schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 8
154
| details
stringlengths 31
19.1k
| severity
stringlengths 2
92
| affected
stringlengths 75
28.5k
| references
stringlengths 79
7.48k
| database_specific
stringlengths 131
196
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hj9c-8jmm-8c52 | 2022-06-29T21:50:23Z | 2022-06-02T15:37:27Z | null | ['CVE-2022-29244'] | Packing does not respect root-level ignore files in workspaces | ### Impact
`npm pack` ignores root-level `.gitignore` & `.npmignore` file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` with workspaces, as of [v7.9.0](https://github.com/npm/cli/releases/tag/v7.9.0) & [v7.13.0](https://github.com/npm/cli/releases/tag/v7.13.0) respectively, may be affected and have published files into the npm registry they did not intend to include.
### Patch
- Upgrade to the latest, patched version of `npm` ([`v8.11.0`](https://github.com/npm/cli/releases/tag/v8.11.0) or greater), run: `npm i -g npm@latest`
- Node.js versions [`v16.15.1`](https://github.com/nodejs/node/releases/tag/v16.15.1), [`v17.19.1`](https://github.com/nodejs/node/releases/tag/v17.9.1) & [`v18.3.0`](https://github.com/nodejs/node/releases/tag/v18.3.0) include the patched `v8.11.0` version of `npm`
#### Steps to take to see if you're impacted
1. Run `npm publish --dry-run` or `npm pack` with an `npm` version `>=7.9.0` & `<8.11.0` inside the project's root directory using a workspace flag like: `--workspaces` or `--workspace=<name>` (ex. `npm pack --workspace=foo`)
2. Check the output in your terminal which will list the package contents (note: `tar -tvf <package-on-disk>` also works)
3. If you find that there are files included you did not expect, you should:
3.1. Create & publish a new release excluding those files (ref. ["Keeping files out of your Package"](https://docs.npmjs.com/cli/v8/using-npm/developers#keeping-files-out-of-your-package))
3.2. Deprecate the old package (ex. `npm deprecate <pkg>[@<version>] <message>`)
3.3. Revoke or rotate any sensitive information (ex. passwords, tokens, secrets etc.) which might have been exposed
### References
- [CVE-2022-29244](https://nvd.nist.gov/vuln/detail/CVE-2022-29244)
- [`npm-packlist`](https://github.com/npm/npm-packlist)
- [`libnpmpack`](https://github.com/npm/cli/tree/latest/workspaces/libnpmpack)
- [`libnpmpublish`](https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '8.11.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29244'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/pull/43210'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/releases/tag/v16.15.1'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/releases/tag/v17.9.1'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/releases/tag/v18.3.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/cli/'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/releases/tag/v8.11.0'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/tree/latest/workspaces/libnpmpack'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-packlist'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220722-0007/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:37:27Z', 'nvd_published_at': '2022-06-13T14:15:00Z'} |
1.4.0 | GHSA-jp3w-3q88-34cf | 2022-06-17T00:17:08Z | 2022-06-17T00:17:08Z | null | [] | Miscomputation when performing AES encryption in rust-crypto | The following Rust program demonstrates some strangeness in AES encryption - if you have an immutable key slice and then operate on that slice, you get different encryption output than if you operate on a copy of that key.
For these functions, we expect that extending a 16 byte key to a 32 byte key by repeating it gives the same encrypted data, because the underlying rust-crypto functions repeat key data up to the necessary key size for the cipher.
```rust
use crypto::{
aes, blockmodes, buffer,
buffer::{BufferResult, ReadBuffer, WriteBuffer},
symmetriccipher,
};
fn encrypt(
key: &[u8],
iv: &[u8],
data: &str,
) -> Result<String, symmetriccipher::SymmetricCipherError> {
let mut encryptor =
aes::cbc_encryptor(aes::KeySize::KeySize256, key, iv, blockmodes::PkcsPadding);
let mut encrypted_data = Vec::<u8>::new();
let mut read_buffer = buffer::RefReadBuffer::new(data.as_bytes());
let mut buffer = [0; 4096];
let mut write_buffer = buffer::RefWriteBuffer::new(&mut buffer);
loop {
let result = encryptor.encrypt(&mut read_buffer, &mut write_buffer, true)?;
encrypted_data.extend(
write_buffer
.take_read_buffer()
.take_remaining()
.iter()
.copied(),
);
match result {
BufferResult::BufferUnderflow => break,
BufferResult::BufferOverflow => {}
}
}
Ok(hex::encode(encrypted_data))
}
fn working() {
let data = "data";
let iv = [
0xF0, 0xF1, 0xF2, 0xF3, 0xF4, 0xF5, 0xF6, 0xF7, 0xF8, 0xF9, 0xFA, 0xFB, 0xFC, 0xFD, 0xFE,
0xFF,
];
let key = [
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E,
0x0F,
];
// The copy here makes the code work.
let key_copy = key;
let key2: Vec<u8> = key_copy.iter().cycle().take(32).copied().collect();
println!("key1:{} key2: {}", hex::encode(&key), hex::encode(&key2));
let x1 = encrypt(&key, &iv, data).unwrap();
println!("X1: {}", x1);
let x2 = encrypt(&key2, &iv, data).unwrap();
println!("X2: {}", x2);
assert_eq!(x1, x2);
}
fn broken() {
let data = "data";
let iv = [
0xF0, 0xF1, 0xF2, 0xF3, 0xF4, 0xF5, 0xF6, 0xF7, 0xF8, 0xF9, 0xFA, 0xFB, 0xFC, 0xFD, 0xFE,
0xFF,
];
let key = [
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E,
0x0F,
];
// This operation shouldn't affect the contents of key at all.
let key2: Vec<u8> = key.iter().cycle().take(32).copied().collect();
println!("key1:{} key2: {}", hex::encode(&key), hex::encode(&key2));
let x1 = encrypt(&key, &iv, data).unwrap();
println!("X1: {}", x1);
let x2 = encrypt(&key2, &iv, data).unwrap();
println!("X2: {}", x2);
assert_eq!(x1, x2);
}
fn main() {
working();
broken();
}
```
The output from this program:
```shell
Running `target/host/debug/rust-crypto-test`
key1:000102030405060708090a0b0c0d0e0f key2: 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f
X1: 90462bbe32965c8e7ea0addbbed4cddb
X2: 90462bbe32965c8e7ea0addbbed4cddb
key1:000102030405060708090a0b0c0d0e0f key2: 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f
X1: 26e847e5e7df1947bf82a650548a7d5b
X2: 90462bbe32965c8e7ea0addbbed4cddb
thread 'main' panicked at 'assertion failed: `(left == right)`
left: `"26e847e5e7df1947bf82a650548a7d5b"`,
right: `"90462bbe32965c8e7ea0addbbed4cddb"`', src/main.rs:83:5
```
Notably, the X1 key in the `broken()` test changes every time after rerunning the program.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'rust-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.36'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/DaGenix/rust-crypto/issues/476'}, {'type': 'PACKAGE', 'url': 'https://github.com/DaGenix/rust-crypto/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0011.html'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:17:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9fmg-89fx-r33w | 2022-07-11T19:25:18Z | 2022-06-29T22:39:50Z | null | ['CVE-2021-41559'] | Quadratic blowup in Convert::xml2array() | Silverstripe silverstripe/framework 4.x until 4.10.9 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41559'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2021-41559.yaml'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2021-41559'}] | {'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:39:50Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-rphm-c8gw-3r38 | 2022-06-15T19:44:56Z | 2022-06-03T00:00:58Z | null | ['CVE-2021-34078'] | OS Command Injection in lifion-verify-deps | lifion-verify-dependencies through 1.1.0 is vulnerable to OS command injection via a crafted dependency name on the scanned project's package.json file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lifion-verify-deps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34078'}, {'type': 'WEB', 'url': 'https://github.com/lifion/lifion-verify-deps/commit/be1133d5b78e3caa0004fa60207013dca4e1bf38'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4785'}, {'type': 'PACKAGE', 'url': 'https://github.com/lifion/lifion-verify-deps'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:19:56Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-8mv5-7x95-7wcf | 2023-06-13T18:35:51Z | 2022-06-17T00:12:33Z | null | [] | `mopa` is technically unsound | The `mopa` crate redefines the deprecated `TraitObject` struct from `core::raw` like so:
```rust
#[repr(C)]
#[derive(Copy, Clone)]
#[doc(hidden)]
pub struct TraitObject {
pub data: *mut (),
pub vtable: *mut (),
}
```
This is done to then transmute a reference to a trait object (`&dyn Trait` for any trait `Trait`) into this struct and retrieve the `data` field for the purpose of downcasting. This is used to implement `downcast_ref_unchecked()`, in terms of which `downcast_ref()` is also implemented. Same goes for mutable reference downcasting and `Box` downcasting.
The Rust compiler explicitly reserves the right to change the memory layout of `&dyn Trait` for any trait `Trait`. The worst case scenario is that it swaps `data` and `vtable`, making an executable location breach and compromisation of ASLR possible, since reads from `data` would read `vtable` instead. Likewise, arbitrary code execution is also theoretically possible if reads of `vtable` generated by the compiler read `data` instead.
While, as of Rust 1.52, this unsound assumption still holds true, updating the compiler may silently create UB in a crate which previously compiled and run without issues, compromising the security of builds which are believed to be reproducible.
A potential strategy to resolve this has already been suggested in an issue on the GitHub repository of the crate. | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'mopa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/chris-morgan/mopa/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/chris-morgan/mopa'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0095.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:12:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9qrp-h7fw-42hg | 2022-06-01T19:56:34Z | 2022-06-01T19:56:34Z | null | ['CVE-2022-29253'] | Path Traversal in XWiki Platform | ### Impact
One can ask for any file located in the classloader using the template API and a path with ".." in it. For example
```
{{template name="../xwiki.hbm.xml"/}}
```
To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confidentiality value of this advisory.
### Patches
The issue is patched in versions 14.0 and 13.10.3.
### Workarounds
There's no easy workaround for this issue, administrators should upgrade their wiki.
### References
* https://jira.xwiki.org/browse/XWIKI-19349
* https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [security mailing list](mailto:security@xwiki.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.3-rc-1'}, {'fixed': '13.10.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29253'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19349'}] | {'cwe_ids': ['CWE-22', 'CWE-24'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:56:34Z', 'nvd_published_at': '2022-05-25T21:15:00Z'} |
1.4.0 | GHSA-r7pq-3x6p-7jcm | 2022-09-01T20:12:37Z | 2022-06-17T21:45:15Z | null | ['CVE-2022-29863'] | Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29863'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}] | {'cwe_ids': ['CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:45:15Z', 'nvd_published_at': '2022-06-16T18:15:00Z'} |
1.4.0 | GHSA-mj46-r4gr-5x83 | 2022-06-06T18:59:37Z | 2022-06-03T22:32:06Z | null | ['CVE-2022-25863'] | Unsanitized JavaScript code injection possible in gatsby-plugin-mdx | ### Impact
The gatsby-plugin-mdx plugin prior to versions 3.15.2 and 2.14.1 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present when passing input in both webpack (MDX files in `src/pages` or MDX file imported as component in frontend / React code) and data mode (querying MDX nodes via GraphQL). Injected JavaScript executes in the context of the build server.
To exploit this vulnerability untrusted/unsanitized input would need to be sourced or added into an MDX file. The following MDX payload demonstrates a vulnerable configuration:
```
---js
((require("child_process")).execSync("id >> /tmp/rce"))
---
```
### Patches
A patch has been introduced in `gatsby-plugin-mdx@3.15.2` and `gatsby-plugin-mdx@2.14.1` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. The patch introduces a new option, `JSFrontmatterEngine` which is set to `false` by default. When setting `JSFrontmatterEngine` to `true`, input passed to `gatsby-plugin-mdx` must be sanitized before processing to avoid a security risk. Warnings are displayed when enabling `JSFrontmatterEngine` to `true` or if it appears that the MDX input is attempting to use the Frontmatter engine.
