id
stringlengths
13
16
published
stringlengths
19
19
modified
timestamp[ns]
details
stringlengths
30
3.87k
severity
listlengths
1
1
repo_url
stringlengths
23
68
cwes
sequencelengths
0
1
commits
sequencelengths
1
4
CVE-2023-27589
2023-03-14T19:15:10
2025-02-19T03:31:34.793277
Minio is a Multi-Cloud Object Storage framework. Starting with RELEASE.2020-12-23T02-24-12Z and prior to RELEASE.2023-03-13T19-46-17Z, a user with `consoleAdmin` permissions can potentially create a user that matches the root credential `accessKey`. Once this user is created successfully, the root credential ceases to work appropriately. The issue is patched in RELEASE.2023-03-13T19-46-17Z. There are ways to work around this via adding higher privileges to the disabled root user via `mc admin policy set`.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "372a08be49a2213a4a01de1fb7b271d98f38215c" ]
CVE-2023-28434
2023-03-22T21:15:18
2025-01-15T04:49:49.036523
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "372a08be49a2213a4a01de1fb7b271d98f38215c", "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2023-28433
2023-03-22T21:15:18
2025-01-15T04:49:48.672257
Minio is a Multi-Cloud Object Storage framework. All users on Windows prior to version RELEASE.2023-03-20T20-16-18Z are impacted. MinIO fails to filter the `\` character, which allows for arbitrary object placement across buckets. As a result, a user with low privileges, such as an access key, service account, or STS credential, which only has permission to `PutObject` in a specific bucket, can create an admin user. This issue is patched in RELEASE.2023-03-20T20-16-18Z. There are no known workarounds.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "372a08be49a2213a4a01de1fb7b271d98f38215c", "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2023-25812
2023-02-21T21:15:11
2025-01-15T04:46:14.176923
Minio is a Multi-Cloud Object Storage framework. Affected versions do not correctly honor a `Deny` policy on ByPassGoverance. Ideally, minio should return "Access Denied" to all users attempting to DELETE a versionId with the special header `X-Amz-Bypass-Governance-Retention: true`. However, this was not honored instead the request will be honored and an object under governance would be incorrectly deleted. All users are advised to upgrade. There are no known workarounds for this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "372a08be49a2213a4a01de1fb7b271d98f38215c", "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2021-21362
2021-03-08T19:15:13
2025-01-15T01:47:37.642571
MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-04T00-53-13Z it is possible to bypass a readOnly policy by creating a temporary 'mc share upload' URL. Everyone is impacted who uses MinIO multi-users. This is fixed in version RELEASE.2021-03-04T00-53-13Z. As a workaround, one can disable uploads with `Content-Type: multipart/form-data` as mentioned in the S3 API RESTObjectPOST docs by using a proxy in front of MinIO.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2021-21390
2021-03-19T16:15:12
2025-01-15T01:47:44.945077
MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-17T02-33-02Z, there is a vulnerability which enables MITM modification of request bodies that are meant to have integrity guaranteed by chunk signatures. In a PUT request using aws-chunked encoding, MinIO ordinarily verifies signatures at the end of a chunk. This check can be skipped if the client sends a false chunk size that is much greater than the actual data sent: the server accepts and completes the request without ever reaching the end of the chunk + thereby without ever checking the chunk signature. This is fixed in version RELEASE.2021-03-17T02-33-02Z. As a workaround one can avoid using "aws-chunked" encoding-based chunk signature upload requests instead use TLS. MinIO SDKs automatically disable chunked encoding signature when the server endpoint is configured with TLS.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2021-21287
2021-02-01T18:15:13
2025-01-15T01:47:24.200878
MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with "MINIO_BROWSER=off" environment variable.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2021-41137
2021-10-13T14:15:07
2025-01-15T02:04:25.879522
Minio is a Kubernetes native application for cloud storage. All users on release `RELEASE.2021-10-10T16-53-30Z` are affected by a vulnerability that involves bypassing policy restrictions on regular users. Normally, checkKeyValid() should return owner true for rootCreds. In the affected version, policy restriction did not work properly for users who did not have service (svc) or security token service (STS) accounts. This issue is fixed in `RELEASE.2021-10-13T00-23-17Z`. A downgrade back to release `RELEASE.2021-10-08T23-58-24Z` is available as a workaround.
null
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2021-43858
2021-12-27T22:15:07
2025-01-15T02:08:52.122261
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
null
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2022-24842
2022-04-12T18:15:09
2025-01-15T02:18:02.828761
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RELEASE.2022-04-12T06-55-35Z`. Users unable to upgrade may workaround this issue by explicitly adding a `admin:CreateServiceAccount` deny policy, however, this, in turn, denies the user the ability to create their own service accounts as well.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2022-31028
2022-06-07T16:15:07
2025-02-19T03:27:09.853393
MinIO is a multi-cloud object storage solution. Starting with version RELEASE.2019-09-25T18-25-51Z and ending with version RELEASE.2022-06-02T02-11-04Z, MinIO is vulnerable to an unending go-routine buildup while keeping connections established due to HTTP clients not closing the connections. Public-facing MinIO deployments are most affected. Users should upgrade to RELEASE.2022-06-02T02-11-04Z to receive a patch. One possible workaround is to use a reverse proxy to limit the number of connections being attempted in front of MinIO, and actively rejecting connections from such malicious clients.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "372a08be49a2213a4a01de1fb7b271d98f38215c" ]
CVE-2022-35919
2022-08-01T22:15:10
2025-01-15T02:27:18.461753
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpdate API by denying the `admin:ServerUpdate` action for your admin users via IAM policies.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "372a08be49a2213a4a01de1fb7b271d98f38215c", "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2018-1000538
2018-06-26T16:29:02
2025-01-15T01:29:48.294638
Minio Inc. Minio S3 server version prior to RELEASE.2018-05-16T23-35-33Z contains a Allocation of Memory Without Limits or Throttling (similar to CWE-774) vulnerability in write-to-RAM that can result in Denial of Service. This attack appear to be exploitable via Sending V4-(pre)signed requests with large bodies . This vulnerability appears to have been fixed in after commit 9c8b7306f55f2c8c0a5c7cea9a8db9d34be8faa7.
[ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2020-11012
2020-04-23T22:15:12
2025-01-15T01:41:56.273179
MinIO versions before RELEASE.2020-04-23T00-58-49Z have an authentication bypass issue in the MinIO admin API. Given an admin access key, it is possible to perform admin API operations i.e. creating new service accounts for existing access keys - without knowing the admin secret key. This has been fixed and released in version RELEASE.2020-04-23T00-58-49Z.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/minio/minio
[]
[ "64288d6eb53cc134a1f85851dcaf7dee76fecca6" ]
CVE-2023-36223
2023-07-03T21:15:09
2025-01-14T11:47:55.589232
Cross Site Scripting vulnerability in mlogclub bbs-go v. 3.5.5. and before allows a remote attacker to execute arbitrary code via a crafted payload to the announcements parameter in the settings function.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mlogclub/bbs-go
[]
[ "ca16d780de62de3e0daabf284ceb131b548fcf71" ]
CVE-2023-36222
2023-07-03T21:15:09
2025-01-14T11:47:54.581589
Cross Site Scripting vulnerability in mlogclub bbs-go v. 3.5.5. and before allows a remote attacker to execute arbitrary code via a crafted payload to the comment parameter in the article function.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mlogclub/bbs-go
[]
[ "ca16d780de62de3e0daabf284ceb131b548fcf71" ]
CVE-2021-38221
2022-06-02T18:15:08
2025-01-14T09:29:18.563632
bbs-go <= 3.3.0 including Custom Edition is vulnerable to stored XSS.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mlogclub/bbs-go
[]
[ "ca16d780de62de3e0daabf284ceb131b548fcf71" ]
CVE-2024-23653
2024-01-31T22:15:54
2025-02-19T03:37:00.616556
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/moby/buildkit
[]
[ "4b220de5058abfd01ff619c9d2ff6b09a049bea0" ]
CVE-2024-23650
2024-01-31T22:15:53
2025-02-19T03:36:57.434903
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic. The issue has been fixed in v0.12.5. As a workaround, avoid using BuildKit frontends from untrusted sources.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/moby/buildkit
[]
[ "4b220de5058abfd01ff619c9d2ff6b09a049bea0" ]
CVE-2024-23652
2024-01-31T22:15:54
2025-02-19T03:36:58.742211
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/moby/buildkit
[]
[ "4b220de5058abfd01ff619c9d2ff6b09a049bea0" ]
CVE-2024-23651
2024-01-31T22:15:54
2025-02-19T03:36:59.951447
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/moby/buildkit
[]
[ "4b220de5058abfd01ff619c9d2ff6b09a049bea0" ]
CVE-2023-26054
2023-03-06T19:15:10
2025-01-15T04:46:32.916094
BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In affected versions when the user sends a build request that contains a Git URL that contains credentials and the build creates a provenance attestation describing that build, these credentials could be visible from the provenance attestation. Git URL can be passed in two ways: 1) Invoking build directly from a URL with credentials. 2) If the client sends additional version control system (VCS) info hint parameters on builds from a local source. Usually, that would mean reading the origin URL from `.git/config` file. When a build is performed under specific conditions where credentials were passed to BuildKit they may be visible to everyone who has access to provenance attestation. Provenance attestations and VCS info hints were added in version v0.11.0. Previous versions are not vulnerable. In v0.10, when building directly from Git URL, the same URL could be visible in `BuildInfo` structure that is a predecessor of Provenance attestations. Previous versions are not vulnerable. This bug has been fixed in v0.11.4. Users are advised to upgrade. Users unable to upgrade may disable VCS info hints by setting `BUILDX_GIT_INFO=0`. `buildctl` does not set VCS hints based on `.git` directory, and values would need to be passed manually with `--opt`.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/moby/buildkit
[]
[ "4b220de5058abfd01ff619c9d2ff6b09a049bea0" ]
CVE-2021-32845
2023-02-17T23:15:11
2025-01-15T01:54:51.876868
HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior of HyperKit, the implementation of `qnotify` at `pci_vtrnd_notify` fails to check the return value of `vq_getchain`. This leads to `struct iovec iov;` being uninitialized and used to read memory in `len = (int) read(sc->vrsc_fd, iov.iov_base, iov.iov_len);` when an attacker is able to make `vq_getchain` fail. This issue may lead to a guest crashing the host causing a denial of service and, under certain circumstance, memory corruption. This issue is fixed in commit 41272a980197917df8e58ff90642d14dec8fe948.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/moby/hyperkit
