ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-7wv8-g97r-432h
|
Exposure of Sensitive Information to an Unauthorized Actor in microweber
|
Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.
|
{'CVE-2022-0281'}
|
2022-01-27T18:32:04Z
|
2022-01-21T18:06:47Z
|
HIGH
| 7.5 |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0281', 'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6', 'https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505', 'https://github.com/advisories/GHSA-7wv8-g97r-432h'}
| null |
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}
|
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}
|
GHSA
|
GHSA-wrxc-mr2w-cjpv
|
Open Redirect in Grav
|
Common/Grav.php in Grav before 1.6.23 has an Open Redirect.
|
{'CVE-2020-11529'}
|
2022-01-07T00:20:50Z
|
2022-01-07T00:20:50Z
|
MODERATE
| 6.1 |
{'CWE-601'}
|
{'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7', 'https://github.com/getgrav/grav/issues/3134', 'https://getgrav.org/#changelog', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11529', 'https://github.com/advisories/GHSA-wrxc-mr2w-cjpv'}
| null |
{'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7'}
|
{'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7'}
|
GHSA
|
GHSA-3pqg-4rqg-pg9g
|
Cross-site Scripting in OWASP AntiSamy
|
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
|
{'CVE-2022-28367'}
|
2022-05-04T04:00:41Z
|
2022-04-23T00:03:04Z
|
MODERATE
| 6.1 |
{'CWE-79'}
|
{'https://github.com/nahsra/antisamy/releases/tag/v1.6.6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367', 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae', 'https://github.com/advisories/GHSA-3pqg-4rqg-pg9g'}
| null |
{'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}
|
{'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}
|
GHSA
|
GHSA-8gvg-8vhf-h26g
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933.
|
{'CVE-2019-0937'}
|
2021-03-29T20:59:03Z
|
2021-03-29T20:59:03Z
|
HIGH
| 7.5 |
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/advisories/GHSA-8gvg-8vhf-h26g', 'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937'}
| null |
{'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
|
{'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
|
GHSA
|
GHSA-8rh6-h94m-vj54
|
Incorrect Comparison in cvxopt
|
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.
|
{'CVE-2021-41500'}
|
2022-01-18T22:48:48Z
|
2022-01-07T00:01:11Z
|
HIGH
| 7.5 |
{'CWE-697'}
|
{'https://github.com/advisories/GHSA-8rh6-h94m-vj54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41500', 'https://github.com/cvxopt/cvxopt/issues/193', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/CXTPM3DGVYTYQ54OFCMXZVWVOMR7JM2D/', 'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}
| null |
{'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}
|
{'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}
|
GHSA
|
GHSA-x823-j7c4-vpc5
|
Cross-site scripting in sickrage
|
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
|
{'CVE-2021-25926'}
|
2021-04-23T18:45:59Z
|
2021-04-20T16:31:43Z
|
MODERATE
| 6.1 |
{'CWE-79'}
|
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926,', 'https://github.com/advisories/GHSA-x823-j7c4-vpc5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25926'}
| null |
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}
|
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}
|
GHSA
|
GHSA-m8p2-495h-ccmh
|
The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks
|
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
|
{'CVE-2019-10219'}
|
2022-02-11T21:13:08Z
|
2020-01-08T17:01:52Z
|
MODERATE
| 6.5 |
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219', 'https://lists.apache.org/thread.html/r87b7e2d22982b4ca9f88f5f4f22a19b394d2662415b233582ed22ebf@%3Cnotifications.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://github.com/advisories/GHSA-m8p2-495h-ccmh', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10219', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r4f8b4e2541be4234946e40d55859273a7eec0f4901e8080ce2406fe6@%3Cnotifications.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://security.netapp.com/advisory/ntap-20220210-0024/', 'https://access.redhat.com/errata/RHSA-2020:0161'}
| null |
{'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'}
|
{'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'}
|
GHSA
|
GHSA-8vj2-vxx3-667w
|
Arbitrary expression injection in Pillow
|
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method `ImageMath.eval("exec(exit())")`.
While Pillow 9.0.0 restricted top-level builtins available to PIL.ImageMath.eval(), it did not prevent builtins available to lambda expressions. These are now also restricted in 9.0.1.
|
{'CVE-2022-22817'}
|
2022-04-19T19:03:27Z
|
2022-01-12T20:07:33Z
|
CRITICAL
| 9.8 |
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-8vj2-vxx3-667w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22817', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11', 'https://www.debian.org/security/2022/dsa-5053'}
| null |
{'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11'}
|
{'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11'}
|
GHSA
|
GHSA-c53x-wwx2-pg96
|
Cross-Site Scripting in @berslucas/liljs
|
Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
Upgrade to version 1.0.2 or later.
| null |
2021-09-28T17:27:44Z
|
2020-09-03T17:03:58Z
|
MODERATE
| 6.5 |
{'CWE-79'}
|
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c', 'https://github.com/advisories/GHSA-c53x-wwx2-pg96', 'https://www.npmjs.com/advisories/1016', 'https://github.com/bersLucas/liljs/pull/7', 'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2'}
| null |
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
|
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
|
GHSA
|
GHSA-6f89-8j54-29xf
|
Heap buffer overflow in `FractionalAvgPoolGrad`
|
### Impact
The implementation of `tf.raw_ops.FractionalAvgPoolGrad` is vulnerable to a heap buffer overflow:
```python
import tensorflow as tf
orig_input_tensor_shape = tf.constant([1, 3, 2, 3], shape=[4], dtype=tf.int64)
out_backprop = tf.constant([2], shape=[1, 1, 1, 1], dtype=tf.int64)
row_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64)
col_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64)
tf.raw_ops.FractionalAvgPoolGrad(
orig_input_tensor_shape=orig_input_tensor_shape, out_backprop=out_backprop,
row_pooling_sequence=row_pooling_sequence,
col_pooling_sequence=col_pooling_sequence, overlapping=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/dcba796a28364d6d7f003f6fe733d82726dda713/tensorflow/core/kernels/fractional_avg_pool_op.cc#L216) fails to validate that the pooling sequence arguments have enough elements as required by the `out_backprop` tensor shape.
### Patches
We have patched the issue in GitHub commit [12c727cee857fa19be717f336943d95fca4ffe4f](https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29578'}
|
2021-05-21T17:08:41Z
|
2021-05-21T14:26:21Z
|
LOW
| 2.5 |
{'CWE-119', 'CWE-787'}
|
{'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f', 'https://github.com/advisories/GHSA-6f89-8j54-29xf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f89-8j54-29xf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29578'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f'}
|
{'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f'}
|
GHSA
|
GHSA-pm52-wwrw-c282
|
Command Injection in wiki-plugin-datalog
|
Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system.
## Recommendation
Upgrade to version 0.1.6 or later.
| null |
2021-08-16T15:29:05Z
|
2019-06-13T18:59:06Z
|
HIGH
| 6.5 |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://www.npmjs.com/advisories/926', 'https://github.com/advisories/GHSA-pm52-wwrw-c282'}
| null |
{'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}
|
{'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}
|
GHSA
|
GHSA-p885-prv3-m4xv
|
Cross-site Scripting in snipe-it
|
Stored Cross Site Scripting vulnerability in Item name parameter in GitHub repository snipe/snipe-it prior to v5.4.3. The vulnerability is capable of stolen the user Cookie.
|
{'CVE-2022-1380'}
|
2022-04-27T20:26:42Z
|
2022-04-17T00:00:32Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://github.com/snipe/snipe-it/commit/f211c11034baf4281aa62e7b5e0347248d995ee9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1380', 'https://github.com/advisories/GHSA-p885-prv3-m4xv', 'https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12'}
| null |
{'https://github.com/snipe/snipe-it/commit/f211c11034baf4281aa62e7b5e0347248d995ee9'}
|
{'https://github.com/snipe/snipe-it/commit/f211c11034baf4281aa62e7b5e0347248d995ee9'}
|
GHSA
|
GHSA-cfjv-5498-mph5
|
XSS in Action View
|
There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks.
### Impact
When an HTML-unsafe string is passed as the default for a missing translation key [named `html` or ending in `_html`](https://guides.rubyonrails.org/i18n.html#using-safe-html-translations), the default string is incorrectly marked as HTML-safe and not escaped. Vulnerable code may look like the following examples:
```erb
<%# The welcome_html translation is not defined for the current locale: %>
<%= t("welcome_html", default: untrusted_user_controlled_string) %>
<%# Neither the title.html translation nor the missing.html translation is defined for the current locale: %>
<%= t("title.html", default: [:"missing.html", untrusted_user_controlled_string]) %>
```
### Patches
Patched Rails versions, 6.0.3.3 and 5.2.4.4, are available from the normal locations.
The patches have also been applied to the `master`, `6-0-stable`, and `5-2-stable` branches on GitHub. If you track any of these branches, you should update to the latest.
To aid users who aren’t able to upgrade immediately, we’ve provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* [5-2-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-5-2-translate-helper-xss-patch) — patch for the 5.2 release series
* [6-0-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-6-0-translate-helper-xss-patch) — patch for the 6.0 release series
Please note that only the 5.2 and 6.0 release series are currently supported. Users of earlier, unsupported releases are advised to update as soon as possible, as we cannot provide security fixes for unsupported releases.
