url': 'https://github.com/jmespath/jmespath.rb'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/compare/v1.6.0...v1.6.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jmespath/CVE-2022-32511.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/376NUPIPTYBWWGS33GO4UOLQRI4D3BTP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZ2YWONVFFOPACHAT4MM7ZBT4DNHOF5/'}, {'type': 'WEB', 'url': 'https://stackoverflow.com/a/30050571/580231'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:14:51Z', 'nvd_published_at': '2022-06-06T22:15:00Z'} |
1.4.0 | GHSA-pg8v-g4xq-hww9 | 2022-07-07T17:13:54Z | 2022-06-25T00:00:54Z | null | ['CVE-2022-32209'] | Rails::Html::Sanitizer vulnerable to Cross-site Scripting | Versions of Rails::Html::Sanitizer prior to version 1.4.3 are vulnerable to XSS with certain configurations of Rails::Html::Sanitizer which allows an attacker to inject content when the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements. Code is only impacted if allowed tags are being overridden.
This may be done via application configuration: ```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```
see https://guides.rubyonrails.org/configuring.html#configuring-action-view
Or it may be done with a `:tags` option to the Action View helper `sanitize`: ```<%= sanitize @comment.body, tags: ["select", "style"] %>```
see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize
It may also be done with Rails::Html::SafeListSanitizer directly:
```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]``` or with
```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])```
All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" are recommended to upgrade immediately. A workaround for this issue can be applied by removing either `select` or `style` from the overridden allowed tags. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32209'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/45a5c10fed3d9aa141594c80afa06d748fa0967d'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1530898'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-32209.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/ce9PhUANQ6s'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00012.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T18:10:35Z', 'nvd_published_at': '2022-06-24T15:15:00Z'} |