[]
[ "40cbd5caa9580e2b6de8fef53f4581943c430312" ]
CVE-2021-32847
2023-02-20T17:15:11
2025-01-15T01:54:50.651619
HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior, a malicious guest can trigger a vulnerability in the host by abusing the disk driver that may lead to the disclosure of the host memory into the virtualized guest. This issue is fixed in commit cf60095a4d8c3cb2e182a14415467afd356e982f.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/moby/hyperkit
[]
[ "40cbd5caa9580e2b6de8fef53f4581943c430312" ]
CVE-2021-32846
2023-02-17T23:15:12
2025-01-15T01:54:48.158080
HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107, function `pci_vtsock_proc_tx` in `virtio-sock` can lead to to uninitialized memory use. In this situation, there is a check for the return value to be less or equal to `VTSOCK_MAXSEGS`, but that check is not sufficient because the function can return `-1` if it finds an error it cannot recover from. Moreover, the negative return value will be used by `iovec_pull` in a while condition that can further lead to more corruption because the function is not designed to handle a negative `iov_len`. This issue may lead to a guest crashing the host causing a denial of service and, under certain circumstance, memory corruption. This issue is fixed in commit af5eba2360a7351c08dfd9767d9be863a50ebaba.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/moby/hyperkit
[]
[ "40cbd5caa9580e2b6de8fef53f4581943c430312" ]
CVE-2021-32843
2023-02-17T23:15:11
2025-01-15T01:54:47.869525
HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior of HyperKit, `virtio.c` has is a call to `vc_cfgread` that does not check for null which when called makes the host crash. This issue may lead to a guest crashing the host causing a denial of service. This issue is fixed in commit df0e46c7dbfd81a957d85e449ba41b52f6f7beb4.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/moby/hyperkit
[]
[ "40cbd5caa9580e2b6de8fef53f4581943c430312" ]
CVE-2021-32844
2023-02-17T23:15:11
2025-01-15T01:54:46.777935
HyperKit is a toolkit for embedding hypervisor capabilities in an application. In versions 0.20210107 and prior of HyperKit, ` vi_pci_write` has is a call to `vc_cfgwrite` that does not check for null which when called makes the host crash. This issue may lead to a guest crashing the host causing a denial of service. This issue is fixed in commit 451558fe8aaa8b24e02e34106e3bb9fe41d7ad13.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/moby/hyperkit
[]
[ "40cbd5caa9580e2b6de8fef53f4581943c430312" ]
CVE-2024-36620
2024-11-29T18:15:07
2025-01-15T05:14:52.005297
moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go.
null
https://github.com/moby/moby
[]
[ "8891c58a433a823ce0a65b57efff45f32ee9cb45" ]
CVE-2022-27652
2022-04-18T17:15:16
2025-02-19T03:26:55.692681
A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/moby/moby
[]
[ "8891c58a433a823ce0a65b57efff45f32ee9cb45" ]
CVE-2023-45292
2023-12-11T22:15:06
2025-01-15T04:59:11.329588
When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mojocn/base64captcha
[]
[ "1a6d007056a31d2525bb29780d37fc396634caee" ]
CVE-2021-20329
2021-06-10T17:15:08
2025-01-14T08:51:26.595216
Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshalling Go objects into BSON. A malicious user could use a Go object with specific string to potentially inject additional fields into marshalled documents. This issue affects all MongoDB GO Drivers prior to and including 1.5.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/mongodb/mongo-go-driver
[]
[ "6760875fa58e0fa5518c992582efa6d807960d6c" ]
CVE-2020-7924
2021-04-12T17:15:13
2025-02-19T03:12:52.922685
Usage of specific command line parameter in MongoDB Tools which was originally intended to just skip hostname checks, may result in MongoDB skipping all certificate validation. This may result in accepting invalid certificates.This issue affects: MongoDB Inc. MongoDB Database Tools 3.6 versions later than 3.6.5; 3.6 versions prior to 3.6.21; 4.0 versions prior to 4.0.21; 4.2 versions prior to 4.2.11; 100 versions prior to 100.2.0. MongoDB Inc. Mongomirror 0 versions later than 0.6.0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mongodb/mongo-tools
[]
[ "a7ddcd8fc366b071f3fa359d277677812cc5c2ce" ]
CVE-2023-34205
2023-05-30T04:15:10
2025-01-14T11:44:29.931965
In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW).