### Workarounds
Impacted users who can’t upgrade to a patched Rails version can avoid this issue by manually escaping default translations with the `html_escape` helper (aliased as `h`):
```erb
<%= t("welcome_html", default: h(untrusted_user_controlled_string)) %>
```
|
{'CVE-2020-15169'}
|
2022-04-19T19:02:34Z
|
2020-09-11T15:19:57Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://www.debian.org/security/2020/dsa-4766', 'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15169', 'https://github.com/rails/rails/security/advisories/GHSA-cfjv-5498-mph5', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://github.com/advisories/GHSA-cfjv-5498-mph5'}
| null |
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e'}
|
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e'}
|
GHSA
|
GHSA-w42g-7vfc-xf37
|
Introspection in schema validation in Apollo Server
|
We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions.
### Impact
If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled.
The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory.
> **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary.
In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)).
The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP).
**The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors.
### Affected packages
The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server.
Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`.
> Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form.
### Resolution
The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.)
### Workarounds
Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**:
```js
const server = new ApolloServer({
subscriptions: false,
/* Other options, such as typeDefs, resolvers, schema, etc. */
});
```
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist.
### Credit and appreciation
Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing.
Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing.
| null |
2020-08-31T19:02:47Z
|
2020-06-05T19:38:14Z
|
MODERATE
| 0 | null |
{'https://www.npmjs.com/advisories/1526', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1530', 'https://www.npmjs.com/advisories/1525', 'https://www.npmjs.com/advisories/1528', 'https://www.npmjs.com/advisories/1527', 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1532', 'https://www.npmjs.com/advisories/1536', 'https://www.npmjs.com/advisories/1531', 'https://www.npmjs.com/advisories/1533', 'https://github.com/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1529', 'https://www.npmjs.com/advisories/1534'}
| null |
{'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'}
|
{'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'}
|
GHSA
|
GHSA-p77h-hv6g-fmfp
|
Sensitive Data Exposure in ibm_db
|
Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode.
## Recommendation
Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.
| null |
2021-09-29T18:49:03Z
|
2020-09-03T20:43:16Z
|
MODERATE
| 5 | null |
{'https://www.npmjs.com/advisories/1185', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8', 'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762', 'https://github.com/advisories/GHSA-p77h-hv6g-fmfp'}
| null |
{'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}
|
{'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}
|
GHSA
|
GHSA-36p3-wjmg-h94x
|
Remote Code Execution in Spring Framework
|
Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`.
## Impact
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
These are the prerequisites for the exploit:
- JDK 9 or higher
- Apache Tomcat as the Servlet container
- Packaged as WAR
- `spring-webmvc` or `spring-webflux` dependency
## Patches
- Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE)
- Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12)
## Workarounds
For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting.
To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).
|
{'CVE-2022-22965'}
|
2022-04-01T16:26:09Z
|
2022-03-31T18:30:50Z
|
CRITICAL
| 0 |
{'CWE-74'}
|
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15', 'https://tanzu.vmware.com/security/cve-2022-22965', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6', 'https://github.com/advisories/GHSA-36p3-wjmg-h94x', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18', 'https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22965'}
| null |
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}
|
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}
|
GHSA
|
GHSA-4hvf-hxvg-f67v
|
Read and Write outside of bounds in TensorFlow
|
### Impact
An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in [the conversion from sparse tensors to dense tensors](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293).
### Patches
We have patched the issue in GitHub commit [6364463d6f5b6254cac3d6aedf999b6a96225038](https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
|
{'CVE-2022-23560'}
|
2022-02-11T15:08:01Z
|
2022-02-09T23:53:30Z
|
HIGH
| 8.8 |
{'CWE-787', 'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23560', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v', 'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038', 'https://github.com/advisories/GHSA-4hvf-hxvg-f67v'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038'}
|
{'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038'}
|
GHSA
|
GHSA-hw3m-8h25-8frw
|
Command Injection in Apache Kylin
|
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
|
{'CVE-2021-45456'}
|
2022-01-08T00:42:59Z
|
2022-01-08T00:42:59Z
|
MODERATE
| 0 |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45456', 'https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf', 'http://www.openwall.com/lists/oss-security/2022/01/06/1', 'https://github.com/apache/kylin/pull/1781', 'https://github.com/advisories/GHSA-hw3m-8h25-8frw', 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
| null |
{'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
|
{'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
|
GHSA
|
GHSA-8qv8-fq5w-p966
|
phpservermon is vulnerable to CRLF Injection
|
phpservermon is vulnerable to Improper Neutralization of CRLF Sequences.
|
{'CVE-2021-4097'}
|
2021-12-16T14:26:00Z
|
2021-12-16T14:26:00Z
|
MODERATE
| 6.3 |
{'CWE-93'}
|
{'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4097', 'https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43', 'https://github.com/advisories/GHSA-8qv8-fq5w-p966'}
| null |
{'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4'}
|
{'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4'}
|
GHSA
|
GHSA-hv96-xxx2-5v7w
|
Downloads Resources over HTTP in nw
|
Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`.
## Recommendation
Update to version 0.23.6-1 or later.
|
{'CVE-2016-10588'}
|
2021-06-10T23:26:25Z
|
2019-02-18T23:51:04Z
|
HIGH
| 8.1 |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://www.npmjs.com/advisories/166', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://nodesecurity.io/advisories/166'}
| null |
{'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}
|
{'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}
|
GHSA
|
GHSA-82rf-q3pr-4f6p
|
Sensitive data exposure in NATS
|
Preview versions of two NPM packages and one Deno package from the NATS
project contain an information disclosure flaw, leaking options to the
NATS server; for one package, this includes TLS private credentials.
The _connection_ configuration options in these JavaScript-based
implementations were fully serialized and sent to the server in the
client's CONNECT message, immediately after TLS establishment.
The nats.js client supports Mutual TLS and the credentials for the TLS
client key are included in the connection configuration options;
disclosure of the client's TLS private key to the server has been
observed.
Most authentication mechanisms are handled after connection, instead of
as part of connection, so other authentication mechanisms are
unaffected.
For clarity: NATS account NKey authentication is NOT affected.
Neither the nats.ws nor the nats.deno clients support Mutual TLS: the
affected versions listed below are those where the logic flaw is
present. We are including the nats.ws and nats.deno versions out of an
abundance of caution, as library maintainers, but rate as minimal the
likelihood of applications leaking sensitive data.
Affected versions:
Security impact:
* NPM package nats.js:
+ mainline is unaffected
+ beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209
Logic flaw:
* NPM package nats.ws:
+ status: preview
+ flawed from 1.0.0-85, fixed in 1.0.0-111
* Deno repository https://github.com/nats-io/nats.deno
+ status: preview
+ flawed in all git tags prior to fix
+ fixed with git tag v1.0.0-9
Impact:
For deployments using TLS client certificates (for mutual TLS), private
key material for TLS is leaked from the client application to the
server. If the server is untrusted (run by a third party), or if the
client application also disables TLS verification (and so the true
identity of the server is unverifiable) then authentication credentials
are leaked.
|
{'CVE-2020-26149'}
|
2021-10-04T21:25:48Z
|
2020-10-08T22:11:32Z
|
HIGH
| 7.5 |
{'CWE-522'}
|
{'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149', 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9', 'https://github.com/advisories/GHSA-82rf-q3pr-4f6p', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
| null |
{'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
|
{'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
|
GHSA
|
GHSA-52rg-hpwq-qp56
|
Allocation of Resources Without Limits or Throttling in Keycloak
|
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
|
{'CVE-2020-10758'}
|
2022-02-09T00:56:51Z
|
2022-02-09T00:56:51Z
|
HIGH
| 7.5 |
{'CWE-770'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1843849', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758', 'https://github.com/advisories/GHSA-52rg-hpwq-qp56', 'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
| null |
{'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
|
{'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
|
GHSA
|
GHSA-7q44-r25x-wm4q
|
Remote Code Execution vulnerability in PHPMailer 6.4.1 running on Windows
|
PHPMailer 6.4.1 contains a possible remote code execution vulnerability through the `$lang_path` parameter of the `setLanguage()` method. If the `$lang_path` parameter is passed unfiltered from user input, it can be set to [a UNC path](https://docs.microsoft.com/en-us/dotnet/standard/io/file-path-formats#unc-paths), and if an attacker is also able to create a remote mount on the server that the UNC path points to, a script file under their control may be executed.
### Impact
Arbitrary code may be run by a remote attacker under the web server or PHP process running on Window hosts.
### Patches
Mitigated in PHPMailer 6.5.0 by no longer treating translation files as PHP code, but by parsing their text content directly.
This approach avoids the possibility of executing unknown code while retaining backward compatibility. This isn't ideal, so the current translation format is deprecated and will be replaced in the next major release.
### Workarounds
Any of:
* Ensure that calling code does not pass unfiltered user-supplied data to the `$lang_path` parameter of the `setLanguage()` method.
* Block or filter the use of unknown UNC paths in this parameter (or altogether).
* Ensure that unauthorised users do not have the ability to read from unknown remote servers via UNC paths.
* Run on an OS that does not support UNC paths
### References
[CVE-2021-34551](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34551).
Reported by [listensec.com](https://listensec.com) via Tidelift.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [PHPMailer](https://github.com/PHPMailer/PHPMailer)
* [Email the maintainers](mailto:[email protected])
|
{'CVE-2021-34551'}
|
2022-04-19T19:03:00Z
|
2021-06-22T15:17:51Z
|
HIGH
| 8.1 |
{'CWE-94', 'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34551', 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md', 'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7q44-r25x-wm4q', 'https://github.com/advisories/GHSA-7q44-r25x-wm4q', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/'}
| null |
{'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3'}
|
{'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3'}
|
GHSA
|
GHSA-3hxh-8cp2-g4hg
|
Use after free and segfault in shape inference functions
|
### Impact
When running shape functions, some functions (such as `MutableHashTableShape`) produce extra output information in the form of a `ShapeAndType` struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately; if the upstream code attempts to access this shape information, it can trigger a segfault.