### Workarounds
If an older version of `gatsby-plugin-mdx` must be used, input passed into the plugin should be sanitized ahead of processing.
**We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.**
### Credits
We would like to thank Snyk [snyk.io] for initially bringing the issue to our attention, as well as Feng Xiao and Zhongfu Su, who reported the issue to Snyk.
### For more information
Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-mdx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-mdx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.15.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-mj46-r4gr-5x83'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25863'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/pull/35830'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/pull/35830/commits/f214eb0694c61e348b2751cecd1aace2046bc46e'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/1EoCzbwTWOM8-fjvwMbH3bqcZ2iKksxTW/view?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/gatsbyjs/gatsby'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GATSBYPLUGINMDX-2405699'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:32:06Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-jqwc-c49r-4w2x | 2022-06-29T22:08:25Z | 2022-06-29T22:08:25Z | null | ['CVE-2022-31104'] | Miscompilation of `i8x16.swizzle` and `select` with v128 inputs | ### Impact
Wasmtime's implementation of the [SIMD proposal for WebAssembly](https://github.com/webassembly/simd) on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bugs were presented in the `i8x16.swizzle` and `select` WebAssembly instructions. The `select` instruction is only affected when the inputs are of `v128` type. The correspondingly affected Cranelift instructions were `swizzle` and `select`.
The `swizzle` instruction lowering in Cranelift erroneously overwrote the mask input register which could corrupt a constant value, for example. This means that future uses of the same constant may see a different value than the constant itself.
The `select` instruction lowering in Cranelift wasn't correctly implemented for vector types that are 128-bits wide. When the condition was 0 the wrong instruction was used to move the correct input to the output of the instruction meaning that only the low 32 bits were moved and the upper 96 bits of the result were left as whatever the register previously contained (instead of the input being moved from). The `select` instruction worked correctly if the condition was nonzero, however.
This bug in Wasmtime's implementation of these instructions on x86_64 represents an incorrect implementation of the specified semantics of these instructions according to the [WebAssembly specification](https://webassembly.github.io/spec/). The impact of this is benign for hosts running WebAssembly but represents possible vulnerabilities within the execution of a guest program. For example a WebAssembly program could take unintended branches or materialize incorrect values internally which runs the risk of exposing the program itself to other related vulnerabilities which can occur from miscompilations.
### Patches
We have released Wasmtime 0.38.1 and cranelift-codegen (and other associated cranelift crates) 0.85.1 which contain the corrected implementations of these two instructions in Cranelift.
### Workarounds
If upgrading is not an option for you at this time, you can avoid the vulnerability by [disabling the Wasm simd proposal](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.wasm_simd)
```rust
config.wasm_simd(false);
```
Additionally the bug is only present on x86_64 hosts. Other aarch64 hosts are not affected. Note that s390x hosts don't yet implement the simd proposal and are not affected.
### References
* [The WebAssembly simd proposal](https://github.com/webassembly/simd)
* [Original test case showing the erroneous behavior](https://github.com/bytecodealliance/wasmtime/issues/4315)
* [Fix for the `swizzle` instruction](https://github.com/bytecodealliance/wasmtime/pull/4318)
* [Fix for the `select` instruction](https://github.com/bytecodealliance/wasmtime/pull/4317)
### For more information
If you have any questions or comments about this advisory:
* Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)
* Open an issue in [the bytecodealliance/wasmtime repository](https://github.com/bytecodealliance/wasmtime/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.85.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.85.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jqwc-c49r-4w2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31104'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/pull/4317'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/pull/4318'}, {'type': 'WEB', 'url': 'https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.wasm_simd'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/wasmtime'}, {'type': 'WEB', 'url': 'https://github.com/webassembly/simd'}, {'type': 'WEB', 'url': 'https://webassembly.github.io/spec/'}] | {'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:08:25Z', 'nvd_published_at': '2022-06-28T00:15:00Z'} |
1.4.0 | GHSA-rppc-655v-7j3c | 2022-07-11T19:26:57Z | 2022-06-29T22:12:39Z | null | ['CVE-2022-28803'] | Stored XSS in link tags added via XHR in SilverStripe Framework | SilverStripe Framework 4.x prior to 4.10.9 is vulnerable to cross-site scripting inside the href attribute of an HTML hyperlink, which can be added to website content via XMLHttpRequest (XHR) by an authenticated CMS user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28803'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-28803.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-28803'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:12:39Z', 'nvd_published_at': '2022-06-29T01:15:00Z'} |
1.4.0 | GHSA-wgrg-5h56-jg27 | 2022-06-17T00:13:59Z | 2022-06-17T00:13:59Z | null | [] | Out-of-bounds write in nix::unistd::getgrouplist | On certain platforms, if a user has more than 16 groups, the
`nix::unistd::getgrouplist` function will call the libc `getgrouplist`
function with a length parameter greater than the size of the buffer it
provides, resulting in an out-of-bounds write and memory corruption.
The libc `getgrouplist` function takes an in/out parameter `ngroups`
specifying the size of the group buffer. When the buffer is too small to
hold all of the reqested user's group memberships, some libc
implementations, including glibc and Solaris libc, will modify `ngroups`
to indicate the actual number of groups for the user, in addition to
returning an error. The version of `nix::unistd::getgrouplist` in nix
0.16.0 and up will resize the buffer to twice its size, but will not
read or modify the `ngroups` variable. Thus, if the user has more than
twice as many groups as the initial buffer size of 8, the next call to
`getgrouplist` will then write past the end of the buffer.
The issue would require editing /etc/groups to exploit, which is usually
only editable by the root user.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_functions': ['nix::unistd::getgrouplist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.20.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_functions': ['nix::unistd::getgrouplist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.0'}, {'fixed': '0.21.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_functions': ['nix::unistd::getgrouplist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.22.0'}, {'fixed': '0.22.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nix-rust/nix/issues/1541'}, {'type': 'PACKAGE', 'url': 'https://github.com/nix-rust/nix'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0119.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:13:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3x96-m42v-hvh5 | 2022-06-29T21:50:47Z | 2022-06-23T00:00:35Z | null | ['CVE-2022-2174'] | Cross-site Scripting in Microweber | Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2174'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c51285f791e48e536111cd57a9544ccbf7f33961'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ac68e3fc-8cf1-4a62-90ee-95c4b2bad607'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:14Z', 'nvd_published_at': '2022-06-22T12:15:00Z'} |
1.4.0 | GHSA-r48q-9g5r-8q2h | 2022-06-17T18:18:04Z | 2022-06-09T00:00:23Z | null | ['CVE-2022-1996'] | Authorization Bypass Through User-Controlled Key in go-restful | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/emicklei/go-restful/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/emicklei/go-restful'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.16.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/emicklei/go-restful/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1996'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/issues/489'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/commit/926662532deb450272956c7bc573978464aae74e'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10'}, {'type': 'PACKAGE', 'url': 'https://github.com/emicklei/go-restful'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0619'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220923-0005/'}] | {'cwe_ids': ['CWE-639'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:21Z', 'nvd_published_at': '2022-06-08T13:15:00Z'} |
1.4.0 | GHSA-m9vj-44f3-78xw | 2022-06-03T15:46:13Z | 2022-06-01T00:00:35Z | null | ['CVE-2022-23082'] | Path traversal in CureKit | CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function `isFileOutsideDir` fails to sanitize the user input which may lead to path traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.whitesource:curekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23082'}, {'type': 'WEB', 'url': 'https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/whitesource/CureKit'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-database/CVE-2022-23082'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:45:42Z', 'nvd_published_at': '2022-05-31T15:15:00Z'} |
1.4.0 | GHSA-h588-76vg-prgj | 2023-02-09T14:20:32Z | 2022-06-16T23:41:29Z | null | [] | `DecimalArray` does not perform bound checks on accessing values and offsets | `DecimalArray` performs insufficient bounds checks, which allows out-of-bounds reads in safe code if the lenght of the backing buffer is not a multiple of 16.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/issues/775'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0117.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:41:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xjfw-5vv5-vjq2 | 2022-06-01T20:25:54Z | 2022-06-01T20:25:54Z | null | ['CVE-2022-29258'] | Cross-site Scripting in Filter Stream Converter Application in XWiki Platform | ### Impact
We found a possible XSS vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application.
### Patches
The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3.
### Workarounds
The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) and change the lines
```
<input type="text" id="$descriptorId" name="$descriptorId" value="#if($request.get($descriptorId))$request.get($descriptorId)#else$descriptor.defaultValue#end"/>
#else
<input type="text" id="$descriptorId" name="$descriptorId"#if($request.get($descriptorId))value="$request.get($descriptorId)"#end/>
```
into
```
<input type="text" id="$descriptorId" name="$descriptorId" value="#if($request.get($descriptorId))$escapetool.xml($request.get($descriptorId))#else$descriptor.defaultValue#end"/>
#else
<input type="text" id="$descriptorId" name="$descriptorId"#if($request.get($descriptorId))value="$escapetool.xml($request.get($descriptorId))"#end/>
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.4'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xjfw-5vv5-vjq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29258'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-19293'}] | {'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:25:54Z', 'nvd_published_at': '2022-05-31T17:15:00Z'} |
1.4.0 | GHSA-p3rc-946h-8cf5 | 2022-12-05T23:33:28Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34175'] | Unauthorized view fragment access in Jenkins | Jenkins uses the Stapler web framework to render its UI views. These views are frequently composed of several view fragments, enabling plugins to extend existing views with more content.
Before [SECURITY-534](https://www.jenkins.io/security/advisory/2019-07-17/#SECURITY-534) was fixed in Jenkins 2.186 and LTS 2.176.2, attackers could in some cases directly access a view fragment containing sensitive information, bypassing any permission checks in the corresponding view.
In Jenkins 2.335 through 2.355 (both inclusive), the protection added for SECURITY-534 is disabled for some views. As a result, attackers could in very limited cases directly access a view fragment containing sensitive information, bypassing any permission checks in the corresponding view.
As of publication, the Jenkins security team is unaware of any vulnerable view fragment across the Jenkins plugin ecosystem.
Jenkins 2.356 restores the protection for affected views.
No Jenkins LTS release is affected by this issue, as it was not present in Jenkins 2.332.x and fixed in the 2.346.x line before 2.346.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.335'}, {'fixed': '2.356'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34175'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2777'}] | {'cwe_ids': ['CWE-693', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:31:06Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-2m7h-86qq-fp4v | 2022-06-21T20:03:23Z | 2022-06-21T20:03:23Z | null | ['CVE-2022-31034'] | Insecure entropy in Argo CD's PKCE/Oauth2/OIDC params | ### Impact
All versions of Argo CD starting with v0.11.0 are vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or UI. The vulnerabilities are due to the use of insufficiently random values in parameters in Oauth2/OIDC login flows. In each case, using a relatively-predictable (time-based) seed in a non-cryptographically-secure pseudo-random number generator made the parameter less random than required by the relevant spec or by general best practices. In some cases, using too short a value made the entropy even less sufficient. (The specific weak parameters are listed in the References section.)
The attacks on login flows which are meant to be mitigated by these parameters are difficult to accomplish but can have a high impact (potentially granting an attacker admin access to Argo CD). The CVSS for this Security Advisory assumes the worst-case scenario.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.4.1
* v2.3.5
* v2.2.10
* v2.1.16
### Workarounds
There are no workarounds. You must upgrade to a patched version to resolve the vulnerability.