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/moov-io/signedxml
[]
[ "51e2e8725af4bf9cb3c93805d498fbc370e5eba3" ]
CVE-2021-32163
2023-02-17T18:15:10
2025-02-19T03:18:24.254014
Authentication vulnerability in MOSN v.0.23.0 allows attacker to escalate privileges via case-sensitive JWT authorization.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/mosn/mosn
[]
[ "ab4ca053f4d9d907f4a5f9bcf9f30504ba3d142c" ]
CVE-2024-0606
2024-01-22T19:15:09
2025-01-15T05:04:36.111629
An attacker could execute unauthorized script on a legitimate site through UXSS using window.open() by opening a javascript URI leading to unauthorized actions within the user's loaded webpage. This vulnerability affects Focus for iOS < 122.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mozilla-mobile/focus-ios
[]
[ "e87f059de3e36e556bb0714a205cd508ec9160ef" ]
CVE-2024-0605
2024-01-22T19:15:09
2025-01-15T05:04:35.405887
Using a javascript: URI with a setTimeout race condition, an attacker can execute unauthorized scripts on top origin sites in urlbar. This bypasses security measures, potentially leading to arbitrary code execution or unauthorized actions within the user's loaded webpage. This vulnerability affects Focus for iOS < 122.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/mozilla-mobile/focus-ios
[]
[ "e87f059de3e36e556bb0714a205cd508ec9160ef" ]
CVE-2024-1563
2024-02-22T15:15:08
2025-01-29T02:04:24.616053
An attacker could have executed unauthorized scripts on top origin sites using a JavaScript URI when opening an external URL with a custom Firefox scheme and a timeout race condition. This vulnerability affects Focus for iOS < 122.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/mozilla-mobile/focus-ios
[]
[ "e87f059de3e36e556bb0714a205cd508ec9160ef" ]
CVE-2024-26284
2024-02-22T15:15:08
2025-01-15T05:10:03.003042
Utilizing a 302 redirect, an attacker could have conducted a Universal Cross-Site Scripting (UXSS) on a victim website, if the victim had a link to the attacker's website. This vulnerability affects Focus for iOS < 123.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mozilla-mobile/focus-ios
[]
[ "e87f059de3e36e556bb0714a205cd508ec9160ef" ]
CVE-2023-29546
2023-06-19T11:15:09
2025-01-15T04:52:15.917741
When recording the screen while in Private Browsing on Firefox for Android the address bar and keyboard were not hidden, potentially leaking sensitive information. *This bug only affects Firefox for Android. Other operating systems are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/mozilla-mobile/focus-ios
[]
[ "e87f059de3e36e556bb0714a205cd508ec9160ef" ]
CVE-2023-29534
2023-06-19T11:15:09
2025-01-15T04:52:15.584271
Different techniques existed to obscure the fullscreen notification in Firefox and Focus for Android. These could have led to potential user confusion and spoofing attacks. *This bug only affects Firefox and Focus for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/mozilla-mobile/focus-ios
[]
[ "e87f059de3e36e556bb0714a205cd508ec9160ef" ]
CVE-2023-6870
2023-12-19T14:15:08
2025-01-15T05:04:16.613015
Applications which spawn a Toast notification in a background thread may have obscured fullscreen notifications displayed by Firefox. *This issue only affects Android versions of Firefox and Firefox Focus.* This vulnerability affects Firefox < 121.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/mozilla-mobile/focus-ios
[]
[ "e87f059de3e36e556bb0714a205cd508ec9160ef" ]
CVE-2024-2029
2024-04-10T17:15:53
2025-01-15T05:05:13.776231
A command injection vulnerability exists in the `TranscriptEndpoint` of mudler/localai, specifically within the `audioToWav` function used for converting audio files to WAV format for transcription. The vulnerability arises due to the lack of sanitization of user-supplied filenames before passing them to ffmpeg via a shell command, allowing an attacker to execute arbitrary commands on the host system. Successful exploitation could lead to unauthorized access, data breaches, or other detrimental impacts, depending on the privileges of the process executing the code.
null
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2024-5616
2024-07-06T09:15:02
2025-01-15T05:16:47.287869
A Cross-Site Request Forgery (CSRF) vulnerability exists in mudler/LocalAI versions up to and including 2.15.0, which allows attackers to trick victims into deleting installed models. By crafting a malicious HTML page, an attacker can cause the deletion of a model, such as 'gpt-4-vision-preview', without the victim's consent. The vulnerability is due to insufficient CSRF protection mechanisms on the model deletion functionality.
null
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2024-6095
2024-07-06T18:15:02
2025-01-15T05:17:01.181089
A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2024-5181
2024-06-26T03:15:10
2025-01-15T05:16:15.318897
A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attacker can exploit this vulnerability by manipulating the path of the vulnerable binary file specified in the backend parameter, allowing the execution of arbitrary code on the system. This issue is due to improper neutralization of special elements used in an OS command, leading to potential full control over the affected system.
null
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2024-5182
2024-06-20T00:15:09
2025-01-15T05:16:15.107896
A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2024-6983
2024-09-27T16:15:06
2024-10-08T04:25:02.254271
mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system.