`ShapeRefiner` is mitigating this for normal output shapes by cloning them (and thus putting the newly created shape under ownership of an inference context that will not die), but we were not doing the same for shapes and types. This commit fixes that by doing similar logic on output shapes and types.
### Patches
We have patched the issue in GitHub commit [ee119d4a498979525046fba1c3dd3f13a039fbb1](https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2021-37690'}
|
2021-08-25T14:39:22Z
|
2021-08-25T14:39:22Z
|
MODERATE
| 6.6 |
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37690', 'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg', 'https://github.com/advisories/GHSA-3hxh-8cp2-g4hg'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1'}
|
{'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1'}
|
GHSA
|
GHSA-wmfg-55f9-j8hq
|
Server-Side Template Injection
|
### Impact
A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been assigned CVE-2020-26282.
### Patches
Effective Immediately, all users should upgrade to version 2.1.2 or higher.
### Workarounds
None.
### References
https://securitylab.github.com/research/bean-validation-RCE
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the BrowserUp Proxy repo](http://github.com/browserup/browserup-proxy)
* Contact us via the [BrowserUp website](https://browserup.com) or email us at [[email protected]](mailto:[email protected])
|
{'CVE-2020-26282'}
|
2022-04-19T19:02:43Z
|
2020-12-24T20:49:34Z
|
HIGH
| 10 |
{'CWE-74'}
|
{'https://securitylab.github.com/research/bean-validation-RCE', 'https://github.com/browserup/browserup-proxy/releases/tag/v2.1.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26282', 'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab', 'https://github.com/browserup/browserup-proxy/security/advisories/GHSA-wmfg-55f9-j8hq', 'https://github.com/advisories/GHSA-wmfg-55f9-j8hq'}
| null |
{'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'}
|
{'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'}
|
GHSA
|
GHSA-v82v-rq72-phq9
|
Server side request forgery in @isomorphic-git/cors-proxy
|
The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
|
{'CVE-2021-23664'}
|
2022-01-31T22:00:02Z
|
2022-01-26T22:13:05Z
|
HIGH
| 8.6 |
{'CWE-918'}
|
{'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311', 'https://github.com/advisories/GHSA-v82v-rq72-phq9'}
| null |
{'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
|
{'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
|
GHSA
|
GHSA-mfcp-34xw-p57x
|
Authentication Bypass in saml2-js
|
Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely.
## Recommendation
Upgrade to version 2.0.5 or later.
| null |
2021-09-29T20:12:43Z
|
2020-09-03T21:20:52Z
|
MODERATE
| 6.8 |
{'CWE-287'}
|
{'https://www.npmjs.com/advisories/1222', 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637', 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/advisories/GHSA-mfcp-34xw-p57x'}
| null |
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}
|
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}
|
GHSA
|
GHSA-w4f3-7f7c-x652
|
SQL Injection in tribalsystems/zenario
|
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 and prior allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
|
{'CVE-2021-26830'}
|
2022-03-21T20:29:00Z
|
2022-03-18T17:49:01Z
|
CRITICAL
| 9.1 |
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-w4f3-7f7c-x652', 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26830'}
| null |
{'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}
|
{'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}
|
GHSA
|
GHSA-qhrx-hcm6-pmrw
|
Unsafe deserialization in SmtpTransport in CakePHP
|
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
|
{'CVE-2019-11458'}
|
2021-08-19T15:25:21Z
|
2019-12-02T18:12:26Z
|
HIGH
| 7.5 |
{'CWE-502'}
|
{'https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7', 'https://github.com/cakephp/cakephp/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458', 'https://github.com/advisories/GHSA-qhrx-hcm6-pmrw', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/CVE-2019-11458.yaml', 'https://github.com/cakephp/cakephp/releases', 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e', 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html'}
| null |
{'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}
|
{'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}
|
GHSA
|
GHSA-r7rh-g777-g5gx
|
SilverStripe GraphQL Server permission checker not inherited by query subclass.
|
Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.
|
{'CVE-2021-28661'}
|
2021-10-18T18:40:16Z
|
2021-10-12T18:49:23Z
|
MODERATE
| 4.3 |
{'CWE-863'}
|
{'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed', 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/3.5.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28661', 'https://www.silverstripe.org/download/security-releases/CVE-2021-28661', 'https://github.com/advisories/GHSA-r7rh-g777-g5gx', 'https://github.com/silverstripe/silverstripe-graphql/releases'}
| null |
{'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed'}
|
{'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed'}
|
GHSA
|
GHSA-hhvc-g5hv-48c6
|
Write to immutable memory region in TensorFlow
|
### Impact
The `tf.raw_ops.ImmutableConst` operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the memory area:
```python
>>> import tensorflow as tf
>>> with open('/tmp/test.txt','w') as f: f.write('a'*128)
>>> tf.raw_ops.ImmutableConst(dtype=tf.string,shape=2,
memory_region_name='/tmp/test.txt')
```
If the file is too small, TensorFlow properly returns an error as the memory area has fewer bytes than what is needed for the tensor it creates. However, as soon as there are enough bytes, the above snippet causes a segmentation fault.
This is because the alocator used to return the buffer data is not marked as returning an opaque handle since the [needed virtual method](https://github.com/tensorflow/tensorflow/blob/c1e1fc899ad5f8c725dcbb6470069890b5060bc7/tensorflow/core/framework/typed_allocator.h#L78-L85) is [not overriden](https://github.com/tensorflow/tensorflow/blob/acdf3c04fcfa767ae8d109b9e1f727ef050dba4d/tensorflow/core/kernels/immutable_constant_op.cc).
### Patches
We have patched the issue in GitHub commit [c1e1fc899ad5f8c725dcbb6470069890b5060bc7](https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2020-26268'}
|
2021-01-07T22:37:16Z
|
2020-12-10T19:07:28Z
|
LOW
| 4.4 |
{'CWE-471'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hhvc-g5hv-48c6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26268', 'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7', 'https://github.com/advisories/GHSA-hhvc-g5hv-48c6'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7'}
|
{'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7'}
|
GHSA
|
GHSA-jrgf-vfw2-hj26
|
RCE via PHP Object injection via SOAP Requests
|
### Impact
This vulnerability allows an admin user to generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product.
### Patches
The latest OpenMage Versions up from 19.4.7 and 20.0.3 have this Issue solved
### Credits
Credit to Luke Rodgers for reporting
|
{'CVE-2020-15244'}
|
2022-04-19T19:02:36Z
|
2020-10-30T17:06:06Z
|
HIGH
| 8 |
{'CWE-74', 'CWE-502'}
|
{'https://github.com/OpenMage/magento-lts', 'https://github.com/advisories/GHSA-jrgf-vfw2-hj26', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15244', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26', 'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}
| null |
{'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}
|
{'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}
|
GHSA
|
GHSA-rx34-jff5-ph35
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
|
{'CVE-2019-0917'}
|
2021-03-29T21:00:06Z
|
2021-03-29T21:00:06Z
|
HIGH
| 7.5 |
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/advisories/GHSA-rx34-jff5-ph35'}
| null |
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}
|
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}
|
GHSA
|
GHSA-6jp6-9rf9-gc66
|
Cross-site Scripting in Weblate
|
### Impact
Due to improper neutralization, it was possible to perform cross-site scripting via crafted user and language names.
### Patches
The issues were fixed in the 4.11 release. The following commits are addressing it:
* f6753a1a1c63fade6ad418fbda827c6750ab0bda
* 9e19a8414337692cc90da2a91c9af5420f2952f1
* 22d577b1f1e88665a88b4569380148030e0f8389
### Workarounds
You can look for crafted user and language names to see if you were affected.
### References
* https://hackerone.com/reports/1486674
* https://hackerone.com/reports/1486718
* https://hackerone.com/reports/1485226
### For more information
If you have any questions or comments about this advisory:
* Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions)
* Email us at [[email protected]](mailto:[email protected])
|
{'CVE-2022-24710'}
|
2022-04-15T09:19:28Z
|
2022-02-25T22:18:50Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-6jp6-9rf9-gc66', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24710', 'https://github.com/advisories/GHSA-6jp6-9rf9-gc66', 'https://github.com/WeblateOrg/weblate/commit/9e19a8414337692cc90da2a91c9af5420f2952f1', 'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389', 'https://github.com/WeblateOrg/weblate/commit/f6753a1a1c63fade6ad418fbda827c6750ab0bda'}
| null |
{'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389', 'https://github.com/WeblateOrg/weblate/commit/9e19a8414337692cc90da2a91c9af5420f2952f1', 'https://github.com/WeblateOrg/weblate/commit/f6753a1a1c63fade6ad418fbda827c6750ab0bda'}
|
{'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389', 'https://github.com/WeblateOrg/weblate/commit/9e19a8414337692cc90da2a91c9af5420f2952f1', 'https://github.com/WeblateOrg/weblate/commit/f6753a1a1c63fade6ad418fbda827c6750ab0bda'}
|
GHSA
|
GHSA-pfxf-wh96-fvjc
|
Log Forging in generator-jhipster-kotlin
|
### Impact
We log the mail for invalid password reset attempts.
As the email is provided by a user and the api is public this can be used by an attacker to forge log entries.
This is vulnerable to https://cwe.mitre.org/data/definitions/117.html
This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.