### References
These are the insufficiently-random parameters:
1. (since 0.11.0) The [`state` parameter](https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.1) generated by the `argocd login` command for Oauth2 login used a non-cryptographically secure source of entropy and generated a parameter that was too short to provide the entropy [required in the spec](https://datatracker.ietf.org/doc/html/rfc6749#section-10.10). This parameter is a "recommended" part of the Oauth2 flow and helps protect against cross-site request forgery attacks.
2. (since 1.7.2, when PKCE was added) The [`code_verifier` parameter](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1) generated by the `argocd login` command for Oauth2+PKCE login used a non-cryptographically secure source of entropy. The attacks mitigated by PKCE [are complex but have been observed in the wild](https://datatracker.ietf.org/doc/html/rfc7636#section-1).
3. (since 0.11.0) The [`state` parameter](https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.1) generated by the Argo CD API server during a UI-initiated Oauth2 login used a non-cryptographically secure source of entropy and generated a parameter that was too short to provide the entropy [required in the spec](https://datatracker.ietf.org/doc/html/rfc6749#section-10.10). This parameter is a "recommended" part of the Oauth2 flow and helps protect against cross-site request forgery attacks.
4. (since 0.11.0) The [`nonce` parameter](https://openid.net/specs/openid-connect-core-1_0.html#ImplicitAuthRequest) generated by the Argo CD API server during a UI-initiated Oauth2 implicit flow login used a non-cryptographically secure source of entropy and generated a parameter that was too short to provide sufficient entropy. This parameter is a required part of the OIDC implicit login flow and helps protect against replay attacks.
### Credits
Originally discovered by @jgwest. @jannfis and @crenshaw-dev re-discovered the vulnerability when reviewing notes from ADA Logics' security audit of the Argo project sponsored by CNCF and facilitated by OSTIF. Thanks to Adam Korczynski and David Korczynski for their work on the audit.
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}], 'versions': ['2.4.0']}] | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2m7h-86qq-fp4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31034'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/17f7f4f462bdb233e1b9b36f67099f41052d8cb0'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}] | {'cwe_ids': ['CWE-330', 'CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:03:23Z', 'nvd_published_at': '2022-06-27T19:15:00Z'} |
1.4.0 | GHSA-gvxv-p9rv-gmcg | 2022-07-21T15:55:07Z | 2022-06-17T21:46:28Z | null | ['CVE-2022-33156'] | brotkrueml/typo3-matomo-integration vulnerable to Cross-Site Scripting | The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/typo3-matomo-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33156'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/brotkrueml/typo3-matomo-integration/CVE-2022-33156.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/brotkrueml/typo3-matomo-integration'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-011'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:28Z', 'nvd_published_at': '2022-07-12T23:15:00Z'} |
1.4.0 | GHSA-wc36-xgcc-jwpr | 2022-06-17T00:01:02Z | 2022-06-17T00:01:02Z | null | [] | Failure to verify the public key of a `SignedEnvelope` against the `PeerId` in a `PeerRecord` | Affected versions of this crate did not check that the public key the signature was created with matches the peer ID of the peer record.
Any combination was considered valid.
This allows an attacker to republish an existing `PeerRecord` with a different `PeerId`.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'libp2p-core'}, 'ecosystem_specific': {'affected_functions': ['libp2p_core::PeerRecord::from_signed_envelope']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.30.0-rc.1'}, {'fixed': '0.30.2'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/libp2p/rust-libp2p'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0009.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:01:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3x3w-vcjx-7796 | 2022-06-08T22:28:13Z | 2022-06-08T00:00:41Z | null | ['CVE-2020-36534'] | Cross-Site Request Forgery in easyii CMS | A vulnerability was found in easyii CMS. It has been classified as problematic. Affected is an unknown function of the file /admin/sign/out. The manipulation leads to cross site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'noumo/easyii'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36534'}, {'type': 'WEB', 'url': 'https://github.com/noumo/easyii/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/noumo/easyii/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.160278'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:13Z', 'nvd_published_at': '2022-06-07T18:15:00Z'} |
1.4.0 | GHSA-g28x-pgr3-qqx6 | 2022-07-13T19:19:18Z | 2022-06-15T21:24:16Z | null | ['CVE-2022-31072'] | Octokit gem published with world-writable files | ### Impact
Versions [4.23.0](https://rubygems.org/gems/octokit/versions/4.23.0) and [4.24.0](https://rubygems.org/gems/octokit/versions/4.24.0) of the octokit gem were published containing world-writeable files.
Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem.
Malicious code already present and running on your machine, separate from this package, could modify the gem’s files and change its behavior during runtime.
### Patches
* [octokit 4.25.0](https://rubygems.org/gems/octokit/versions/4.25.0)
### Workarounds
Users can use the previous version of the gem [v4.22.0](https://rubygems.org/gems/octokit/versions/4.22.0). Alternatively, users can modify the file permissions manually until they are able to upgrade to the latest version.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'octokit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.23.0'}, {'fixed': '4.25.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octokit/octokit.rb/security/advisories/GHSA-g28x-pgr3-qqx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31072'}, {'type': 'WEB', 'url': 'https://github.com/octokit/octokit.rb/commit/1c8edecc9cf23d1ceb959d91a416a69f55ce7d55'}, {'type': 'PACKAGE', 'url': 'https://github.com/octokit/octokit.rb'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/octokit/CVE-2022-31072.yml'}] | {'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-15T21:24:16Z', 'nvd_published_at': '2022-06-15T23:15:00Z'} |
1.4.0 | GHSA-x938-fvfw-7jh5 | 2022-06-25T07:11:05Z | 2022-06-25T07:11:05Z | null | ['CVE-2022-31077'] | CloudCore CSI Driver: Malicious response from KubeEdge can crash CSI Driver controller server | ### Impact
A malicious message response from KubeEdge can crash the CSI Driver controller server by triggering a nil-pointer dereference panic. As a consequence, the CSI Driver controller will be in denial of service. An attacker would already need to be an authenticated user of the Cloud, and only when the authenticated user launches the `csidriver` then CloudCore may be attacked.
### Patches
This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue.
### Workarounds
At the time of writing, no workaround exists.
### References
NA
### Credits
Thanks David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the [kubeedge security policy](https://github.com/kubeedge/kubeedge/security/policy) during a security audit sponsored by CNCF and facilitated by OSTIF.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [KubeEdge repo](https://github.com/kubeedge/kubeedge/issues/new/choose)
* To make a vulnerability report, email your vulnerability to the private [cncf-kubeedge-security@lists.cncf.io](mailto:cncf-kubeedge-security@lists.cncf.io) list with the security details and the details expected for [KubeEdge bug reports](https://github.com/kubeedge/kubeedge/blob/master/.github/ISSUE_TEMPLATE/bug-report.md).
**Notes:** This vulnerability was found by fuzzing KubeEdge by way of OSS-Fuzz. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-x938-fvfw-7jh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31077'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/3899'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/3899/commits/5d60ae9eabd6b6b7afe38758e19bbe8137664701'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubeedge/kubeedge'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:11:05Z', 'nvd_published_at': '2022-06-27T21:15:00Z'} |
1.4.0 | GHSA-fvxf-r9fw-49pc | 2022-09-01T20:10:12Z | 2022-06-17T21:44:39Z | null | ['CVE-2022-29865'] | Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that
- allows a malicious client or server to bypass the application authentication mechanism
- and allow a connection to an untrusted peer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29865'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/security/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:39Z', 'nvd_published_at': '2022-06-16T17:15:00Z'} |
1.4.0 | GHSA-gm48-83x4-84jg | 2022-06-17T19:20:46Z | 2022-06-10T00:00:56Z | null | ['CVE-2022-24969'] | Server-side request forgery in Apache Dubbo | bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25640'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24969'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gw4j-4229-q4px'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1xbckc3467wfk5r7n2o44r2brdsbwxgr'}] | {'cwe_ids': ['CWE-601', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:04Z', 'nvd_published_at': '2022-06-09T16:15:00Z'} |
1.4.0 | GHSA-pv7h-hx5h-mgfj | 2022-06-20T21:58:53Z | 2022-06-11T00:00:17Z | null | ['CVE-2022-25845'] | Unsafe deserialization in com.alibaba:fastjson | The package com.alibaba:fastjson before 1.2.83 is vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:fastjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.83'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25845'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15'}, {'type': 'PACKAGE', 'url': 'https://github.com/alibaba/fastjson'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/releases/tag/1.2.83'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/wiki/security_update_20220523'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222'}, {'type': 'WEB', 'url': 'https://www.ddosi.org/fastjson-poc/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:58:22Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-v25c-8349-v2q3 | 2022-06-29T22:03:36Z | 2022-06-15T00:00:27Z | null | ['CVE-2021-40616'] | Incorrect Authorization in thinkcmf | thinkcmf v5.1.7 has an unauthorized vulnerability. The attacker can modify the password of the administrator account with id 1 through the background user management group permissions. The use condition is that the background user management group authority is required. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thinkcmf/thinkcmf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40616'}, {'type': 'WEB', 'url': 'https://github.com/thinkcmf/thinkcmf/issues/722'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkcmf/thinkcmf'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:03:36Z', 'nvd_published_at': '2022-06-14T10:15:00Z'} |
1.4.0 | GHSA-7f7g-8q3x-jpx9 | 2022-06-29T22:41:51Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20059'] | Cross site scripting in Elefant CMS | A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20059'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97256'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:41:51Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-8f4f-v9x5-cg6j | 2022-06-25T07:19:34Z | 2022-06-25T07:19:34Z | null | ['CVE-2022-31076'] | CloudCore UDS Server: Malicious Message can crash CloudCore | ### Impact
A malicious message can crash CloudCore by triggering a null-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud.
It will be affected only when users turn on the unixsocket switch in the config file `cloudcore.yaml` as below:
```
modules:
cloudHub:
...
unixsocket:
address: xxx
enable: true
```
### Patches
This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue.
### Workarounds
Disable the unixsocket switch of CloudHub in the config file `cloudcore.yaml`.
### References
NA
### Credits
Thanks David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the [kubeedge security policy](https://github.com/kubeedge/kubeedge/security/policy) during a security audit sponsored by CNCF and facilitated by OSTIF.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [KubeEdge repo](https://github.com/kubeedge/kubeedge/issues/new/choose)
* To make a vulnerability report, email your vulnerability to the private [cncf-kubeedge-security@lists.cncf.io](mailto:cncf-kubeedge-security@lists.cncf.io) list with the security details and the details expected for [KubeEdge bug reports](https://github.com/kubeedge/kubeedge/blob/master/.github/ISSUE_TEMPLATE/bug-report.md).
**Notes:** This vulnerability was found by fuzzing KubeEdge by way of OSS-Fuzz. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-8f4f-v9x5-cg6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31076'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/3899/commits/5d60ae9eabd6b6b7afe38758e19bbe8137664701'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubeedge/kubeedge'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:19:34Z', 'nvd_published_at': '2022-06-27T20:15:00Z'} |
1.4.0 | GHSA-7f3x-x4pr-wqhj | 2022-07-07T17:15:41Z | 2022-06-28T00:01:02Z | null | ['CVE-2022-2216'] | Server-Side Request Forgery in parse-url | Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2216'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:07:53Z', 'nvd_published_at': '2022-06-27T12:15:00Z'} |
1.4.0 | GHSA-r67p-m7g9-gxw6 | 2022-06-16T23:51:58Z | 2022-06-16T23:51:58Z | null | [] | `Read` on uninitialized memory may cause UB (fn preamble_skipcount()) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation (within `fn preamble_skipcount()`).