null
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2024-6868
2024-10-29T13:15:08
2024-11-13T15:50:32.283491
mudler/LocalAI version 2.17.1 allows for arbitrary file write due to improper handling of automatic archive extraction. When model configurations specify additional files as archives (e.g., .tar), these archives are automatically extracted after downloading. This behavior can be exploited to perform a 'tarslip' attack, allowing files to be written to arbitrary locations on the server, bypassing checks that normally restrict files to the models directory. This vulnerability can lead to remote code execution (RCE) by overwriting backend assets used by the server.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2024-7010
2024-10-29T13:15:08
2024-11-14T17:47:24.328786
mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/mudler/localai
[]
[ "ff88c390bb51d9567572815a63c575eb2e3dd062" ]
CVE-2023-34458
2023-07-13T19:15:09
2025-01-15T02:07:36.820095
mx-chain-go is the official implementation of the MultiversX blockchain protocol, written in golang. When executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch` was needed. This was a strict processing issue while validating blocks on a chain. This vulnerability has been patched in version 1.4.17.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ]
https://github.com/multiversx/mx-chain-go
[]
[ "84c9960c1625395f0ebd8e8811fb5f70859185fe" ]
CVE-2023-33964
2023-05-31T18:15:09
2025-01-15T04:55:04.909928
mx-chain-go is an implementation of the MultiversX blockchain protocol written in the Go language. Metachain cannot process a cross-shard miniblock. Prior to version 1.4.16, an invalid transaction with the wrong username on metachain is not treated correctly on the metachain transaction processor. This is strictly a processing issue that could have happened on MultiversX chain. If an error like this had occurred, the metachain would have stopped notarizing blocks from the shard chains. The resuming of notarization is possible only after applying a patched binary version. A patch in version 1.4.16 introduces `processIfTxErrorCrossShard` for the metachain transaction processor. There are no known workarounds for this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/multiversx/mx-chain-go
[]
[ "84c9960c1625395f0ebd8e8811fb5f70859185fe" ]
CVE-2022-36058
2022-09-06T20:15:08
2025-01-15T02:36:13.860249
Elrond go is the go implementation for the Elrond Network protocol. In versions prior to 1.3.34, anyone who uses elrond-go to process blocks (historical or actual) could encounter a `MultiESDTNFTTransfer` transaction like this: `MultiESDTNFTTransfer` with a missing function name. Basic functionality like p2p messaging, storage, API requests and such are unaffected. Version 1.3.34 contains a fix for this issue. There are no known workarounds.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/multiversx/mx-chain-go
[]
[ "84c9960c1625395f0ebd8e8811fb5f70859185fe" ]
CVE-2023-30844
2023-05-08T18:15:14
2025-02-19T03:31:46.763885
Mutagen provides real-time file synchronization and flexible network forwarding for developers. Prior to versions 0.16.6 and 0.17.1 in `mutagen` and prior to version 0.17.1 in `mutagen-compose`, Mutagen `list` and `monitor` commands are susceptible to control characters that could be provided by remote endpoints. This could cause terminal corruption, either intentional or unintentional, if these characters were present in error messages or file paths/names. This could be used as an attack vector if synchronizing with an untrusted remote endpoint, synchronizing files not under control of the user, or forwarding to/from an untrusted remote endpoint. On very old systems with terminals susceptible to issues such as CVE-2003-0069, the issue could theoretically cause code execution. The problem has been patched in Mutagen v0.16.6 and v0.17.1. Earlier versions of Mutagen are no longer supported and will not be patched. Versions of Mutagen after v0.18.0 will also have the patch merged. As a workaround, avoiding synchronization of untrusted files or interaction with untrusted remote endpoints should mitigate any risk.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/mutagen-io/mutagen
[]
[ "4019acdff34941da24120b80127f93cccc54c608" ]
CVE-2022-28357
2023-09-19T02:15:54
2025-01-14T10:54:44.213976
NATS nats-server 2.2.0 through 2.7.4 allows directory traversal because of an unintended path to a management action from a management account.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/nats-io/nats-server
[]
[ "1712ee3707e9b252a197946fc20f3690735e9407" ]
CVE-2020-28466
2021-03-07T10:15:12
2025-01-14T08:57:07.789221
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. Those who are running such services are encouraged to build regularly from git.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/nats-io/nats-server
[]
[ "e12e56aef4089d8376e22b03cbc2e5b97321f049" ]
CVE-2022-26652
2022-03-10T17:47:51
2025-02-19T03:27:29.883873
NATS nats-server before 2.7.4 allows Directory Traversal (with write access) via an element in a ZIP archive for JetStream streams. nats-streaming-server before 0.24.3 is also affected.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ]
https://github.com/nats-io/nats-server
[]
[ "1712ee3707e9b252a197946fc20f3690735e9407" ]
CVE-2022-24450
2022-02-08T02:15:06
2025-02-19T03:28:24.710774
NATS nats-server before 2.7.2 has Incorrect Access Control. Any authenticated user can obtain the privileges of the System account by misusing the "dynamically provisioned sandbox accounts" feature.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/nats-io/nats-server
[]
[ "e12e56aef4089d8376e22b03cbc2e5b97321f049" ]
CVE-2019-13126
2019-07-29T17:15:11
2025-01-14T07:45:25.360134
An integer overflow in NATS Server before 2.0.2 allows a remote attacker to crash the server by sending a crafted request. If authentication is enabled, then the remote attacker must have first authenticated.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/nats-io/nats-server
[]
[ "e12e56aef4089d8376e22b03cbc2e5b97321f049" ]
CVE-2023-22726
2023-01-20T22:15:10
2025-01-15T04:41:23.811762
act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/nektos/act
[]
[ "efb12b7f122e1daa3fce410a0808098a23dad910" ]
CVE-2020-9296
2020-06-16T14:15:11
2025-02-19T03:13:44.577357
Netflix Titus uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/netflix/conductor
[]
[ "86b26785c91dd8f635fce486634108354344f200" ]
CVE-2024-10318
2024-11-06T17:15:13
2024-11-09T06:45:42.143383
A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/nginxinc/kubernetes-ingress
[]
[ "ca02a38b10ee3af60845f694adb4dd27b5ed2867" ]
CVE-2021-23055
2022-04-21T19:15:08
2025-02-19T03:16:51.352986
On version 2.x before 2.0.3 and 1.x before 1.12.3, the command line restriction that controls snippet use with NGINX Ingress Controller does not apply to Ingress objects. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/nginxinc/kubernetes-ingress
[]
[ "b8acd634bc7b781c6dd287ab5c8d85880190fa35" ]
CVE-2022-30535
2022-08-04T18:15:09
2025-01-14T10:57:47.517036
In versions 2.x before 2.3.0 and all versions of 1.x, An attacker authorized to create or update ingress objects can obtain the secrets available to the NGINX Ingress Controller. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/nginxinc/kubernetes-ingress
[]
[ "b8acd634bc7b781c6dd287ab5c8d85880190fa35" ]
CVE-2022-41743
2022-10-19T22:15:12
2025-02-19T03:30:12.024270
NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_hls_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its crash or potential other impact using a specially crafted audio or video file. The issue affects only NGINX Plus when the hls directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_hls_module.
[ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/nginxinc/kubernetes-ingress
[]
[ "79566654d43c72bf3709db2ef0b60f4f928fadba" ]
CVE-2018-1002104
2020-01-14T21:15:16
2025-01-14T07:20:24.364991
Versions < 1.5 of the Kubernetes ingress default backend, which handles invalid ingress traffic, exposed prometheus metrics publicly.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/nginxinc/kubernetes-ingress
[]
[ "b8acd634bc7b781c6dd287ab5c8d85880190fa35" ]
CVE-2021-3529
2021-06-02T17:15:08
2025-01-14T09:19:08.239731
A flaw was found in noobaa-core in versions before 5.7.0. This flaw results in the name of an arbitrarily URL being copied into an HTML document as plain text between tags, including potentially a payload script. The input was echoed unmodified in the application response, resulting in arbitrary JavaScript being injected into an application's response. The highest threat to the system is for confidentiality, availability, and integrity.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "type": "CVSS_V3" } ]
https://github.com/noobaa/noobaa-operator
[]
[ "4409106f6300248e64e200442f9a7c51453f9618" ]
CVE-2021-3528
2021-05-13T15:15:07
2025-01-14T09:19:09.494302
A flaw was found in noobaa-operator in versions before 5.7.0, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/noobaa/noobaa-operator
[]
[ "4409106f6300248e64e200442f9a7c51453f9618" ]
CVE-2023-33957
2023-06-06T19:15:12
2025-01-15T04:53:40.846062
notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry and added a high number of signatures to an artifact can cause denial of service of services on the machine, if a user runs notation inspect command on the same machine. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above. Users are advised to upgrade. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/notaryproject/notation
[]
[ "cc3f7aa06b600a689af5274daa7c06fb3e55e69e" ]
CVE-2023-33958
2023-06-06T19:15:12
2025-01-14T11:44:09.776098
notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry and added a high number of signatures to an artifact can cause denial of service of services on the machine, if a user runs notation verify command on the same machine. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/notaryproject/notation-go
[]
[ "69cf11bbbc7641efcee966b22d47495b5a6d274e" ]
CVE-2023-33959
2023-06-06T19:15:12
2025-01-14T11:44:10.137147
notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry can cause users to verify the wrong artifact. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation-go library to v1.0.0-rc.6 or above. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/notaryproject/notation-go
[]
[ "69cf11bbbc7641efcee966b22d47495b5a6d274e" ]
CVE-2024-51491
2025-01-13T22:15:13
2025-01-29T08:54:50.596151
notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. The issue was identified during Quarkslab's security audit on the Certificate Revocation List (CRL) based revocation check feature. After retrieving the CRL, notation-go attempts to update the CRL cache using the os.Rename method. However, this operation may fail due to operating system-specific limitations, particularly when the source and destination paths are on different mount points. This failure could lead to an unexpected program termination. In method `crl.(*FileCache).Set`, a temporary file is created in the OS dedicated area (like /tmp for, usually, Linux/Unix). The file is written and then it is tried to move it to the dedicated `notation` cache directory thanks `os.Rename`. As specified in Go documentation, OS specific restriction may apply. When used with Linux OS, it is relying on rename syscall from the libc and as per the documentation, moving a file to a different mountpoint raises an EXDEV error, interpreted as Cross device link not permitted error. Some Linux distribution, like RedHat use a dedicated filesystem (tmpfs), mounted on a specific mountpoint (usually /tmp) for temporary files. When using such OS, revocation check based on CRL will repeatedly crash notation. As a result the signature verification process is aborted as process crashes. This issue has been addressed in version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
null
https://github.com/notaryproject/notation-go
[]
[ "69cf11bbbc7641efcee966b22d47495b5a6d274e" ]
CVE-2023-25307
2023-06-26T15:15:09
2025-02-19T03:31:16.955299
nothub mrpack-install <= v0.16.2 is vulnerable to Directory Traversal.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/nothub/mrpack-install
[]
[ "2b4e675a5e71f925cf42e416e9075af0e90129af" ]
CVE-2022-2583
2022-12-27T22:15:12
2025-01-15T02:18:56.480398
A race condition can cause incorrect HTTP request routing.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/ntbosscher/gobase
[]
[ "94022b23b906b2dd47ad04dc74af18ba9cba80a0" ]
CVE-2024-28224
2024-04-08T19:15:07
2025-02-19T03:37:17.273438
Ollama before 0.1.29 has a DNS rebinding vulnerability that can inadvertently allow remote access to the full API, thereby letting an unauthorized user chat with a large language model, delete a model, or cause a denial of service (resource exhaustion).
null
https://github.com/ollama/ollama
[]
[ "21347e1ed67a4ef36abc11bf314e90eaba9a0dc4" ]
CVE-2024-45436
2024-08-29T03:15:05
2025-02-19T03:38:06.237197
extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/ollama/ollama
[]
[ "21347e1ed67a4ef36abc11bf314e90eaba9a0dc4" ]
CVE-2024-37032
2024-05-31T04:15:09
2025-02-19T03:37:44.607727
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
null
https://github.com/ollama/ollama
[]
[ "21347e1ed67a4ef36abc11bf314e90eaba9a0dc4" ]
CVE-2024-39721
2024-10-31T20:15:04
2025-02-19T03:38:10.955562
An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client).