### Patches
version 1.7.0.
### Workarounds
In `AccountResource.kt` you should change the line
```kotlin
log.warn("Password reset requested for non existing mail '$mail'");
```
to
```kotlin
log.warn("Password reset requested for non existing mail");
```
### References
* https://cwe.mitre.org/data/definitions/117.html
* https://owasp.org/www-community/attacks/Log_Injection
* https://www.baeldung.com/jvm-log-forging
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin)
|
{'CVE-2020-4072'}
|
2021-01-07T23:50:01Z
|
2020-06-25T20:02:51Z
|
MODERATE
| 5.3 |
{'CWE-117'}
|
{'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://owasp.org/www-community/attacks/Log_Injection', 'https://github.com/advisories/GHSA-pfxf-wh96-fvjc', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449', 'https://www.baeldung.com/jvm-log-forging', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4072'}
| null |
{'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
|
{'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
|
GHSA
|
GHSA-54gp-qff8-946c
|
Insecure direct object reference of log files of the Import/Export feature
|
### Impact
Insecure direct object reference of log files of the Import/Export feature
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
|
{'CVE-2021-37709'}
|
2022-04-26T18:04:08Z
|
2021-08-30T16:14:19Z
|
MODERATE
| 6.5 |
{'CWE-639', 'CWE-532'}
|
{'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37709', 'https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c', 'https://github.com/advisories/GHSA-54gp-qff8-946c'}
| null |
{'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec'}
|
{'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec'}
|
GHSA
|
GHSA-fq86-3f29-px2c
|
`CHECK`-failures during Grappler's `IsSimplifiableReshape` in Tensorflow
|
### Impact
The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`IsSimplifiableReshape`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742) would trigger `CHECK` failures.
### Patches
We have patched the issue in GitHub commits [ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1](https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1), [1fb27733f943295d874417630edd3b38b34ce082](https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082), and [240655511cd3e701155f944a972db71b6c0b1bb6](https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2022-23581'}
|
2022-02-11T20:38:44Z
|
2022-02-07T22:01:14Z
|
MODERATE
| 6.5 |
{'CWE-617'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23581', 'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082', 'https://github.com/advisories/GHSA-fq86-3f29-px2c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c', 'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082', 'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1'}
|
{'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1', 'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082'}
|
GHSA
|
GHSA-m49f-hcxp-6hm6
|
CSRF allowing an external page to trigger a user logout event
|
### Impact
A malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.**
### Patches
None.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory please contact `Tactical Fish#8008` on Discord, or email `[email protected]`.
|
{'CVE-2021-41176'}
|
2022-04-19T19:03:12Z
|
2021-10-25T19:42:46Z
|
LOW
| 0 |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41176', 'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2', 'https://github.com/pterodactyl/panel/releases/tag/v1.6.3', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-m49f-hcxp-6hm6', 'https://github.com/advisories/GHSA-m49f-hcxp-6hm6'}
| null |
{'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2'}
|
{'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2'}
|
GHSA
|
GHSA-2pr6-76vf-7546
|
Denial of Service in js-yaml
|
Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
## Recommendation
Upgrade to version 3.13.0.
| null |
2021-08-04T21:32:57Z
|
2019-06-05T14:35:29Z
|
MODERATE
| 5.9 |
{'CWE-400'}
|
{'https://github.com/nodeca/js-yaml/issues/475', 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://github.com/advisories/GHSA-2pr6-76vf-7546', 'https://www.npmjs.com/advisories/788', 'https://www.npmjs.com/advisories/788/versions', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999'}
| null |
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}
|
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}
|
GHSA
|
GHSA-mmq6-q8r3-48fm
|
Crash in `tf.strings.substr` due to `CHECK`-fail
|
### Impact
An attacker can cause a denial of service via `CHECK`-fail in `tf.strings.substr` with invalid arguments:
```python
import tensorflow as tf
tf.strings.substr(input='abc', len=1, pos=[1,-1])
```
```python
import tensorflow as tf
tf.strings.substr(input='abc', len=1, pos=[1,2])
```
### Patches
We have received a patch for the issue in GitHub commit [890f7164b70354c57d40eda52dcdd7658677c09f](https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported in [#46900](https://github.com/tensorflow/issues/46900) and fixed in [#46974](https://github.com/tensorflow/issues/46974).
|
{'CVE-2021-29617'}
|
2021-09-28T21:11:39Z
|
2021-05-21T14:28:50Z
|
LOW
| 2.5 |
{'CWE-755'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29617', 'https://github.com/tensorflow/issues/46900', 'https://github.com/tensorflow/issues/46974', 'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mmq6-q8r3-48fm', 'https://github.com/advisories/GHSA-mmq6-q8r3-48fm'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f'}
|
{'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f'}
|
GHSA
|
GHSA-vj42-xq3r-hr3r
|
Out-of-bounds reads in Pillow
|
In libImaging/Jpeg2KDecode.c in Pillow before 7.0.0, there are multiple out-of-bounds reads via a crafted JP2 file.
|
{'CVE-2020-10994'}
|
2021-09-22T21:44:31Z
|
2020-07-27T21:52:39Z
|
MODERATE
| 5.5 |
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-vj42-xq3r-hr3r', 'https://github.com/python-pillow/Pillow/pull/4505', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10994', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574575', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://usn.ubuntu.com/4430-2/', 'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4', 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html', 'https://usn.ubuntu.com/4430-1/', 'https://pillow.readthedocs.io/en/stable/releasenotes/'}
| null |
{'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4'}
|
{'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4'}
|
GHSA
|
GHSA-74qp-233x-p5j8
|
Cross-site scripting (XSS) in Apache Livy
|
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
|
{'CVE-2021-26544'}
|
2021-05-13T22:30:41Z
|
2021-05-13T22:30:41Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26544', 'http://www.openwall.com/lists/oss-security/2021/02/20/1', 'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d', 'https://github.com/advisories/GHSA-74qp-233x-p5j8', 'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E'}
| null |
{'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'}
|
{'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'}
|
GHSA
|
GHSA-rrx2-r989-2c43
|
Integer overflows in Tensorflow
|
### Impact
The [implementations of `Sparse*Cwise*` ops](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc) are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service):
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseDenseCwiseDiv(
sp_indices=np.array([[9]]),
sp_values=np.array([5]),
sp_shape=np.array([92233720368., 92233720368]),
dense=np.array([4]))
```
We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The latter is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and is easily fixed by replacing a call to `TensorShape` constructor with a call to `BuildTensorShape` static helper factory.
### Patches
We have patched the issue in GitHub commits [1b54cadd19391b60b6fcccd8d076426f7221d5e8](https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8) and [e952a89b7026b98fe8cbe626514a93ed68b7c510](https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
{'CVE-2022-23567'}
|
2022-02-11T17:05:35Z
|
2022-02-09T23:39:33Z
|
MODERATE
| 6.5 |
{'CWE-190'}
|
{'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23567', 'https://github.com/advisories/GHSA-rrx2-r989-2c43', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510'}
|
{'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510'}
|
GHSA
|
GHSA-6394-6h9h-cfjg
|
Regular Expression Denial of Service
|
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
| null |
2021-02-25T17:23:13Z
|
2019-06-07T21:12:35Z
|
MODERATE
| 0 |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-6394-6h9h-cfjg', 'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
| null |
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
|
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
|
GHSA
|
GHSA-vpfp-5gwq-g533
|
Improper Authentication in Apache ShenYu Admin
|
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
|
{'CVE-2021-37580'}
|
2021-11-18T15:12:16Z
|
2021-11-17T23:15:30Z
|
CRITICAL
| 9.8 |
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-vpfp-5gwq-g533', 'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580', 'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4', 'http://www.openwall.com/lists/oss-security/2021/11/16/1'}
| null |
{'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'}
|
{'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'}
|
GHSA
|
GHSA-589w-hccm-265x
|
Inline attribute values were not processed.
|
### Impact
Inline attributes have not been processed escape.
If the data that came from users was not processed, then an XSS vulnerability is possible
### Patches
Fixed in 9.4.4
|
{'CVE-2020-15263'}
|
2021-01-07T22:50:46Z
|
2020-10-19T20:17:47Z
|
HIGH
| 8 |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15263', 'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169', 'https://github.com/advisories/GHSA-589w-hccm-265x', 'https://github.com/orchidsoftware/platform/security/advisories/GHSA-589w-hccm-265x'}
| null |
{'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169'}
|
{'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169'}
|
GHSA
|
GHSA-hrqr-hxpp-chr3
|
Possible Information Leak / Session Hijack Vulnerability in Rack
|
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session.
The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.
### Impact
The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session.
## Releases
The 1.6.12 and 2.0.8 releases are available at the normal locations.
### Workarounds
There are no known workarounds.