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'csv-sniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/pull/2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0088.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:51:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r7cj-wmwv-hfw5 | 2022-06-16T23:40:50Z | 2022-06-16T23:40:50Z | null | [] | `BinaryArray` does not perform bound checks on reading values and offsets | `BinaryArray` performs insufficient validation on creation, which allows out-of-bounds reads in safe code.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs'}, {'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/blob/6.4.0/CHANGELOG.md#640-2021-12-10'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0116.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f4q6-9qm4-h8j4 | 2022-06-09T23:48:49Z | 2022-06-09T23:48:49Z | null | ['CVE-2022-24065'] | OS Command Injection in cookiecutter | The package cookiecutter before 2.1.1 is vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cookiecutter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24065'}, {'type': 'WEB', 'url': 'https://github.com/cookiecutter/cookiecutter/commit/fdffddb31fd2b46344dfa317531ff155e7999f77'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f4q6-9qm4-h8j4'}, {'type': 'PACKAGE', 'url': 'https://github.com/cookiecutter/cookiecutter'}, {'type': 'WEB', 'url': 'https://github.com/cookiecutter/cookiecutter/releases/tag/2.1.1'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/cookiecutter/PYSEC-2022-204.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5TXC4JYTNGOUFMCXPZ6QKWEZN3URTAK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWT7SGFDCUPPLDIELTN7FVTHWDL5YK/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:48:49Z', 'nvd_published_at': '2022-06-08T08:15:00Z'} |
1.4.0 | GHSA-72p8-v4hg-v45p | 2022-06-15T18:57:58Z | 2022-06-01T19:50:15Z | null | ['CVE-2022-29245'] | Weak private key generation in SSH.NET | During an **X25519** key exchange, the client’s private is generated with [**System.Random**](https://docs.microsoft.com/en-us/dotnet/api/system.random):
```cs
var rnd = new Random();
_privateKey = new byte[MontgomeryCurve25519.PrivateKeySizeInBytes];
rnd.NextBytes(_privateKey);
```
Source: [KeyExchangeECCurve25519.cs](https://github.com/sshnet/SSH.NET/blob/bc99ada7da3f05f50d9379f2644941d91d5bf05a/src/Renci.SshNet/Security/KeyExchangeECCurve25519.cs#L51)
Source commit: https://github.com/sshnet/SSH.NET/commit/b58a11c0da55da1f5bad46faad2e9b71b7cb35b3
[**System.Random**](https://docs.microsoft.com/en-us/dotnet/api/system.random) is not a cryptographically secure random number generator, it must therefore not be used for cryptographic purposes.
### Impact
When establishing an SSH connection to a remote host, during the X25519 key exchange, the private key is generated with
a weak random number generator whose seed can be bruteforced. This allows an attacker able to eavesdrop the
communications to decrypt them.
### Workarounds
To ensure you're not affected by this vulnerability, you can disable support for `curve25519-sha256` and `curve25519-sha256@libssh.org` key exchange algorithms by invoking the following method before a connection is established:
```cs
private static void RemoveUnsecureKEX(BaseClient client)
{
client.ConnectionInfo.KeyExchangeAlgorithms.Remove("curve25519-sha256");
client.ConnectionInfo.KeyExchangeAlgorithms.Remove("curve25519-sha256@libssh.org");
}
```
### Thanks
This issue was initially reported by **Siemens AG, Digital Industries**, shortly followed by @yaumn-synacktiv. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'SSH.NET'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2020.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/security/advisories/GHSA-72p8-v4hg-v45p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29245'}, {'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/commit/03c6d60736b8f7b42e44d6989a53f9b644a091fb'}, {'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/commit/f1f273cf349532b9d41c1de51d3b83a9accedc88'}, {'type': 'PACKAGE', 'url': 'https://github.com/sshnet/SSH.NET'}, {'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/blob/bc99ada7da3f05f50d9379f2644941d91d5bf05a/src/Renci.SshNet/Security/KeyExchangeECCurve25519.cs#L51'}, {'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/releases/tag/2020.0.2'}] | {'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:50:15Z', 'nvd_published_at': '2022-05-31T17:15:00Z'} |
1.4.0 | GHSA-rwf4-gx62-rqfw | 2022-06-08T22:28:27Z | 2022-06-08T22:28:27Z | null | [] | `MsQueue` `push`/`pop` use the wrong orderings | Affected versions of this crate use orderings which are too weak to support this data structure.
It is likely this has caused memory corruption in the wild: <https://github.com/crossbeam-rs/crossbeam/issues/97#issuecomment-412785919>.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/issues/97#issuecomment-412785919'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/98'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0029.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq8j-3h7h-p8g7 | 2022-06-16T23:14:33Z | 2022-06-16T23:14:33Z | null | ['CVE-2022-29247'] | Compromised child renderer processes could obtain IPC access without nodeIntegrationInSubFrames being enabled | ### Impact
This vulnerability allows a renderer with JS execution to obtain access to a new renderer process with `nodeIntegrationInSubFrames` enabled which in turn allows effective access to `ipcRenderer`.
Please note the misleadingly named `nodeIntegrationInSubFrames` option does not implicitly grant Node.js access rather it depends on the existing `sandbox` setting. If your application is sandboxed then `nodeIntegrationInSubFrames` just gives access to the sandboxed renderer APIs (which includes `ipcRenderer`).
If your application then additionally exposes IPC messages without IPC `senderFrame` validation that perform privileged actions or return confidential data this access to `ipcRenderer` can in turn compromise your application / user even with the sandbox enabled.
### Patches
This has been patched and the following Electron versions contain the fix:
* `18.0.0-beta.6`
* `17.2.0`
* `16.2.6`
* `15.5.5`
### Workarounds
Ensure that all IPC message handlers appropriately validate `senderFrame` as per our [security tutorial here](https://github.com/electron/electron/blob/main/docs/tutorial/security.md#17-validate-the-sender-of-all-ipc-messages).
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.5.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.2.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.0'}, {'fixed': '17.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0-beta.1'}, {'fixed': '18.0.0-beta.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 18.0.0-beta.5'}}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-mq8j-3h7h-p8g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29247'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}] | {'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:14:33Z', 'nvd_published_at': '2022-06-13T21:15:00Z'} |
1.4.0 | GHSA-p9p4-97g9-wcrh | 2022-06-03T22:19:23Z | 2022-06-03T22:19:23Z | null | ['CVE-2022-31023'] | Dev error stack trace leaking into prod in Play Framework | ### Impact
Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configured to always show verbose errors. This is used as a default value in some Play APIs, so it is possible to inadvertently use this version in production. It is also possible to improperly configure the `DefaultHttpErrorHandler` object instance as the injected error handler. Both of these situations could result in verbose errors displaying to users in a production application, which could expose sensitive information from the application.
In particular the constructor for `CORSFilter` and `apply` method for `CORSActionBuilder` use the static object `DefaultHttpErrorHandler` as a default value.
### Patches
This is patched in Play Framework 2.8.16. The `DefaultHttpErrorHandler` object has been changed to use the prod-mode behavior, and `DevHttpErrorHandler` has been introduced for the dev-mode behavior.
### Workarounds
When constructing a `CORSFilter` or `CORSActionBuilder`, ensure that a properly-configured error handler is passed. Generally this should be done by using the `HttpErrorHandler` instance provided through dependency injection or through Play's `BuiltInComponents`. Ensure that your application is not using the `DefaultHttpErrorHandler` static object in any code that may be run in production.
### References
https://www.playframework.com/documentation/2.8.x/ScalaErrorHandling#Supplying-a-custom-error-handler
https://www.playframework.com/documentation/2.8.x/JavaErrorHandling#Supplying-a-custom-error-handler
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [playframework/playframework](https://github.com/playframework/playframework/)
* Email us at [example email address](mailto:example@example.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.16'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31023'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/11305'}, {'type': 'PACKAGE', 'url': 'https://github.com/playframework/playframework'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/releases/tag/2.8.16'}] | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:19:23Z', 'nvd_published_at': '2022-06-02T18:15:00Z'} |
1.4.0 | GHSA-4v9q-cgpw-cf38 | 2023-06-03T00:38:54Z | 2022-06-06T21:23:58Z | null | ['CVE-2022-29255'] | Multiple evaluation of contract address in call in vyper | ### Impact
when a calling an external contract with no return value, the contract address could be evaluated twice. this is usually only an efficiency problem, but if evaluation of the contract address has side effects, it could result in double evaluation of the side effects.
in the following example, `Foo(msg.sender).bar()` is the contract address for the following call (to `.foo()`), and could get evaluated twice
```vyper
interface Foo:
def foo(): nonpayable
def bar() -> address: nonpayable
@external
def do_stuff():
Foo(Foo(msg.sender).bar()).foo()
```
### Patches
6b4d8ff185de071252feaa1c319712b2d6577f8d
### Workarounds
assign contract addresses to variables. the above example would change to
```vyper
@external
def do_stuff():
t: Foo = Foo(msg.sender).bar()
t.foo()
```
### References
### For more information
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['vyper.codegen.external_call.ir_for_external_call']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4v9q-cgpw-cf38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29255'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/6b4d8ff185de071252feaa1c319712b2d6577f8d'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-43053.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}] | {'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:23:58Z', 'nvd_published_at': '2022-06-09T09:15:00Z'} |
1.4.0 | GHSA-6882-385p-hhhw | 2022-12-05T22:13:12Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34192'] | Cross-site Scripting in Jenkins ontrack Jenkins Plugin | Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ontrack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34192'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ontrack-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:10Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-f2wf-25xc-69c9 | 2022-06-20T21:56:53Z | 2022-06-09T23:47:25Z | null | ['CVE-2022-31042'] | Failure to strip the Cookie header on change in host or HTTP downgrade | ### Impact
`Cookie` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie` header on. Prior to this fix, only cookies that were managed by our cookie middleware would be safely removed, and any `Cookie` header manually added to the initial request would not be stripped. We now always strip it, and allow the cookie middleware to re-add any cookies that it deems should be there.
### Patches
Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4.
### Workarounds
An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.
### References
* [RFC9110 Section 15.4](https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx)
### For more information
If you have any questions or comments about this advisory, please get in touch with us in `#guzzle` on the [PHP HTTP Slack](https://php-http.slack.com/). Do not report additional security advisories in that public channel, however - please follow our [vulnerability reporting process](https://github.com/guzzle/guzzle/security/policy).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.5.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31042'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31042.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/guzzle/guzzle'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5246'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-011'}, {'type': 'WEB', 'url': 'https://www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx'}] | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:47:25Z', 'nvd_published_at': '2022-06-10T00:15:00Z'} |
1.4.0 | GHSA-xpww-g9jx-hp8r | 2022-06-17T00:19:35Z | 2022-06-17T00:19:35Z | null | [] | Miscomputed sha2 results when using AVX2 backend | The v0.9.7 release of the `sha2` crate introduced a new AVX2-accelerated
backend which was automatically enabled for all x86/x86_64 CPUs where AVX2
support was autodetected at runtime.
This backend was buggy and would miscompute results for long messages
(i.e. messages spanning multiple SHA blocks).