null
https://github.com/ollama/ollama
[]
[ "21347e1ed67a4ef36abc11bf314e90eaba9a0dc4" ]
CVE-2024-39720
2024-10-31T20:15:04
2025-02-19T03:38:11.831304
An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement pointing to the attacker-controlled blob file, the attacker can crash the application through the CreateModel route, leading to a segmentation fault (signal SIGSEGV: segmentation violation).
null
https://github.com/ollama/ollama
[]
[ "21347e1ed67a4ef36abc11bf314e90eaba9a0dc4" ]
CVE-2022-26245
2022-03-27T14:15:12
2025-01-14T10:53:03.376930
Falcon-plus v0.3 was discovered to contain a SQL injection vulnerability via the parameter grpName in /config/service/host.go.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/open-falcon/falcon-plus
[]
[ "80edf7164ccf46c05a5a0f423ccfe9bbb2c7888f" ]
CVE-2023-29018
2023-04-14T19:15:09
2025-02-19T03:33:44.551750
The OpenFeature Operator allows users to expose feature flags to applications. Assuming the pre-existence of a vulnerability that allows for arbitrary code execution, an attacker could leverage the lax permissions configured on `open-feature-operator-controller-manager` to escalate the privileges of any SA in the cluster. The increased privileges could be used to modify cluster state, leading to DoS, or read sensitive data, including secrets. Version 0.2.32 mitigates this issue by restricting the resources the `open-feature-operator-controller-manager` can modify.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/open-feature/open-feature-operator
[]
[ "42f9b007d391137b01bf9bc36bc40666d16c18b3" ]
CVE-2024-8260
2024-08-30T13:15:12
2025-02-19T03:39:50.085824
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
[ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/open-policy-agent/opa
[]
[ "c2b2c62aee67607174b8be989b8c26644d4c261b" ]
CVE-2022-33082
2022-06-30T22:15:08
2025-02-19T03:28:49.387808
An issue in the AST parser (ast/compile.go) of Open Policy Agent v0.10.2 allows attackers to cause a Denial of Service (DoS) via a crafted input.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/open-policy-agent/opa
[]
[ "c2b2c62aee67607174b8be989b8c26644d4c261b" ]
CVE-2022-36085
2022-09-08T14:15:08
2025-01-15T02:30:11.088535
Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use of the `with` keyword to mock such a built-in function (a feature introduced in OPA v0.40.0), isn’t taken into account by `WithUnsafeBuiltins`. Multiple conditions need to be met in order to create an adverse effect. Version 0.43.1 contains a patch for this issue. As a workaround, avoid using the `WithUnsafeBuiltins` function and use the `capabilities` feature instead.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/open-policy-agent/opa
[]
[ "c2b2c62aee67607174b8be989b8c26644d4c261b" ]
CVE-2022-23628
2022-02-09T22:15:07
2025-01-15T02:17:34.758824
OPA is an open source, general-purpose policy engine. Under certain conditions, pretty-printing an abstract syntax tree (AST) that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths. **All of these** three conditions have to be met to create an adverse effect: 1. An AST of Rego had to be **created programmatically** such that it ends up containing terms without a location (such as wildcard variables). 2. The AST had to be **pretty-printed** using the `github.com/open-policy-agent/opa/format` package. 3. The result of the pretty-printing had to be **parsed and evaluated again** via an OPA instance using the bundles, or the Golang packages. If any of these three conditions are not met, you are not affected. Notably, all three would be true if using **optimized bundles**, i.e. bundles created with `opa build -O=1` or higher. In that case, the optimizer would fulfil condition (1.), the result of that would be pretty-printed when writing the bundle to disk, fulfilling (2.). When the bundle was then used, we'd satisfy (3.). As a workaround users may disable optimization when creating bundles.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/open-policy-agent/opa
[]
[ "c2b2c62aee67607174b8be989b8c26644d4c261b" ]
CVE-2022-28946
2022-05-19T19:15:07
2025-01-15T02:20:17.999018
An issue in the component ast/parser.go of Open Policy Agent v0.39.0 causes the application to incorrectly interpret every expression, causing a Denial of Service (DoS) via triggering out-of-range memory access.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/open-policy-agent/opa
[]
[ "c2b2c62aee67607174b8be989b8c26644d4c261b" ]
CVE-2024-36129
2024-06-05T18:15:10
2025-01-14T12:14:10.594021
The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. An unsafe decompression vulnerability allows unauthenticated attackers to crash the collector via excessive memory consumption. OTel Collector version 0.102.1 fixes this issue. It is also fixed in the confighttp module version 0.102.0 and configgrpc module version 0.102.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/open-telemetry/opentelemetry-collector
[]
[ "5cbf8bebe4ad757f01974e9c65b853ddb7b28bba" ]
CVE-2024-42368
2024-08-13T20:15:08
2024-10-08T04:23:13.300446
OpenTelemetry, also known as OTel, is a vendor-neutral open source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, and logs. The bearertokenauth extension's server authenticator performs a simple, non-constant time string comparison of the received & configured bearer tokens. This impacts anyone using the `bearertokenauth` server authenticator. Malicious clients with network access to the collector may perform a timing attack against a collector with this authenticator to guess the configured token, by iteratively sending tokens and comparing the response time. This would allow an attacker to introduce fabricated or bad data into the collector's telemetry pipeline. The observable timing vulnerability was fixed by using constant-time comparison in 0.107.0
null
https://github.com/open-telemetry/opentelemetry-collector-contrib
[]