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 1-6-session-timing-attack.patch - Patch for 1.6 series
* 2-0-session-timing-attack.patch - Patch for 2.6 series
### Credits
Thanks Will Leinweber for reporting this!
|
{'CVE-2019-16782'}
|
2022-04-19T19:02:23Z
|
2019-12-18T19:01:31Z
|
MODERATE
| 6.3 |
{'CWE-208', 'CWE-203'}
|
{'https://github.com/advisories/GHSA-hrqr-hxpp-chr3', 'http://www.openwall.com/lists/oss-security/2019/12/18/3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782', 'http://www.openwall.com/lists/oss-security/2019/12/19/3', 'http://www.openwall.com/lists/oss-security/2020/04/09/2', 'http://www.openwall.com/lists/oss-security/2020/04/08/1', 'http://www.openwall.com/lists/oss-security/2019/12/18/2', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/', 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3', 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38', 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}
| null |
{'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}
|
{'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}
|
GHSA
|
GHSA-772j-h9xw-ffp5
|
CHECK-fail in SparseCross due to type confusion
|
### Impact
The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service:
```python
import tensorflow as tf
hashed_output = False
num_buckets = 1949315406
hash_key = 1869835877
out_type = tf.string
internal_type = tf.string
indices_1 = tf.constant([0, 6], shape=[1, 2], dtype=tf.int64)
indices_2 = tf.constant([0, 0], shape=[1, 2], dtype=tf.int64)
indices = [indices_1, indices_2]
values_1 = tf.constant([0], dtype=tf.int64)
values_2 = tf.constant([72], dtype=tf.int64)
values = [values_1, values_2]
batch_size = 4
shape_1 = tf.constant([4, 122], dtype=tf.int64)
shape_2 = tf.constant([4, 188], dtype=tf.int64)
shapes = [shape_1, shape_2]
dense_1 = tf.constant([188, 127, 336, 0], shape=[4, 1], dtype=tf.int64)
dense_2 = tf.constant([341, 470, 470, 470], shape=[4, 1], dtype=tf.int64)
dense_3 = tf.constant([188, 188, 341, 922], shape=[4, 1], dtype=tf.int64)
denses = [dense_1, dense_2, dense_3]
tf.raw_ops.SparseCross(indices=indices, values=values, shapes=shapes, dense_inputs=denses, hashed_output=hashed_output,
num_buckets=num_buckets, hash_key=hash_key, out_type=out_type, internal_type=internal_type)
```
The above code will result in a `CHECK` fail in [`tensor.cc`](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/framework/tensor.cc#L670-L675):
```cc
void Tensor::CheckTypeAndIsAligned(DataType expected_dtype) const {
CHECK_EQ(dtype(), expected_dtype)
<< " " << DataTypeString(expected_dtype) << " expected, got "
<< DataTypeString(dtype());
...
}
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements:
```cc
if (DT_STRING == values_.dtype())
return Fingerprint64(values_.vec<tstring>().data()[start + n]);
return values_.vec<int64>().data()[start + n];
```
Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue.
### Patches
We have patched the issue in GitHub commit [b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025](https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29519'}
|
2021-05-21T14:21:08Z
|
2021-05-21T14:21:08Z
|
LOW
| 2.5 |
{'CWE-843'}
|
{'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025', 'https://github.com/advisories/GHSA-772j-h9xw-ffp5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29519', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025'}
|
{'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025'}
|
GHSA
|
GHSA-jq4v-f5q6-mjqq
|
Cross-Site Scripting in lxml
|
An XSS vulnerability was discovered in the python `lxml` clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in `lxml` 4.6.3.
|
{'CVE-2021-28957'}
|
2021-10-21T17:31:22Z
|
2021-03-22T16:53:53Z
|
MODERATE
| 6.1 |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28957', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html', 'https://bugs.launchpad.net/lxml/+bug/1888153', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/', 'https://github.com/lxml/lxml/pull/316', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/', 'https://security.netapp.com/advisory/ntap-20210521-0004/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://github.com/advisories/GHSA-jq4v-f5q6-mjqq', 'https://www.debian.org/security/2021/dsa-4880', 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d', 'https://pypi.org/project/lxml'}
| null |
{'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d'}
|
{'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999'}
|
GHSA
|
GHSA-2x4q-6jfv-8h9h
|
Path Traversal in glance
|
Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`.
## Recommendation
Update to version 3.0.4 or later.
|
{'CVE-2018-3715'}
|
2021-01-08T21:14:55Z
|
2018-07-26T14:53:14Z
|
HIGH
| 0 |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/590', 'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19', 'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://hackerone.com/reports/310106'}
| null |
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
|
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
|
GHSA
|
GHSA-4f5x-q4jc-xfcf
|
Cross-site Scripting in pimcore
|
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore.
|
{'CVE-2022-0262'}
|
2022-01-21T23:31:35Z
|
2022-01-21T23:31:35Z
|
MODERATE
| 6.6 |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0262', 'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7', 'https://huntr.dev/bounties/b38a4e14-5dcb-4e49-9990-494dc2a8fa0d', 'https://github.com/advisories/GHSA-4f5x-q4jc-xfcf'}
| null |
{'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7'}
|
{'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7'}
|
GHSA
|
GHSA-5m6c-jp6f-2vcv
|
Open Redirect in OAuth2 Proxy
|
### Impact
As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access.
This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.
|
{'CVE-2020-4037'}
|
2021-12-20T17:58:59Z
|
2021-12-20T17:58:59Z
|
MODERATE
| 4.3 |
{'CWE-601'}
|
{'https://github.com/advisories/GHSA-5m6c-jp6f-2vcv', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2', 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4037', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv'}
| null |
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
|
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
|
GHSA
|
GHSA-ppc3-fpvh-7396
|
Improper synchronization in Apache Netbeans HTML/Java API
|
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local privilege escalation version 1.7.1 creates the temporary directory atomically without dealing with the temporary file.
|
{'CVE-2020-17534'}
|
2022-05-03T19:31:06Z
|
2022-02-09T22:25:18Z
|
HIGH
| 7 |
{'CWE-362'}
|
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6', 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E', 'https://github.com/advisories/GHSA-ppc3-fpvh-7396', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534'}
| null |
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}
|
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}
|
GHSA
|
GHSA-63q7-h895-m982
|
Cross-site Scripting in dompurify
|
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
|
{'CVE-2020-26870'}
|
2022-04-28T17:58:52Z
|
2020-12-18T22:51:40Z
|
MODERATE
| 6.1 |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-63q7-h895-m982', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
{'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
|
{'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
|
GHSA
|
GHSA-f698-m2v9-5fh3
|
Command Injection in opencv
|
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands.
## Recommendation
Upgrade to version 6.1.0.
| null |
2021-08-04T20:49:45Z
|
2019-06-04T20:11:44Z
|
LOW
| 0 |
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-f698-m2v9-5fh3', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb', 'https://www.npmjs.com/advisories/789'}
| null |
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
|
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
|
GHSA
|
GHSA-3c48-6pcv-88rm
|
Macro in MathJax running untrusted Javascript within a web browser
|
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
|
{'CVE-2018-1999024'}
|
2022-04-26T18:18:00Z
|
2018-07-27T17:05:27Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024', 'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
| null |
{'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
|
{'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
|
GHSA
|
GHSA-r9p9-mrjm-926w
|
Use of a Broken or Risky Cryptographic Algorithm
|
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
|
{'CVE-2020-28498'}
|
2021-03-08T16:06:50Z
|
2021-03-08T16:06:50Z
|
MODERATE
| 6.8 |
{'CWE-327'}
|
{'https://github.com/advisories/GHSA-r9p9-mrjm-926w', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}
| null |
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'}
|
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'}
|
GHSA
|
GHSA-4w46-w44m-3jq3
|
Parse Server stores password in plain text
|
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js.
In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext.
This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
|
{'CVE-2020-26288'}
|
2022-04-19T19:02:42Z
|
2020-12-28T16:33:17Z
|
LOW
| 7.7 |
{'CWE-312'}
|
{'https://www.npmjs.com/package/parse-server', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a', 'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://www.npmjs.com/advisories/1593', 'https://github.com/advisories/GHSA-4w46-w44m-3jq3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288'}
| null |
{'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
|
{'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
|
GHSA
|
GHSA-hx77-5p88-f92r
|
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
|
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-4131'}
|
2022-01-05T20:33:55Z
|
2022-01-05T20:33:55Z
|
HIGH
| 8.8 |
{'CWE-352'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f', 'https://github.com/advisories/GHSA-hx77-5p88-f92r', 'https://huntr.dev/bounties/52dfac87-4fd3-4dfb-83d2-d39916764d43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4131'}
| null |
{'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f'}
|
GHSA
|
GHSA-6cgh-hjpw-q3gq
|
Utils.readChallengeTx does not verify the server account signature
|
The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3.
Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction.
Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.
|
{'CVE-2021-32738'}
|
2022-04-19T19:03:01Z
|
2021-07-02T19:20:33Z
|
MODERATE
| 6.5 |
{'CWE-287'}
|
{'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/advisories/GHSA-6cgh-hjpw-q3gq'}
| null |
{'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}
|
{'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}
|
GHSA
|
GHSA-vcjj-9vg7-vf68
|
Null pointer dereference in TFLite
|
### Impact
An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:
```python
import tensorflow as tf
model = tf.keras.models.Sequential()
model.add(tf.keras.Input(shape=(1, 2, 3)))
model.add(tf.keras.layers.Dense(0, activation='relu'))
converter = tf.lite.TFLiteConverter.from_keras_model(model)
tflite_model = converter.convert()
interpreter = tf.lite.Interpreter(model_content=tflite_model)
interpreter.allocate_tensors()
interpreter.invoke()
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer.
```cc
if (y4 > 1) {
// ...