The crate has since been yanked, but any users who upgraded to v0.9.7 should
immediately upgrade to v0.9.8 and recompute any hashes which were previously
computed by v0.9.7.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'sha2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.9.8'}]}], 'versions': ['0.9.7']}] | [{'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0100.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:19:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p782-xgp4-8hr8 | 2023-08-30T10:04:35Z | 2022-06-24T00:00:30Z | null | ['CVE-2022-29526'] | golang.org/x/sys/unix has Incorrect privilege reporting in syscall | Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Reporting in syscall. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/sys/unix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220412211240-33da011f77ad'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/sys'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220412211240-33da011f77ad'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29526'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/52313'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https://go.dev/cl/399539'}, {'type': 'WEB', 'url': 'https://go.dev/cl/400074'}, {'type': 'WEB', 'url': 'https://go.dev/issue/52313'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6GE5EQGE4L2KRVGW4T75QVIYAXCLO5X/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0493'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-02'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0001/'}] | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:30:54Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-hrf3-622q-8366 | 2022-06-22T21:22:46Z | 2022-06-22T21:22:46Z | null | ['CVE-2022-31605'] | Unsafe yaml deserialization in NVFlare | ### Impact
NVFLARE contains a vulnerability in its utils module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of Untrusted Data, may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
All versions before 2.1.2 are affected.
CVSS Score = 9.8
[AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln-metrics%2Fcvss%2Fv3-calculator%3Fvector%3DAV%3AN%2FAC%3AL%2FPR%3AN%2FUI%3AN%2FS%3AU%2FC%3AH%2FI%3AH%2FA%3AH&data=05%7C01%7Cchesterc%40nvidia.com%7Ce9600bde16854b0b380008da4fc544f7%7C43083d15727340c1b7db39efd9ccc17a%7C0%7C0%7C637910005925574215%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5kBrXEmAbqp8R31JCH%2FG95MUly72UPVihnBwiRFmvBY%3D&reserved=0)
### Patches
The patch will be included in nvflare==2.1.2
### Workarounds
Change yaml.load() to yaml.safe_load()
### Additional information
Issue Found by: Oliver Sellwood (@Nintorac)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.lighter.provision.main', 'nvflare.lighter.utils.load_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-hrf3-622q-8366'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31605'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/4de9782697ecb12f39bcae83221bd8d3498959be'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NVFlare'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/nvflare/PYSEC-2022-232.yaml'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T21:22:46Z', 'nvd_published_at': '2022-07-01T18:15:00Z'} |
1.4.0 | GHSA-5247-whvj-83qw | 2022-12-05T22:15:47Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34190'] | Cross-site Scripting in Jenkins Maven Metadata Plugin | Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'eu.markov.jenkins.plugin.mvnmeta:maven-metadata-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34190'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-metadata-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:17Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-7xhv-mpjw-422f | 2022-06-15T19:45:17Z | 2022-06-03T00:00:59Z | null | ['CVE-2021-34083'] | Command injection in google-it | Google-it is a Node.js package which allows its users to send search queries to Google and receive the results in a JSON format. When using the 'Open in browser' option in versions up to 1.6.2, google-it will unsafely concat the result's link retrieved from google to a shell command, potentially exposing the server to RCE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'google-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34083'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4777'}, {'type': 'PACKAGE', 'url': 'https://github.com/PatNeedham/google-it'}, {'type': 'WEB', 'url': 'https://github.com/PatNeedham/google-it/blob/v1.6.2/lib/googleIt.js#L59'}, {'type': 'WEB', 'url': 'https://github.com/PatNeedham/google-it/blob/v1.6.2/src/googleIt.js#L34'}] | {'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:23:45Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-rh9j-f5f8-rvgc | 2022-06-20T21:20:53Z | 2022-06-17T22:09:09Z | null | ['CVE-2022-31083'] | Authentication bypass vulnerability in Apple Game Center auth adapter | ### Impact
The certificate in Apple Game Center auth adapter not validated. As a result, authentication could potentially be bypassed by making a fake certificate accessible via certain Apple domains and providing the URL to that certificate in an authData object.
### Patches
To prevent this, a new `rootCertificateUrl` property is introduced to the Parse Server Apple Game Center auth adapter which takes the URL to the root certificate of Apple's Game Center authentication certificate. If no value is set, the `rootCertificateUrl` property defaults to the URL of the [current root certificate](https://developer.apple.com/news/?id=stttq465) as of May 27, 2022.
Keep in mind that the root certificate can change at any time (expected to be announced by Apple) and that it is the developer's responsibility to keep the root certificate URL up-to-date when using the Parse Server Apple Game Center auth adapter.
### Workarounds
None.
### References
- https://github.com/parse-community/parse-server/security/advisories/GHSA-rh9j-f5f8-rvgc
- https://developer.apple.com/news/?id=stttq465
- https://github.com/parse-community/parse-server
### More information
* For questions or comments about this vulnerability visit our [community forum](http://community.parseplatform.org) or [community chat](http://chat.parseplatform.org)
* Report other vulnerabilities at [report.parseplatform.org](https://report.parseplatform.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-rh9j-f5f8-rvgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31083'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8054'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8054/commits/0cc299f82e367518f2fe7a53b99f3f801a338cf4'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8054/commits/2084b7c569697a5230e42511799eeac9219db5a9'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/ba2b0a9cb9a568817a114b132a4c2e0911d76df1'}, {'type': 'WEB', 'url': 'https://developer.apple.com/news/?id=stttq465'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}] | {'cwe_ids': ['CWE-287', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:09:09Z', 'nvd_published_at': '2022-06-17T19:15:00Z'} |
1.4.0 | GHSA-jq66-xh47-j9f3 | 2023-08-25T00:12:18Z | 2022-06-16T23:06:58Z | null | ['CVE-2020-25575'] | Type confusion if __private_get_type_id__ is overriden | An issue was discovered in the failure crate through 0.1.5 for Rust. It has a type confusion flaw when downcasting. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'streebog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'failure'}, 'ecosystem_specific': {'affected_functions': ['failure::Fail::__private_get_type_id__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25575'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang-nursery/failure/issues/336'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/91'}, {'type': 'WEB', 'url': 'https://boats.gitlab.io/blog/post/failure-to-fehler/'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/blob/main/crates/failure/RUSTSEC-2019-0036.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0030.html'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0036.html'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0036.html'}] | {'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:06:58Z', 'nvd_published_at': '2020-09-14T19:15:00Z'} |
1.4.0 | GHSA-jvq4-cgfw-jgf4 | 2022-06-20T21:57:36Z | 2022-06-12T00:00:44Z | null | ['CVE-2021-41502'] | Cross site scripting in intelliants/subrion | An issue was discovered in Subrion CMS v4.2.1 There is a stored cross-site scripting (XSS) vulnerability that can execute malicious JavaScript code by modifying the name of the uploaded image, closing the html tag, or adding the onerror attribute. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41502'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/885'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:01:26Z', 'nvd_published_at': '2022-06-11T14:15:00Z'} |
1.4.0 | GHSA-xcp5-j5fj-3xp6 | 2022-12-05T21:52:48Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34202'] | User passwords stored in plain text by Jenkins EasyQA Plugin | EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file `EasyQAPluginProperties.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34202'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2066'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:55Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-9c9f-7x9p-4wqp | 2022-06-17T00:16:11Z | 2022-06-17T00:16:11Z | null | [] | A malicious coder can get unsound access to TCell or TLCell memory | This is impossible to do by accident, but by carefully constructing
marker types to be covariant, a malicious coder can cheat the
singleton check in `TCellOwner` and `TLCellOwner`, giving unsound
access to cell memory. This could take the form of getting two
mutable references to the same memory, or a mutable reference and an
immutable reference.
The fix is for the crate to internally force the marker type to be
invariant. This blocks the conversion between covariant types which
Rust normally allows.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'qcell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/uazu/qcell/issues/20'}, {'type': 'PACKAGE', 'url': 'https://github.com/uazu/qcell'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0007.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:16:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g377-x8rg-c9mf | 2022-07-12T21:24:07Z | 2022-06-30T00:00:41Z | null | ['CVE-2022-33107'] | Deserialization of Untrusted Data in topthink/framework | ThinkPHP v6.0.12 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\AbstractCache.php. This vulnerability allows attackers to execute arbitrary code via a crafted payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33107'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2717'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:24:07Z', 'nvd_published_at': '2022-06-29T12:15:00Z'} |
1.4.0 | GHSA-v68g-62v9-39w5 | 2022-07-13T19:56:53Z | 2022-06-29T22:40:16Z | null | ['CVE-2022-29858'] | Unpublished, protected files can be published via shortcode | Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content. Draft protected images can be published by changing an existing image shortcode on website content to match the ID of the draft protected image and then publishing the website content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/assets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29858'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/assets/CVE-2022-29858.yaml'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-29858'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:40:16Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-438w-rjj9-5fjf | 2022-12-05T22:01:57Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34195'] | Cross-site Scripting in Jenkins Repository Connector Plugin | Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34195'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repository-connector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:05Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-4whx-7p29-mq22 | 2022-06-06T21:22:28Z | 2022-06-06T21:22:28Z | null | ['CVE-2022-31011'] | TiDB authentication bypass vulnerability | ### Impact
Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access.
Only users using TiDB 5.3.0 are affected by this vulnerability.
### Patches
Please upgrade to TiDB 5.3.1 or higher version
### Workarounds
You can also mitigate risks by taking the following measures.
Option 1: Turn off SEM (Security Enhanced Mode).
Option 2: Disable local login for non-root accounts and ensure that the same IP cannot be logged in as root or normal user at the same time.
### References
https://en.pingcap.com/download/
### For more information
If you have any questions or comments about this advisory:
* Email us at security@tidb.io
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pingcap/tidb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.1'}]}], 'versions': ['5.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/security/advisories/GHSA-4whx-7p29-mq22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31011'}, {'type': 'PACKAGE', 'url': 'https://github.com/pingcap/tidb'}, {'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/releases/tag/v5.3.1'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:22:28Z', 'nvd_published_at': '2022-05-31T20:15:00Z'} |
1.4.0 | GHSA-fh99-4pgr-8j99 | 2022-06-17T20:55:14Z | 2022-06-17T20:55:14Z | null | ['CVE-2022-31047'] | Insertion of Sensitive Information into Log File in typo3/cms-core | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
It has been discovered that system internal credentials or keys (e.g. database credentials) have been logged as plaintext in exception handlers, when logging the complete exception stack trace.
### Solution
Update to TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.
### Credits
Thanks to Marco Huber who reported this issue and to TYPO3 security member Torben Hansen who fixed the issue.
### References
* [TYPO3-CORE-SA-2022-002](https://typo3.org/security/advisory/typo3-core-sa-2022-002) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.57'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.47'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31047'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31047.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-002'}] | {'cwe_ids': ['CWE-209', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:55:14Z', 'nvd_published_at': '2022-06-14T21:15:00Z'} |
1.4.0 | GHSA-9w9f-6mg8-jp7w | 2023-02-14T21:38:16Z | 2022-06-03T22:17:51Z | null | ['CVE-2022-31022'] | Missing Role Based Access Control for the REST handlers in bleve/http package | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Bleve includes HTTP utilities under bleve/http package, that are used by its sample application.
(https://github.com/blevesearch/bleve-explorer)
These HTTP methods paves way for exploitation of a node’s filesystem where the bleve index resides,
if the user has used bleve’s own HTTP (bleve/http) handlers for exposing the access to the indexes.
For instance, the CreateIndexHandler (http/index_create.go) and DeleteIndexHandler (http/index_delete.go)
enable an attacker to create a bleve index (directory structure) anywhere where the user running the server
has the write permissions and to delete recursively any directory owned by the same user account.
Users who have used the bleve/http package for exposing access to bleve index without the explicit
handling for the Role Based Access Controls(RBAC) of the index assets would be impacted.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
**No**. The http package is purely intended to be used for demonstration purposes.
And bleve is never designed to be handling the RBACs or it was ever advertised to be used in that way.
Hence the collaborators of this project have decided to stay away from adding any authentication or
authorization to bleve project at the moment.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
The bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user
inputs as well as any authentication and authorization measures.
So it is recommended to not use that in production use cases.
### For more information
If you have any questions or comments about this advisory:
* Open an issue [here](https://github.com/blevesearch/bleve/issues).