[ "67e92938376e5dc6c200899f7545c5cb7aec95e0" ]
CVE-2023-47108
2023-11-10T19:15:16
2025-01-15T05:00:24.578215
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/open-telemetry/opentelemetry-go-contrib
[]
[ "538baec1f9c565a3c6557eda86474406ab5d69d0" ]
CVE-2023-25151
2023-02-08T20:15:24
2025-01-14T12:12:27.782072
opentelemetry-go-contrib is a collection of extensions for OpenTelemetry-Go. The v0.38.0 release of `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` uses the `httpconv.ServerRequest` function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments. The `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not "forget" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack. This issue has been addressed in version 0.39.0. Users are advised to upgrade. There are no known workarounds for this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/open-telemetry/opentelemetry-go-contrib
[]
[ "538baec1f9c565a3c6557eda86474406ab5d69d0" ]
CVE-2023-43810
2023-10-06T14:15:12
2025-01-15T04:58:54.546078
OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label `http_method` that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/open-telemetry/opentelemetry-go-contrib
[]
[ "538baec1f9c565a3c6557eda86474406ab5d69d0" ]
CVE-2023-45142
2023-10-12T17:15:09
2025-01-14T12:12:27.694325
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/open-telemetry/opentelemetry-go-contrib
[]
[ "538baec1f9c565a3c6557eda86474406ab5d69d0" ]
CVE-2021-27940
2021-03-03T22:15:12
2025-01-14T08:50:14.927382
resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/openark/orchestrator
[]
[ "7e183c77882bab9c2bf39804328a3409f5ae8ab3" ]
CVE-2024-39909
2024-07-12T15:15:11
2025-01-15T05:15:15.964671
KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. A time/boolean SQL Injection is present in the following resource `/api/applicationResources` via the following parameter `packageID`. As it can be seen in backend/pkg/database/id_view.go, while building the SQL Query the `fmt.Sprintf` function is used to build the query string without the input having first been subjected to any validation. This vulnerability is fixed in 2.23.1.
null
https://github.com/openclarity/kubeclarity
[]
[ "32faff4dbb2708d3d2fb61e92eaf4353352298e7" ]
CVE-2021-41190
2021-11-17T20:15:10
2025-01-15T02:04:37.036483
The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are unable to update to version 1.0.1 of the spec.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "type": "CVSS_V3" } ]
https://github.com/opencontainers/distribution-spec
[]
[ "13bd0834858f16049a4f7cb3f7ee0675f34beac4" ]
CVE-2024-23820
2024-01-26T17:15:13
2025-01-15T05:08:15.501077
OpenFGA, an authorization/permission engine, is vulnerable to a denial of service attack in versions prior to 1.4.3. In some scenarios that depend on the model and tuples used, a call to `ListObjects` may not release memory properly. So when a sufficiently high number of those calls are executed, the OpenFGA server can create an `out of memory` error and terminate. Version 1.4.3 contains a patch for this issue.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2024-31452
2024-04-16T22:15:35
2025-01-15T05:12:52.845343
OpenFGA is a high-performance and flexible authorization/permission engine. Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs. You are very likely affected if your model involves exclusion (e.g. `a but not b`) or intersection (e.g. `a and b`). This vulnerability is fixed in v1.5.3.
null
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2024-42473
2024-08-12T13:38:35
2024-10-08T04:21:04.768286
OpenFGA is an authorization/permission engine. OpenFGA v1.5.7 and v1.5.8 are vulnerable to authorization bypass when calling Check API with a model that uses `but not` and `from` expressions and a userset. Users should downgrade to v1.5.6 as soon as possible. This downgrade is backward compatible. As of time of publication, a patch is not available but OpenFGA's maintainers are planning a patch for inclusion in a future release.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2023-35933
2023-06-26T20:15:10
2025-01-15T04:54:48.576424
OPenFGA is an open source authorization/permission engine built for developers. OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when Check and ListObjects calls are executed against authorization models that contain circular relationship definitions. Users are affected by this vulnerability if they are using OpenFGA v1.1.0 or earlier, and if you are executing `Check` or `ListObjects` calls against a vulnerable authorization model. Users are advised to upgrade to version 1.1.1. There are no known workarounds for this vulnerability. Users that do not have circular relationships in their models are not affected.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2023-40579
2023-08-25T20:15:08
2025-01-14T11:54:55.908978
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. This issue has been patched in version 1.3.1.
[ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]
CVE-2023-43645
2023-09-27T15:19:34
2025-01-15T04:58:35.912825
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA is vulnerable to a denial of service attack when certain Check calls are executed against authorization models that contain circular relationship definitions. When the call is made, it's possible for the server to exhaust resources and die. Users are advised to upgrade to v1.3.2 and update any offending models. There are no known workarounds for this vulnerability. Note that for models which contained cycles or a relation definition that has the relation itself in its evaluation path, checks and queries that require evaluation will no longer be evaluated on v1.3.2+ and will return errors instead. Users who do not have cyclic models are unaffected.
[ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ]
https://github.com/openfga/openfga
[]
[ "07a7a1a7eaa4d04f2c9e7efed40072ae2f3560b4" ]