} else {
for (int i0 = 0; i0 < y0; ++i0) {
const T* input2_data_ptr = nullptr;
for (int i1 = 0; i1 < y1; ++i1) {
input2_data_ptr = input2_data_reset;
for (int i2 = 0; i2 < y2; ++i2) {
scalar_broadcast_f(y3, params, *input1_data_ptr, input2_data_ptr,
output_data_ptr);
}
}
}
}
```
### Patches
We have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37688'}
|
2021-08-25T14:39:54Z
|
2021-08-25T14:39:54Z
|
HIGH
| 7.8 |
{'CWE-476'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37688', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68', 'https://github.com/advisories/GHSA-vcjj-9vg7-vf68', 'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'}
|
{'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'}
|
GHSA
|
GHSA-jgrx-mgxx-jf9v
|
Regular Expression Denial of Service in tmpl
|
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
|
{'CVE-2021-3777'}
|
2022-05-04T03:26:17Z
|
2021-09-20T20:27:52Z
|
HIGH
| 7.5 |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://github.com/advisories/GHSA-jgrx-mgxx-jf9v', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
| null |
{'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
|
{'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
|
GHSA
|
GHSA-52mh-p2m2-w625
|
Cross-site Scripting in HAPI FHIR
|
XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is not generally used in production systems so the attack surface is expected to be low, but affected systems are recommended to upgrade immediately.)
|
{'CVE-2019-12741'}
|
2021-08-04T21:01:40Z
|
2019-06-07T20:56:59Z
|
MODERATE
| 6.1 |
{'CWE-79'}
|
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a', 'https://github.com/jamesagnew/hapi-fhir/issues/1335', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741', 'https://github.com/advisories/GHSA-52mh-p2m2-w625', 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0'}
| null |
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}
|
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}
|
GHSA
|
GHSA-jm34-xm8m-w958
|
Open Redirect in oauth2_proxy
|
The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
|
{'CVE-2017-1000070'}
|
2021-12-20T18:04:40Z
|
2021-12-20T18:04:40Z
|
MODERATE
| 6.1 |
{'CWE-601'}
|
{'https://github.com/bitly/oauth2_proxy/pull/359', 'https://github.com/advisories/GHSA-jm34-xm8m-w958', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070', 'https://github.com/bitly/oauth2_proxy/issues/228', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070', 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5', 'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
| null |
{'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
|
{'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
|
GHSA
|
GHSA-5949-rw7g-wx7w
|
Deserialization of untrusted data in jackson-databind
|
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
{'CVE-2021-20190'}
|
2021-04-26T14:52:04Z
|
2021-01-20T21:20:15Z
|
HIGH
| 0 |
{'CWE-502'}
|
{'https://security.netapp.com/advisory/ntap-20210219-0008/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916633', 'https://github.com/advisories/GHSA-5949-rw7g-wx7w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190', 'https://github.com/FasterXML/jackson-databind/issues/2854', 'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a', 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E'}
| null |
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}
|
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}
|
GHSA
|
GHSA-74mg-6xqx-2vrq
|
Deserialization exploitation in Apache Dubbo
|
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.0.jar will cause the remotely load malicious classes and execute malicious code by constructing a malicious request. This issue was fixed in Apache Dubbo 2.6.9 and 2.7.8.
|
{'CVE-2020-11995'}
|
2022-02-09T22:27:01Z
|
2022-02-09T22:27:01Z
|
CRITICAL
| 9.8 |
{'CWE-502'}
|
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab', 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-74mg-6xqx-2vrq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11995'}
| null |
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}
|
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}
|
GHSA
|
GHSA-xqj7-j8j5-f2xr
|
Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator
|
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
|
{'CVE-2018-1000180'}
|
2022-04-26T18:56:39Z
|
2018-10-16T17:44:39Z
|
HIGH
| 7.5 |
{'CWE-327'}
|
{'https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2018:2423', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000180', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/106567', 'https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.debian.org/security/2018/dsa-4233', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-xqj7-j8j5-f2xr', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://security.netapp.com/advisory/ntap-20190204-0003/'}
| null |
{'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'}
|
{'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'}
|
GHSA
|
GHSA-qfpc-5pjr-mh26
|
Missing validation in shape inference for `Dequantize`
|
### Impact
The shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments:
```python
import tensorflow as tf
tf.compat.v1.disable_v2_behavior()
tf.raw_ops.Dequantize(
input_tensor = tf.constant(-10.0, dtype=tf.float32),
input_tensor = tf.cast(input_tensor, dtype=tf.quint8),
min_range = tf.constant([], shape=[0], dtype=tf.float32),
max_range = tf.constant([], shape=[0], dtype=tf.float32),
mode = 'MIN_COMBINED',
narrow_range=False,
axis=-10,
dtype=tf.dtypes.float32)
```
The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/array_ops.cc#L2999-L3014) uses `axis` to select between two different values for `minmax_rank` which is then used to retrieve tensor dimensions. However, code assumes that `axis` can be either `-1` or a value greater than `-1`, with no validation for the other values.
### Patches
We have patched the issue in GitHub commit [da857cfa0fde8f79ad0afdbc94e88b5d4bbec764](https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37677'}
|
2021-08-25T14:41:23Z
|
2021-08-25T14:41:23Z
|
MODERATE
| 5.5 |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-qfpc-5pjr-mh26', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37677', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26', 'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}
|
{'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}
|
GHSA
|
GHSA-2rr5-8q37-2w7h
|
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
|
### Severity
The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.)
### Impact
In Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default.
Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected:
- Nokogiri::XML::SAX::Parser
- Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser
- Nokogiri::XML::SAX::PushParser
- Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser
### Mitigation
JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier.
CRuby users are not affected.
|
{'CVE-2021-41098'}
|
2021-11-04T18:25:39Z
|
2021-09-27T20:12:47Z
|
HIGH
| 7.5 |
{'CWE-611'}
|
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41098', 'https://github.com/advisories/GHSA-2rr5-8q37-2w7h'}
| null |
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}
|
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}
|
GHSA
|
GHSA-844w-j86r-4x2j
|
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow
|
### Impact
A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory.
This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed.
### Patches
Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0.
### For more information
Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2019-16778'}
|
2021-11-01T14:12:43Z
|
2019-12-16T20:17:10Z
|
LOW
| 2.6 |
{'CWE-681', 'CWE-122'}
|
{'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j', 'https://github.com/advisories/GHSA-844w-j86r-4x2j'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}
|
{'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}
|
GHSA
|
GHSA-3xpw-vhmv-cw7h
|
Command injection in czproject/git-php
|
The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
|
{'CVE-2022-25866'}
|
2022-04-27T14:35:59Z
|
2022-04-26T00:00:35Z
|
HIGH
| 8.1 |
{'CWE-74'}
|
{'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25866', 'https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349', 'https://github.com/advisories/GHSA-3xpw-vhmv-cw7h', 'https://github.com/czproject/git-php/releases/tag/v4.0.3'}
| null |
{'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}
|
{'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}
|
GHSA
|
GHSA-w8qv-6jwh-64r5
|
Regular Expression Denial of Service in browserslist
|
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
|
{'CVE-2021-23364'}
|
2021-05-24T19:52:40Z
|
2021-05-24T19:52:40Z
|
MODERATE
| 5.3 |
{'CWE-400'}
|
{'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://github.com/advisories/GHSA-w8qv-6jwh-64r5', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/pull/593'}
| null |
{'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'}
|
{'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'}
|
GHSA
|
GHSA-8h84-8j4f-p97q
|
Injection in bodymen
|
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
|
{'CVE-2019-10792'}
|
2021-04-13T15:24:21Z
|
2021-04-13T15:24:21Z
|
MODERATE
| 6.3 |
{'CWE-74'}
|
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b', 'https://github.com/advisories/GHSA-8h84-8j4f-p97q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}
| null |
{'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
|
{'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
|
GHSA
|
GHSA-mxjr-xmcg-fg7w
|
Arbitrary Code Injection in mobile-icon-resizer
|
mobile-icon-resizer resizes large images for use as icons for iOS and Android.
mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3.
mobile-icon-resizer takes an options object as an argument to define the resulting icons as such:
```
var options = {
config: './config.js'
}
resize(options, function(err){});
```
config.js would need to be a file on the filesystem and look something like:
```
var config = {
iOS: {
"images": [
/* iOS image definitions are not vulnerable */
]
},
android: {
"images" : [
{
"baseRatio" : "console.log('Executing script as baseRatio property')",
"folder" : "drawable-ldpi"
},
{
"ratio" : "console.log('Executing script as ratio property')",
"folder" : "drawable-mdpi"
},
/* other android image defintiions ... */
]
}
};
exports = module.exports = config;
```
The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed.
## Recommendation
Update to version 0.4.3 or later.
| null |
2021-08-17T15:41:59Z
|
2019-06-27T17:25:21Z
|
MODERATE
| 6.5 |
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-mxjr-xmcg-fg7w', 'https://www.npmjs.com/advisories/317', 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://nodesecurity.io/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
| null |
{'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
|
{'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
|
GHSA
|
GHSA-7528-7jg5-6g62
|
Cross-site Scripting Vulnerability in CodeIgniter4
|
### Impact
Cross-Site Scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4.
Attackers can do XSS attacks if you are using `API\ResponseTrait`.
### Patches
Upgrade to v4.1.8 or later.
### Workarounds
Do one of the following:
1. Do not use `API\ResponseTrait` nor `ResourceController`
2. Disable Auto Route and [Use Defined Routes Only](https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only)
### References
- [Cross Site Scripting (XSS) Software Attack | OWASP Foundation](https://owasp.org/www-community/attacks/xss/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
{'CVE-2022-21715'}
|
2022-04-19T19:03:21Z
|
2022-01-27T15:09:00Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd', 'https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21715'}
| null |
{'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd'}
|
{'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd'}
|
GHSA
|
GHSA-9c8h-vvrj-w2p8
|
Heap OOB in `RaggedGather`
|
### Impact
If the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers.