* Email us at [mailto:security@couchbase.com, fts-team@couchbase.com].
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/blevesearch/bleve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/blevesearch/bleve/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/blevesearch/bleve/security/advisories/GHSA-9w9f-6mg8-jp7w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31022'}, {'type': 'WEB', 'url': 'https://github.com/blevesearch/bleve/commit/1c7509d6a17d36f265c90b4e8f4e3a3182fe79ff'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0470'}, {'type': 'PACKAGE', 'url': 'github.com/blevesearch/bleve'}] | {'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:17:51Z', 'nvd_published_at': '2022-06-01T20:15:00Z'} |
1.4.0 | GHSA-wwjw-r3gj-39fq | 2022-06-24T19:54:44Z | 2022-06-17T20:57:27Z | null | ['CVE-2022-31050'] | Insufficient Session Expiration in TYPO3's Admin Tool | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.6)
### Problem
Admin Tool sessions initiated via the TYPO3 backend user interface have not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit.
### Solution
Update to TYPO3 versions 9.5.35 ELTS, 10.4.29, 11.5.11 that fix the problem described above.
### Credits
Thanks to Kien Hoang who reported this issue and to TYPO3 framework merger Ralf Zimmermann and TYPO3 security member Oliver Hader who fixed the issue.
### References
* [TYPO3-CORE-SA-2022-005](https://typo3.org/security/advisory/typo3-core-sa-2022-005) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31050'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-31050.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2022-005'}] | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:57:27Z', 'nvd_published_at': '2022-06-14T21:15:00Z'} |
1.4.0 | GHSA-pm37-5j5m-6cvw | 2022-06-29T21:50:35Z | 2022-06-22T00:00:55Z | null | ['CVE-2022-30874'] | Cross-site Scripting in NukeViet CMS | There is a Cross Site Scripting Stored (XSS) vulnerability in NukeViet CMS before 4.5.02. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.02'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30874'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/commit/1f328bb8cd256f88bd45fc3ec5a50ae951da2501'}, {'type': 'PACKAGE', 'url': 'https://github.com/nukeviet/nukeviet'}, {'type': 'WEB', 'url': 'https://nukeviet.vn/vi/news/Tin-tuc/thong-bao-phat-hanh-nukeviet-4-5-02-708.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:43:10Z', 'nvd_published_at': '2022-06-21T15:15:00Z'} |
1.4.0 | GHSA-29q6-p2cg-4v23 | 2022-12-05T23:27:46Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34177'] | Arbitrary file write vulnerability in Jenkins Pipeline: Input Step Plugin | Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier allows Pipeline authors to specify `file` parameters for Pipeline `input` steps even though they are unsupported. Although the uploaded file is not copied to the workspace, Jenkins archives the file on the controller as part of build metadata using the parameter name without sanitization as a relative path inside a build-related directory.
This allows attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
Pipeline: Input Step Plugin 449.v77f0e8b_845c4 prohibits use of `file` parameters for Pipeline `input` steps. Attempts to use them will fail Pipeline execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '449.v77f0e8b'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34177'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin/commit/77f0e8b845c4ad429f6c717eab21cf4e7a69168e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2705'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:27Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-56j7-2pm8-rgmx | 2022-06-02T20:52:23Z | 2022-06-02T20:52:23Z | null | ['CVE-2021-32546'] | OS Command Injection in gogs | ### Impact
The malicious user is able to update a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.
### Patches
Repository file updates are prohibited to its `.git` directory. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
### Workarounds
N/A
### References
N/A
### For more information
If you have any questions or comments about this advisory, please post on #6555.
| [] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-56j7-2pm8-rgmx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32546'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6555'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6986'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/releases'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/releases/tag/v0.12.8'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:52:23Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-h6wm-mr85-4h9g | 2022-06-23T21:25:22Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2066'] | Cross site scripting in facturascripts | A Cross-site Scripting (XSS) vulnerability exists in the fsNick parameter in facturascripts prior to version 2022.06 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2066'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/73a6595ca85984d65f656c6356fabb23d1936c54'}, {'type': 'PACKAGE', 'url': 'https://github.com/NeoRazorX/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da4bbbfd-501f-4c7e-be83-47778103cb59'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:07:55Z', 'nvd_published_at': '2022-06-13T13:15:00Z'} |
1.4.0 | GHSA-23f2-vgr6-fwv7 | 2022-06-03T22:28:53Z | 2022-06-03T00:01:06Z | null | ['CVE-2022-29712'] | Command injection in librenms | LibreNMS v22.3.0 was discovered to contain multiple command injection vulnerabilities via the service_ip, hostname, and service_param parameters. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29712'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13932'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8b82341cb742e7bd4966964b399012f7ba017e0b'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:28:53Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-mpg5-fvwp-42m2 | 2022-06-16T23:52:24Z | 2022-06-16T23:52:24Z | null | [] | Unsoundness in `dashmap` references | Reference returned by some methods of `Ref` (and similar types) may outlive the `Ref` and escape the lock.
This causes undefined behavior and may result in a segfault.
More information in [`dashmap#167`](https://github.com/xacrimon/dashmap/issues/167) issue.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'dashmap'}, 'ecosystem_specific': {'affected_functions': ['dashmap::mapref::multiple::RefMulti::key', 'dashmap::mapref::multiple::RefMulti::pair', 'dashmap::mapref::multiple::RefMulti::value', 'dashmap::mapref::multiple::RefMutMulti::key', 'dashmap::mapref::multiple::RefMutMulti::pair', 'dashmap::mapref::multiple::RefMutMulti::pair_mut', 'dashmap::mapref::one::Ref::key', 'dashmap::mapref::one::Ref::pair', 'dashmap::mapref::one::Ref::value', 'dashmap::mapref::one::RefMut::key', 'dashmap::mapref::one::RefMut::pair', 'dashmap::mapref::one::RefMut::pair_mut', 'dashmap::setref::multiple::RefMulti::key', 'dashmap::setref::one::Ref::key']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.0'}]}], 'versions': ['5.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/xacrimon/dashmap/issues/167'}, {'type': 'PACKAGE', 'url': 'https://github.com/xacrimon/dashmap'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0002.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:52:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-526x-rm7j-v389 | 2022-06-14T20:05:46Z | 2022-06-03T00:01:07Z | null | ['CVE-2022-30324'] | Privilege escalation in Hashicorp Nomad | HashiCorp Nomad and Nomad Enterprise version 0.2.0 up to 1.3.0 were impacted by go-getter vulnerabilities enabling privilege escalation through the artifact stanza in submitted jobs onto the client agent host. Fixed in 1.1.14, 1.2.8, and 1.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.1.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30324'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-14-nomad-impacted-by-go-getter-vulnerabilities/39932'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:30:32Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-xggc-qprg-x6mw | 2022-06-23T17:40:34Z | 2022-06-23T17:40:34Z | null | ['CVE-2022-31098'] | Weave GitOps leaked cluster credentials into logs on connection errors | ### Impact
A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, including the service account tokens in plain text from Weave GitOps's pod logs on the management cluster. An unauthorized remote attacker can also view these sensitive configurations from external log storage if enabled by the management cluster.
This vulnerability is due to the client factory dumping cluster configurations and their service account tokens when the cluster manager tries to connect to an API server of a registered cluster, and a connection error occurs. An attacker could exploit this vulnerability by either accessing logs of a pod of Weave GitOps, or from external log storage and obtaining all cluster configurations of registered clusters.
A successful exploit could allow the attacker to use those cluster configurations to manage the registered Kubernetes clusters.
### Patches
This vulnerability has been fixed by commit 567356f471353fb5c676c77f5abc2a04631d50ca. Users should upgrade to Weave GitOps core version >= v0.8.1-rc.6 released on 31/05/2022.
### Workarounds
There is no workaround for this vulnerability.
### References
Disclosed by Stefan Prodan, Principal Engineer, Weaveworks.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops)
* Email us at [support@weave.works](mailto:support@weave.works)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave-gitops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1-rc.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.1-rc.5'}}] | [{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/security/advisories/GHSA-xggc-qprg-x6mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31098'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/commit/567356f471353fb5c676c77f5abc2a04631d50ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/weaveworks/weave-gitops'}] | {'cwe_ids': ['CWE-200', 'CWE-209', 'CWE-532', 'CWE-538'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:40:34Z', 'nvd_published_at': '2022-06-27T22:15:00Z'} |
1.4.0 | GHSA-83gg-pwxf-jr89 | 2022-06-20T18:27:06Z | 2022-06-16T23:40:19Z | null | [] | `array!` macro is unsound in presence of traits that implement methods it calls internally | Affected versions of this crate called some methods using auto-ref. The affected code looked like this.
```rust
let mut arr = $crate::__core::mem::MaybeUninit::uninit();
let mut vec = $crate::__ArrayVec::<T>::new(arr.as_mut_ptr() as *mut T);
```
In this case, the problem is that `as_mut_ptr` is a method of `&mut MaybeUninit`, not `MaybeUninit`. This made it possible for traits to hijack the method calls in order to cause unsoundness.
```rust
trait AsMutPtr<T> {
fn as_mut_ptr(&self) -> *mut T;
}
impl<T> AsMutPtr<T> for std::mem::MaybeUninit<T> {
fn as_mut_ptr(&self) -> *mut T {
std::ptr::null_mut()
}
}
array![0; 1];
```
The flaw was corrected by explicitly referencing variables in macro body in order to avoid auto-ref.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'array-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xfix/array-macro/commit/01940637dd8f3bfeeee3faf9639fa9ae52f19f4d'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/array-macro/RUSTSEC-2020-0161.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/array-macro'}, {'type': 'WEB', 'url': 'https://gitlab.com/KonradBorowski/array-macro/-/commit/01940637dd8f3bfeeee3faf9639fa9ae52f19f4d'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0161.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xw6g-jjvf-wwf9 | 2022-06-20T22:25:46Z | 2022-06-20T22:25:46Z | null | ['CVE-2022-31089'] | Invalid file request can crash server | ### Impact
Certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as a single instance without redundancy, the availability impact may be high.
### Patches
To prevent this, invalid requests are now properly handled.
### Workarounds
None
### References
- https://github.com/parse-community/parse-server/security/advisories/GHSA-xw6g-jjvf-wwf9
- https://github.com/parse-community/parse-server
### For more information
- For questions or comments about this vulnerability visit our [community forum](http://community.parseplatform.org/) or [community chat](http://chat.parseplatform.org/)
- Report other vulnerabilities at [report.parseplatform.org](https://report.parseplatform.org/)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xw6g-jjvf-wwf9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31089'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/5be375dec2fa35425c1003ae81c55995ac72af92'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}] | {'cwe_ids': ['CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:25:46Z', 'nvd_published_at': '2022-06-27T21:15:00Z'} |
1.4.0 | GHSA-pp3c-cf6j-m3ff | 2022-06-15T18:57:22Z | 2022-06-07T00:00:31Z | null | ['CVE-2022-29631'] | Server-Side Request Forgery in Jodd HTTP | Jodd HTTP v6.0.9 was discovered to contain multiple CLRF injection vulnerabilities via the components jodd.http.HttpRequest#set and `jodd.http.HttpRequest#send. These vulnerabilities allow attackers to execute Server-Side Request Forgery (SSRF) via a crafted TCP payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jodd:jodd-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29631'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd-http/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd/issues/787'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd-http/commit/e50f573c8f6a39212ade68c6eb1256b2889fa8a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/oblac/jodd-http'}] | {'cwe_ids': ['CWE-74', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:14:24Z', 'nvd_published_at': '2022-06-06T21:15:00Z'} |
1.4.0 | GHSA-j562-c3cw-3p5g | 2022-06-17T21:39:48Z | 2022-06-17T21:39:48Z | null | ['CVE-2022-31069'] | Potential Authorization Header Exposure in NPM Packages @finastra/nestjs-proxy, @ffdc/nestjs-proxy | The nestjs-proxy library did not have a way to control when Authorization headers should should be forwarded for specific backend services configured by the application developer. This could have resulted in sensitive information such as OAuth bearer access tokens being inadvertently exposed to such services that should not see them.