```python
import tensorflow as tf
tf.raw_ops.RaggedGather(
params_nested_splits = [0,0,0],
params_dense_values = [1,1],
indices = [0,0,9,0,0],
OUTPUT_RAGGED_RANK=0)
```
In debug mode, the same code triggers a `CHECK` failure.
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors.
### Patches
We have patched the issue in GitHub commit [a2b743f6017d7b97af1fe49087ae15f0ac634373](https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37641'}
|
2021-08-25T14:43:59Z
|
2021-08-25T14:43:59Z
|
HIGH
| 7.1 |
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37641'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'}
|
{'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'}
|
GHSA
|
GHSA-g95j-p8f6-pwh4
|
Downloads Resources over HTTP in headless-browser-lite
|
Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`.
## Recommendation
Update to version 2015.4.18-a or later.
|
{'CVE-2016-10625'}
|
2021-06-10T23:42:14Z
|
2019-02-18T23:56:58Z
|
HIGH
| 8.1 |
{'CWE-311'}
|
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://www.npmjs.com/advisories/230', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://nodesecurity.io/advisories/230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4'}
| null |
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'}
|
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'}
|
GHSA
|
GHSA-2hw7-mxvj-m455
|
Path traversal in Node-RED-Dashboard
|
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
|
{'CVE-2021-3223'}
|
2021-01-29T18:13:52Z
|
2021-01-29T18:13:52Z
|
HIGH
| 0 |
{'CWE-22'}
|
{'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://github.com/advisories/GHSA-2hw7-mxvj-m455', 'https://www.npmjs.com/package/node-red-dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'}
| null |
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}
|
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}
|
GHSA
|
GHSA-v6vg-pxvv-g5cq
|
Improper Privilege Management in Snipe-IT
|
Snipe-IT prior to 5.3.9 is vulnerable to improper privilege management. A user who does not have access to the supplier module may view supplier content.
|
{'CVE-2022-0579'}
|
2022-02-26T00:33:40Z
|
2022-02-15T00:02:45Z
|
MODERATE
| 6.5 |
{'CWE-269'}
|
{'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1', 'https://huntr.dev/bounties/70a99cf4-3241-4ffc-b9ed-5c54932f3849', 'https://github.com/advisories/GHSA-v6vg-pxvv-g5cq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0579'}
| null |
{'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}
|
{'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}
|
GHSA
|
GHSA-qw8w-2xcp-xg59
|
Low severity vulnerability that affects passenger
|
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
|
{'CVE-2014-1832'}
|
2021-09-16T21:10:03Z
|
2018-10-10T17:29:27Z
|
LOW
| 0 | null |
{'http://openwall.com/lists/oss-security/2014/01/30/3', 'http://openwall.com/lists/oss-security/2014/01/29/6', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1832', 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'}
| null |
{'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}
|
{'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}
|
GHSA
|
GHSA-f7hx-fqxw-rvvj
|
Insufficient output escaping of attachment names in PHPMailer
|
### Impact
CWE-116: Incorrect output escaping.
An attachment added like this (note the double quote within the attachment name, which is entirely valid):
$mail->addAttachment('/tmp/attachment.tmp', 'filename.html";.jpg');
Will result in a message containing these headers:
Content-Type: application/octet-stream; name="filename.html";.jpg"
Content-Disposition: attachment; filename="filename.html";.jpg"
The attachment will be named `filename.html`, and the trailing `";.jpg"` will be ignored. Mail filters that reject `.html` attachments but permit `.jpg` attachments may be fooled by this.
Note that the MIME type itself is obtained automatically from the *source filename* (in this case `attachment.tmp`, which maps to a generic `application/octet-stream` type), and not the *name* given to the attachment (though these are the same if a separate name is not provided), though it can be set explicitly in other parameters to attachment methods.
### Patches
Patched in PHPMailer 6.1.6 by escaping double quotes within the name using a backslash, as per RFC822 section 3.4.1, resulting in correctly escaped headers like this:
Content-Type: application/octet-stream; name="filename.html\";.jpg"
Content-Disposition: attachment; filename="filename.html\";.jpg"
### Workarounds
Reject or filter names and filenames containing double quote (`"`) characters before passing them to attachment functions such as `addAttachment()`.
### References
[CVE-2020-13625](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13625).
[PHPMailer 6.1.6 release](https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the PHPMailer repo](https://github.com/PHPMailer/PHPMailer/issues)
|
{'CVE-2020-13625'}
|
2021-08-25T21:37:24Z
|
2020-05-27T16:37:02Z
|
HIGH
| 7.5 |
{'CWE-116'}
|
{'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-f7hx-fqxw-rvvj', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SMH4TC5XTS3KZVGMSKEPPBZ2XTZCKKCX/', 'https://usn.ubuntu.com/4505-1/', 'https://github.com/advisories/GHSA-f7hx-fqxw-rvvj', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13625', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00014.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/EFM3BZABL6RUHTVMXSC7OFMP4CKWMRPJ/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html'}
| null |
{'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3'}
|
{'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3'}
|
GHSA
|
GHSA-p5xh-vx83-mxcj
|
HTTP Request Smuggling in Twisted
|
In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.
|
{'CVE-2020-10109'}
|
2022-04-04T21:10:40Z
|
2020-03-31T15:40:12Z
|
CRITICAL
| 9.8 |
{'CWE-444'}
|
{'https://lists.fedoraproject.org/archives/list/[email protected]/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/', 'https://usn.ubuntu.com/4308-1/', 'https://know.bishopfox.com/advisories/twisted-version-19.10.0', 'https://security.gentoo.org/glsa/202007-24', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html', 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10109', 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13', 'https://github.com/advisories/GHSA-p5xh-vx83-mxcj', 'https://usn.ubuntu.com/4308-2/'}
| null |
{'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}
|
{'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}
|
GHSA
|
GHSA-jjcx-999m-35hc
|
Improper Input Validation in Firefly III
|
Firefly III 4.7.17.3 is vulnerable to local file enumeration. An attacker can enumerate local files due to the lack of protocol scheme sanitization, such as for file:/// URLs. This is related to fints_url to import/job/configuration, and import/create/fints.
|
{'CVE-2019-14671'}
|
2021-09-08T17:27:07Z
|
2021-09-08T17:27:07Z
|
LOW
| 3.3 |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-jjcx-999m-35hc', 'https://github.com/firefly-iii/firefly-iii/issues/2367', 'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14671'}
| null |
{'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c'}
|
{'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c'}
|
GHSA
|
GHSA-j44m-qm6p-hp7m
|
Arbitrary File Overwrite in tar
|
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file.
## Recommendation
For tar 4.x, upgrade to version 4.4.2 or later.
For tar 2.x, upgrade to version 2.2.2 or later.
|
{'CVE-2018-20834'}
|
2021-08-03T21:28:27Z
|
2019-05-01T18:37:31Z
|
HIGH
| 7.5 |
{'CWE-59'}
|
{'https://hackerone.com/reports/344595', 'https://access.redhat.com/errata/RHSA-2019:1821', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779', 'https://github.com/npm/node-tar/commits/v2.2.2', 'https://github.com/advisories/GHSA-j44m-qm6p-hp7m', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://www.npmjs.com/advisories/803'}
| null |
{'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}
|
{'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'}
|
GHSA
|
GHSA-6r7c-6w96-8pvw
|
Remote Code Execution in AjaxNetProfessional
|
### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
### Description
Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.
Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.
Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.
An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.
Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).
### Releases
Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.
### Workarounds
There is no workaround available that addresses all issues except updating to latest version from GitHub.
### References
Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971
Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this GitHub repository
| null |
2022-04-19T19:03:17Z
|
2021-12-07T21:21:49Z
|
CRITICAL
| 9.8 |
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://github.com/advisories/GHSA-6r7c-6w96-8pvw', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}
| null |
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
|
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
|
GHSA
|
GHSA-hqq7-2q2v-82xq
|
Cross-site Scripting in sanitize-url
|
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
|
{'CVE-2021-23648'}
|
2022-04-22T14:58:23Z
|
2022-03-17T00:00:24Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183', 'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882', 'https://github.com/advisories/GHSA-hqq7-2q2v-82xq'}
| null |
{'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
|
{'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
|
GHSA
|
GHSA-7x48-7466-3g33
|
Command injection in guake
|
Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
|
{'CVE-2021-23556'}
|
2022-04-05T18:49:12Z
|
2022-03-18T00:01:11Z
|
MODERATE
| 6.4 | null |
{'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888', 'https://github.com/Guake/guake/pull/2017', 'https://github.com/Guake/guake/issues/1796', 'https://github.com/Guake/guake/releases', 'https://github.com/pypa/advisory-database/tree/main/vulns/guake/PYSEC-2022-165.yaml', 'https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334', 'https://github.com/advisories/GHSA-7x48-7466-3g33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23556'}
| null |
{'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888'}
|
{'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888'}
|
GHSA
|
GHSA-9mxf-g3x6-wv74
|
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
|
{'CVE-2018-14721'}
|
2021-06-10T23:55:51Z
|
2019-01-04T19:07:06Z
|
CRITICAL
| 10 |
{'CWE-918'}
|
{'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1106', 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://seclists.org/bugtraq/2019/May/68', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.debian.org/security/2019/dsa-4452', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1822'}
| null |
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
|
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
|
GHSA
|
GHSA-x4g7-fvjj-prg8
|
Division by 0 in `QuantizedConv2D`
|
### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`:
```python
import tensorflow as tf
input = tf.zeros([1, 1, 1, 1], dtype=tf.quint8)
filter = tf.constant([], shape=[1, 0, 1, 1], dtype=tf.quint8)
min_input = tf.constant(0.0)
max_input = tf.constant(0.0001)
min_filter = tf.constant(0.0)
max_filter = tf.constant(0.0001)
strides = [1, 1, 1, 1]
padding = "SAME"
tf.raw_ops.QuantizedConv2D(input=input, filter=filter, min_input=min_input, max_input=max_input, min_filter=min_filter, max_filter=max_filter, strides=strides, padding=padding)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller:
```cc
const int filter_value_count = filter_width * filter_height * input_depth;
const int64 patches_per_chunk = kMaxChunkSize / (filter_value_count * sizeof(T1));
```
### Patches
We have patched the issue in GitHub commit [cfa91be9863a91d5105a3b4941096044ab32036b](https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29527'}
|
2021-05-21T14:21:59Z
|
2021-05-21T14:21:59Z
|
LOW
| 2.5 |
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4g7-fvjj-prg8', 'https://github.com/advisories/GHSA-x4g7-fvjj-prg8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29527'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b'}
|
{'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b'}
|
GHSA
|
GHSA-887w-45rq-vxgf
|
Moderate severity vulnerability that affects SQLAlchemy
|
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
|
{'CVE-2019-7164'}
|
2022-03-23T21:45:00Z
|
2019-04-16T15:50:41Z
|
CRITICAL
| 9.8 |
{'CWE-89'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html', 'https://github.com/advisories/GHSA-887w-45rq-vxgf', 'https://github.com/sqlalchemy/sqlalchemy/issues/4481', 'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7164', 'https://access.redhat.com/errata/RHSA-2019:0984', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:0981', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html', 'https://www.oracle.com/security-alerts/cpujan2021.html'}
| null |
{'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414'}
|
{'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414'}
|
GHSA
|
GHSA-82mg-x548-gq3j
|
LDAP Injection in ldapauth
|
Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter.