A new feature has been introduced in the patched version of nestjs-proxy that allows application developers to opt out of forwarding the Authorization headers on a per service basis using the `forwardToken` config setting. Developers are advised to review the README for this library on Github or NPM for further details on how this configuration can be applied.
### Patches
- This issue has been fixed in version 0.7.0 of `@finastra/nestjs-proxy`.
- Users of `@ffdc/nestjs-proxy` are advised that this package has been deprecated and is no longer being maintained or receiving updates. Please update your package.json file to use `@finastra/nestjs-proxy` instead.
### References
- https://github.com/Finastra/finastra-nodejs-libs/pull/231
- https://github.com/Finastra/finastra-nodejs-libs/blob/master/libs/proxy/README.md | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@finastra/nestjs-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/security/advisories/GHSA-j562-c3cw-3p5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31069'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/pull/231'}, {'type': 'PACKAGE', 'url': 'https://github.com/Finastra/finastra-nodejs-libs'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:39:48Z', 'nvd_published_at': '2022-06-15T19:15:00Z'} |
1.4.0 | GHSA-g7xr-v82w-qggq | 2022-06-20T22:35:33Z | 2022-06-13T00:00:19Z | null | ['CVE-2021-41749'] | Code Injection in SEOmatic | In the SEOmatic plugin up to 3.4.11 for Craft CMS 3, it is possible for unauthenticated attackers to perform a Server-Side Template Injection, allowing for remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41749'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/3fee7d50147cdf3f999cfc1e04cbc3fb3d9f2f7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nystudio107/craft-seomatic'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/blob/develop/CHANGELOG.md'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:35:33Z', 'nvd_published_at': '2022-06-12T11:15:00Z'} |
1.4.0 | GHSA-rwqr-c348-m5wr | 2022-07-05T21:27:19Z | 2022-06-24T00:00:31Z | 2022-06-28T16:39:06Z | ['CVE-2022-33124'] | Withdrawn: Denial of Service in aiohttp | ## Withdrawn
This advisory has been withdrawn because the maintainers of aiohttp and multiple third parties disputed the validity of the issue. There is not sufficient evidence for the claims in the original report.
## Original Description
aiohttp v3.8.1 was discovered to contain an invalid IPv6 URL which can lead to a Denial of Service (DoS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33124'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/issues/6772'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:22:37Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-24h8-cpqm-qmf3 | 2022-12-05T21:54:16Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34200'] | Cross-Site Request Forgery in Jenkins Convertigo Mobile Platform Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:41Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-7f84-p6r5-jr6q | 2022-12-06T00:05:44Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34171'] | Cross-site Scripting vulnerability in Jenkins | Since Jenkins 2.321 and LTS 2.332.1, the HTML output generated for new symbol-based SVG icons includes the `title` attribute of `l:ionicon` until Jenkins 2.334 and `alt` attribute of `l:icon` since Jenkins 2.335 without further escaping.
This vulnerability is known to be exploitable by attackers with Job/Configure permission.
Jenkins 2.356, LTS 2.332.4 and LTS 2.346.1 addresses this vulnerability, the `title` attribute of `l:ionicon` (Jenkins LTS 2.332.4) and `alt` attribute of `l:icon` (Jenkins 2.356 and LTS 2.346.1) are escaped in the generated HTML output. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.350'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.346'}, {'fixed': '2.346.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.332.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34171'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:05:44Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-cqhr-q835-62gm | 2022-12-05T21:57:49Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34197'] | Cross-site Scripting in Jenkins Sauce OnDemand Plugin | Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sauce-ondemand'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.205'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.204'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34197'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/sauce-ondemand-plugin/commit/cb00db7ff1fb3fd73c9a2f0c307960ae597a5932'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sauce-ondemand-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:50Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-8639-qx56-r428 | 2022-06-01T20:26:37Z | 2022-06-01T20:26:37Z | null | ['CVE-2022-31000'] | CSRF allows attacker to finalize/unfinalize order adjustments in solidus_backend | ### Impact
CSRF vulnerability allowing attackers to change the state of an order's adjustments if they hold its number, and the execution happens on a store administrator's computer.
Reproduction steps:
- Take an order's number.
- Log in as an administrator.
- Visit that order's adjustments section (_Orders -> {Click on number} -> Adjustments_) and check that its adjustments are finalized (closed padlock under the **State** column).
- On another tab, visit `{your_site_url}/admin/orders/{order_number}/adjustments/unfinalize`.
- Notice how the adjustments are unfinalized (open padlock), even if the previous was a `GET` request which could have been linked from any other site.
- Visit `{your_site_url}/admin/orders/{order_number}/adjustments/finalize`.
- Notice how the adjustments are again finalized.
That happened because both routes were handled as `GET` requests, which are skipped by Rails anti-forgery protection.
### Patches
Users should upgrade to solidus_backend v3.1.6, v3.0.6, or v2.11.16, depending on the major and minor versions in use.
### References
- [Rails CSRF protection](https://api.rubyonrails.org/classes/ActionController/RequestForgeryProtection.html).
### For more information
If you have any questions or comments about this advisory:
- Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus.
- Email us at [security@solidus.io](mailto:security@soliidus.io)
- Contact the core team on [Slack](http://slack.solidus.io/)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-8639-qx56-r428'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31000'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/de796a2e0be7f154cae48b46e267501559d9716c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_backend/CVE-2022-31000.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}] | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:26:37Z', 'nvd_published_at': '2022-06-01T18:15:00Z'} |
1.4.0 | GHSA-gpw4-7mcw-m8vx | 2022-12-05T22:11:57Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34193'] | Cross-site Scripting in Jenkins Package Version Plugin | Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.lilicurroad.jenkins:packageversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34193'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/packageversion-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:07Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-6xj9-hpq3-w3qw | 2022-06-14T20:08:24Z | 2022-06-03T00:01:08Z | null | ['CVE-2022-30506'] | Code injection in MCMS | An arbitrary file upload vulnerability was discovered in MCMS 5.2.7, allowing an attacker to execute arbitrary code through a crafted ZIP file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30506'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I56AID'}] | {'cwe_ids': ['CWE-434', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:30:58Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-4453-g295-24mh | 2022-06-29T22:42:21Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20060'] | Cross site scripting in Elefant CMS | A vulnerability, which was classified as problematic, was found in Elefant CMS 1.3.12-RC. This affects an unknown part of the component Blog Post Handler. The manipulation leads to basic cross site scripting (Persistent). It is possible to initiate the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20060'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97257'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:21Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-x4mq-m75f-mx8m | 2022-07-05T21:26:36Z | 2022-06-17T00:30:33Z | null | [] | Delegate functions are missing `Send` bound | Affected versions of this crate did not require event handlers to have `Send` bound despite there being no guarantee of them being called on any particular thread, which can potentially lead to data races and undefined behavior.
The flaw was corrected in commit [afe3252](https://github.com/microsoft/windows-rs/commit/afe32525c22209aa8f632a0f4ad607863b51796a) by adding `Send` bounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'windows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}, {'fixed': '0.32.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/microsoft/windows-rs/issues/1409'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/windows-rs/commit/afe32525c22209aa8f632a0f4ad607863b51796a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/windows-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0008.html'}] | {'cwe_ids': ['CWE-820'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:30:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c8f7-x2g7-7fxj | 2022-10-19T20:54:09Z | 2022-06-02T14:23:29Z | null | [] | Phoenix-ws source code and data in extensions folder is publicly available | ### Impact
All of the source code, files, and folders in `phoenix_files/extensions/` are available to end users through a simple HTTP GET request.
### Patches
The issue has been patched. The users of version 1.0.6 and above are not effected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'phoenix-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Froggo8311/Phoenix/security/advisories/GHSA-c8f7-x2g7-7fxj'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froggo8311/Phoenix'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:23:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4cf5-xmhp-3xj7 | 2022-07-11T19:25:50Z | 2022-06-30T00:00:41Z | null | ['CVE-2022-32532'] | Improper Authorization in Apache Shiro | Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32532'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xh'}] | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:52:31Z', 'nvd_published_at': '2022-06-29T00:15:00Z'} |
1.4.0 | GHSA-hmqg-p8f8-3qrw | 2022-06-20T22:28:11Z | 2022-06-18T00:00:19Z | null | ['CVE-2022-25872'] | Out-of-bounds Read in fast-string-search | All versions of package fast-string-search are vulnerable to Out-of-bounds Read due to incorrect memory freeing and length calculation for any non-string input as the source. This allows the attacker to read previously allocated memory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-string-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25872'}, {'type': 'PACKAGE', 'url': 'https://github.com/magiclen/node-fast-string-search'}, {'type': 'WEB', 'url': 'https://github.com/magiclen/node-fast-string-search/blob/c8dd9fc966abc80b327f509e63360f59e0de9fb5/src/fast-string-search.c%23L192'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:28:11Z', 'nvd_published_at': '2022-06-17T20:15:00Z'} |
1.4.0 | GHSA-v829-j9rr-85v9 | 2022-06-29T21:52:07Z | 2022-06-22T00:00:54Z | null | ['CVE-2021-41924'] | Cross-site Scripting in krayin/laravel-crm | Webkul krayin crm before 1.2.2 is vulnerable to Cross Site Scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'krayin/laravel-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41924'}, {'type': 'WEB', 'url': 'https://github.com/krayin/laravel-crm/pull/195/commits/882dc2e7e7e9149b96cf1ccacf34900960b92fb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/krayin/laravel-crm'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:10:22Z', 'nvd_published_at': '2022-06-21T15:15:00Z'} |
1.4.0 | GHSA-6fp8-cxc9-4fr9 | 2022-09-01T20:09:19Z | 2022-06-17T21:44:23Z | null | ['CVE-2022-29866'] | Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-6fp8-cxc9-4fr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29866'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29866.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:23Z', 'nvd_published_at': '2022-06-16T18:15:00Z'} |
1.4.0 | GHSA-fcqr-gh8w-wm8f | 2022-12-05T22:09:09Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34194'] | Cross-site Scripting in Jenkins Readonly Parameter Plugin | Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are listed on another page, like the \"Build With Parameters\" and \"Parameters\" pages provided by Jenkins (core), and that those pages are not hardened to prevent exploitation. Jenkins (core) has prevented exploitation of vulnerabilities of this kind on the \"Build With Parameters\" and \"Parameters\" pages since 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-cross-site-scripting-vulnerability-in-parameter-names-and-descriptions) fix. Additionally, several plugins have previously been updated to list parameters in a way that prevents exploitation by default, see [SECURITY-2617 in the 2022-04-12 security advisory for a list](https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:readonly-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34194'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/readonly-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:00Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-6293-2vg2-pmp5 | 2022-06-24T00:53:03Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2064'] | Insufficient Session Expiration in NocoDB | Insufficient Session Expiration in GitHub repository nocodb/nocodb prior to 0.91.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2064'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2262'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2338'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/c9b5111b25aea2781e19395a8e9107ddbd235a2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/releases/tag/0.91.9'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/39523d51-fc5c-48b8-a082-171da79761bb'}] | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:03Z', 'nvd_published_at': '2022-06-13T12:15:00Z'} |
1.4.0 | GHSA-9g55-pg62-m8hh | 2022-06-16T23:49:25Z | 2022-06-16T23:49:25Z | null | [] | Channel creates zero value of any type | Affected versions of this crate called `mem::zeroed()` to create values of a user-supplied type `T`.
This is unsound e.g. if `T` is a reference type (which must be non-null).
The flaw was corrected by avoiding the use of `mem::zeroed()`, using `MaybeUninit` instead.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-channel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/458'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0019.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:49:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xc4-7fmm-65q2 | 2022-07-06T16:49:22Z | 2022-06-25T00:00:53Z | null | ['CVE-2022-21829'] | Code injection in concrete CMS | Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21829'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1482520'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/910-release-notes,'}, {'type': 'PACKAGE', 'url': 'https://github.com/concretecms/concretecms-core'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1482520,'}] | {'cwe_ids': ['CWE-319', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:07:26Z', 'nvd_published_at': '2022-06-24T15:15:00Z'} |
1.4.0 | GHSA-3m6f-3gfg-4x56 | 2022-06-17T00:19:49Z | 2022-06-17T00:19:49Z | null | [] | Panic on incorrect date input to `simple_asn1` | Version 0.6.0 of the `simple_asn1` crate panics on certain malformed
inputs to its parsing functions, including `from_der` and `der_decode`.
Because this crate is frequently used with inputs from the network, this
should be considered a security vulnerability.
The issue occurs when parsing the old ASN.1 "UTCTime" time format. If an
attacker provides a UTCTime where the first character is ASCII but the
second character is above 0x7f, a string slice operation in the
`from_der_` function will try to slice into the middle of a UTF-8
character, and cause a panic.
This error was introduced in commit
[`d7d39d709577710e9dc8`](https://github.com/acw/simple_asn1/commit/d7d39d709577710e9dc8833ee57d200eef366db8),
which updated `simple_asn1` to use `time` instead of `chrono` because of
[`RUSTSEC-2020-159`](https://rustsec.org/advisories/RUSTSEC-2020-0159).
Versions of `simple_asn1` before 0.6.0 are not affected by this issue.
The [patch](https://github.com/acw/simple_asn1/pull/28) was applied in
`simple_asn1` version 0.6.1.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'simple_asn1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.1'}]}], 'versions': ['0.6.0']}] | [{'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/commit/d7d39d709577710e9dc8833ee57d200eef366db8'}, {'type': 'PACKAGE', 'url': 'https://github.com/acw/simple_asn1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0125.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:19:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jf5h-cf95-w759 | 2022-06-17T00:16:24Z | 2022-06-17T00:16:24Z | null | [] | Optional `Deserialize` implementations lacking validation | When activating the non-default feature `serialize`, most structs implement
`serde::Deserialize` without sufficient validation. This allows breaking
invariants in safe code, leading to:
* Undefined behavior in `as_string()` methods (which use
`std::str::from_utf8_unchecked()` internally).
* Panics due to failed assertions.
See https://github.com/gz/rust-cpuid/issues/43.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'raw-cpuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '9.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/43'}, {'type': 'PACKAGE', 'url': 'https://github.com/gz/rust-cpuid'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0089.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:16:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mx8q-jqwm-85mv | 2023-06-30T20:40:22Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2062'] | NocoDB information disclosure vulnerability | In NocoDB prior to 0.91.7, the SMTP plugin doesn't have verification or validation. This allows attackers to make requests to internal servers and read the contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2062'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/a18f5dd53811b9ec1c1bb2fdbfb328c0c87d7fb4'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35593b4c-f127-4699-8ad3-f0b2203a8ef6'}] | {'cwe_ids': ['CWE-200', 'CWE-209', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:22Z', 'nvd_published_at': '2022-06-13T12:15:00Z'} |
1.4.0 | GHSA-7rq4-qcpw-74gq | 2022-06-17T01:17:22Z | 2022-06-17T01:17:22Z | null | [] | Formula Injection in Exported Data | ### Impact
Datasets exported to file (e.g. CSV / XLS) are not sufficiently sanitized, to neutralize potential formula injection
### Patches
- The issue is addressed in the upcoming 0.8.0 release
- This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.2 release
### Workarounds
Users exporting untrusted data should open the files in safe mode (e.g. in Microsoft Excel).
### References
- https://huntr.dev/bounties/e57c36e7-fa39-435f-944a-3a52ee066f73/
- https://owasp.org/www-community/attacks/CSV_Injection
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github](http://github.com/inventree/inventree)
* Email us at [security@inventree.org](mailto:security@inventree.org)
| [] | [{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-7rq4-qcpw-74gq'}, {'type': 'PACKAGE', 'url': 'https://github.com/inventree/inventree-python/'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:17:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2pg-mjhr-2m5x | 2022-06-20T22:00:29Z | 2022-06-09T23:51:25Z | null | ['CVE-2022-31051'] | Exposure of Sensitive Information to an Unauthorized Actor in semantic-release | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by [encodeURI](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI). Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Fixed in 19.0.3
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Secrets that do not contain characters that are excluded from encoding with `encodeURI` when included in a URL are already masked properly.
### References
_Are there any links users can visit to find out more?_
* https://github.com/semantic-release/semantic-release/releases/tag/v19.0.3
* https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI
### For more information
If you have any questions or comments about this advisory:
* Open a discussion in [semantic-release discussions](https://github.com/semantic-release/semantic-release/discussions)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'semantic-release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.4'}, {'fixed': '19.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-x2pg-mjhr-2m5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31051'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/pull/2449'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/pull/2459'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/commit/58a226f29c04ee56bbb02cc661f020d568849cad'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI'}, {'type': 'PACKAGE', 'url': 'https://github.com/semantic-release/semantic-release'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/releases/tag/v19.0.3'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:51:25Z', 'nvd_published_at': '2022-06-09T20:15:00Z'} |
1.4.0 | GHSA-6g4r-q7qg-6qx6 | 2022-12-05T23:51:57Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34173'] | Cross-site Scripting vulnerability in Jenkins | Since Jenkins 2.340, the tooltip of the build button in list views supports HTML without escaping the job display name.
This vulnerability is known to be exploitable by attackers with Job/Configure permission.
Jenkins 2.356 addresses this vulnerability. The tooltip of the build button in list views is now escaped.
No Jenkins LTS release is affected by SECURITY-2776 or SECURITY-2780, as these were not present in Jenkins 2.332.x and fixed in the 2.346.x line before 2.346.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.340'}, {'fixed': '2.356'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34173'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:51:57Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-7r3r-gq8p-v9jj | 2022-07-07T17:15:28Z | 2022-06-23T17:48:19Z | null | ['CVE-2022-31103'] | Improper handling of CSS at-rules in lettersanitizer | ### Impact
All versions of lettersanitizer below 1.0.2 are affected by a denial of service issue when processing a CSS at-rule `@keyframes`.
This package is depended on by [react-letter](https://github.com/mat-sz/react-letter), therefore everyone using react-letter is also at risk.
### Patches
The problem has been patched in version 1.0.2.
### Workarounds
There is no workaround besides upgrading.
### References
The issue was originally reported in the react-letter repository: https://github.com/mat-sz/react-letter/issues/17
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [lettersanitizer](https://github.com/mat-sz/lettersanitizer/issues)
* Email me at [contact@matsz.dev](mailto:contact@matsz.dev)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lettersanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mat-sz/lettersanitizer/security/advisories/GHSA-7r3r-gq8p-v9jj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31103'}, {'type': 'WEB', 'url': 'https://github.com/mat-sz/react-letter/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/mat-sz/lettersanitizer/commit/96d3dfe2ef0465d47324ed4d13e91ba0816a173f'}, {'type': 'PACKAGE', 'url': 'https://github.com/mat-sz/lettersanitizer'}] | {'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:48:19Z', 'nvd_published_at': '2022-06-27T23:15:00Z'} |
1.4.0 | GHSA-93mx-2vf9-28c4 | 2022-12-05T22:37:25Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34179'] | Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin | Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
Embeddable Build Status Plugin 2.0.4 restricts the `style` query parameter to one of the three legal values. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34179'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/63f82f28d989d30a23089a0a66c11f222651a8c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2792'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:51Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rvgf-69j7-xh78 | 2023-09-07T18:48:21Z | 2022-06-18T00:00:20Z | null | ['CVE-2022-25345'] | Uncontrolled Resource Consumption in @discordjs/opus | Improperly handled errors in @discordjs/opus cause hard crashes instead of returning the error to user land. All versions of package @discordjs/opus (<= 0.7.0) are vulnerable to Denial of Service (DoS) when trying to encode using an encoder with zero channels, or a non-initialized buffer. This leads to a hard crash due to improperly returning the errors from the invalid inputs.
As of version 0.8.0, the errors are correctly returned to the user and are no longer throwing hard crashes that cannot be recovered. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@discordjs/opus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25345'}, {'type': 'WEB', 'url': 'https://github.com/discordjs/opus/commit/406249f3fca484a2af97a34ceb989019efa09bc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/discordjs/opus'}, {'type': 'WEB', 'url': 'https://github.com/discordjs/opus/blob/3ca4341ffdd81cf83cec57045e59e228e6017590/src/node-opus.cc#L28'}, {'type': 'WEB', 'url': 'https://github.com/discordjs/opus/releases/tag/v0.8.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DISCORDJSOPUS-2403100'}] | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:30:01Z', 'nvd_published_at': '2022-06-17T20:15:00Z'} |
1.4.0 | GHSA-77xc-hjv8-ww97 | 2022-06-29T21:48:38Z | 2022-06-16T23:18:47Z | null | ['CVE-2022-29257'] | AutoUpdater module fails to validate certain nested components of the bundle | ### Impact
This vulnerability allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components.
Please note that this kind of attack would require **significant** privileges in your own auto updating infrastructure and the ease of that attack entirely depends on your infrastructure security.
### Patches
This has been patched and the following Electron versions contain the fix:
* `18.0.0-beta.6`
* `17.2.0`
* `16.2.0`
* `15.5.0`
### Workarounds
There are no workarounds for this issue, please update to a patched version of Electron.
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.0'}, {'fixed': '17.2.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0-beta.1'}, {'fixed': '18.0.0-beta.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 18.0.0-beta.5'}}] | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29257'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:18:47Z', 'nvd_published_at': '2022-06-13T22:15:00Z'} |
1.4.0 | GHSA-vv7q-mfpc-qgm5 | 2022-08-22T16:36:48Z | 2022-06-08T00:00:43Z | 2022-08-22T16:36:48Z | ['CVE-2022-31279'] | Unserialized Pop Chain in Laravel | ## Withdrawn
This advisory has been withdrawn because it is not a security issue and the CVE has been revoked.
## Original Description
Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution (RCE) via an unserialized pop chain in __destruct in Illuminate\Broadcasting\PendingBroadcast.php and __call in Faker\Generator.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/laravel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31279'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/1#issuecomment-1213126338'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/118'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/laravel'}, {'type': 'WEB', 'url': 'https://inhann.top/2022/05/17/bypass_wakeup/'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:27:54Z', 'nvd_published_at': '2022-06-07T16:15:00Z'} |
1.4.0 | GHSA-2927-hv3p-f3vp | 2022-06-14T20:01:41Z | 2022-06-03T00:00:29Z | null | ['CVE-2022-29718'] | Open redirect in caddy | Caddy v2.4 was discovered to contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29718'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/4499'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/4499/commits/b23bdcf99cfbd09d50555a999a16468404789230'}, {'type': 'PACKAGE', 'url': 'https://github.com/caddyserver/caddy'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/releases/tag/v2.5.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP2VIUT5IKA3OKM6YWA5LTLJ2GTEIH7C/'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:16:20Z', 'nvd_published_at': '2022-06-02T21:15:00Z'} |