## Recommendation
ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater.
|
{'CVE-2015-7294'}
|
2021-09-23T19:58:04Z
|
2020-08-31T22:49:46Z
|
HIGH
| 7.5 |
{'CWE-90'}
|
{'https://www.npmjs.com/advisories/19', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://www.npmjs.com/advisories/18', 'https://github.com/advisories/GHSA-82mg-x548-gq3j', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'http://www.openwall.com/lists/oss-security/2015/09/18/4'}
| null |
{'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'}
|
{'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'}
|
GHSA
|
GHSA-9c78-vcq7-7vxq
|
Out of bounds write in TFLite
|
### Impact
An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions.
### Patches
We have patched the issue in GitHub commit [6c0b2b70eeee588591680f5b7d5d38175fd7cdf6](https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
|
{'CVE-2022-23561'}
|
2022-02-11T15:07:45Z
|
2022-02-09T23:53:47Z
|
HIGH
| 8.8 |
{'CWE-787'}
|
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23561', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq', 'https://github.com/advisories/GHSA-9c78-vcq7-7vxq'}
| null |
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6'}
|
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6'}
|
GHSA
|
GHSA-xmc8-26q4-qjhx
|
Denial of Service (DoS) in Jackson Dataformat CBOR
|
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
|
{'CVE-2020-28491'}
|
2022-02-09T18:27:40Z
|
2021-12-09T19:17:21Z
|
HIGH
| 7.5 |
{'CWE-770'}
|
{'https://github.com/FasterXML/jackson-dataformats-binary/issues/186', 'https://github.com/advisories/GHSA-xmc8-26q4-qjhx', 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491'}
| null |
{'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
|
{'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
|
GHSA
|
GHSA-rp42-c45j-g46x
|
yetiforcecrm is vulnerable to Cross-site Scripting
|
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-4107'}
|
2021-12-16T14:12:23Z
|
2021-12-16T14:12:23Z
|
MODERATE
| 5.3 |
{'CWE-79'}
|
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89', 'https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4107', 'https://github.com/advisories/GHSA-rp42-c45j-g46x'}
| null |
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89'}
|
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89'}
|
GHSA
|
GHSA-9c5c-5j4h-8q2c
|
bookstack is vulnerable to Improper Access Control.
|
bookstack prior to version 21.11.3 is vulnerable to Improper Access Control.
|
{'CVE-2021-4119'}
|
2022-01-04T19:34:01Z
|
2021-12-16T19:40:26Z
|
MODERATE
| 5.3 |
{'CWE-284'}
|
{'https://github.com/advisories/GHSA-9c5c-5j4h-8q2c', 'https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca', 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4119', 'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}
| null |
{'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}
|
{'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}
|
GHSA
|
GHSA-24r8-fm9r-cpj2
|
Low severity vulnerability that affects com.linecorp.armeria:armeria
|
## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function
### Impact
String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implementation of `equals` method from `java.lang.String`. While this attack is not practically possible, an attacker still has a potential to attack if the victim's server validates user by using `equals` method.
We would like to thank @chrsow for pointing out the issue.
## Potentially vulnerable codes
https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/OAuth2Token.java#L54
https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/BasicToken.java#L64
### Patches
There are two options to patch this issue.
1. Remove `equals` method; it has been exclusively used for test cases and was never used in any OSS projects that are using Armeria. (But it is worth noting that there are possibilities of closed projects authenticating users by utilizing `equals` method)
2. Use `MessageDigest.isEqual` to compare the credential instead.
### Workarounds
1. Update to the latest version (TBD)
2-1. Users can prevent these vulnerabilities by modifying and implementing timing attack preventions by themselves.
2-2. Precisely speaking, it is possible to compare credentials by securely comparing them after calling methods to directly return the input (namely `Object. accessToken()`, `Object.username()` and `Object.password()`).
### References
- https://cwe.mitre.org/data/definitions/208.html
- https://security.stackexchange.com/questions/111040/should-i-worry-about-remote-timing-attacks-on-string-comparison
### Side Note
Since it is a theoretical attack, there is no PoC available from neither the vendor nor the security team.
|
{'CVE-2019-16771'}
|
2022-04-19T19:02:23Z
|
2019-12-05T18:40:51Z
|
LOW
| 4.8 |
{'CWE-113'}
|
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86', 'https://github.com/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16771'}
| null |
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'}
|
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'}
|
GHSA
|
GHSA-p2j7-6g9h-32xh
|
Cross site scripting in Shopizer
|
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
|
{'CVE-2022-23059'}
|
2022-04-12T21:59:09Z
|
2022-03-30T00:00:27Z
|
MODERATE
| 5.4 |
{'CWE-79'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059', 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e', 'https://github.com/advisories/GHSA-p2j7-6g9h-32xh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23059'}
| null |
{'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}
|
{'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}
|
GHSA
|
GHSA-q6j3-c4wc-63vw
|
CSRF tokens leaked in URL by canned query form
|
### Impact
The HTML form for a read-only canned query includes the hidden CSRF token field added in #798 for writable canned queries (#698).
This means that submitting those read-only forms exposes the CSRF token in the URL - for example on https://latest.datasette.io/fixtures/neighborhood_search submitting the form took me to:
https://latest.datasette.io/fixtures/neighborhood_search?text=down&csrftoken=CSRFTOKEN-HERE
This token could potentially leak to an attacker if the resulting page has a link to an external site on it and the user clicks the link, since the token would be exposed in the referral logs.
### Patches
A fix for this issue has been released in Datasette 0.46.
### Workarounds
You can fix this issue in a Datasette instance without upgrading by copying the [0.46 query.html template](https://raw.githubusercontent.com/simonw/datasette/0.46/datasette/templates/query.html) into a custom `templates/` directory and running Datasette with the `--template-dir=templates/` option.
### References
Issue 918 discusses this in details: https://github.com/simonw/datasette/issues/918
### For more information
Contact swillison at gmail with any questions.
| null |
2021-09-23T18:50:16Z
|
2020-08-11T14:54:40Z
|
MODERATE
| 4.3 |
{'CWE-200'}
|
{'https://snyk.io/vuln/SNYK-PYTHON-DATASETTE-598229', 'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b', 'https://github.com/advisories/GHSA-q6j3-c4wc-63vw', 'https://github.com/simonw/datasette/security/advisories/GHSA-q6j3-c4wc-63vw', 'https://github.com/simonw/datasette/issues/918'}
| null |
{'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b'}
|
{'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b'}
|
GHSA
|
GHSA-f8xq-q7px-wg8c
|
Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging
|
### Impact
The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user's computer.
### Patches
The problem has been patched as of `2.8.11`, which escapes the data saved to the csv with single quotes.
### Workarounds
If you are using an older version of `gradio`, don't open csv files generated by `gradio` with Excel or similar spreadsheet programs.
|
{'CVE-2022-24770'}
|
2022-03-22T12:44:43Z
|
2022-03-18T23:11:43Z
|
HIGH
| 8.8 |
{'CWE-1236'}
|
{'https://github.com/gradio-app/gradio/security/advisories/GHSA-f8xq-q7px-wg8c', 'https://github.com/gradio-app/gradio/pull/817', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24770', 'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239', 'https://github.com/advisories/GHSA-f8xq-q7px-wg8c'}
| null |
{'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239'}
|
{'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239'}
|
GHSA
|
GHSA-3pcq-34w5-p4g2
|
forEachSeries and forEachLimit do not limit the number of requests
|
### Impact
This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects.
### Patches
The problem has been patched in 1.0.4.
### Workarounds
There is no workaround aside from upgrading to 1.0.4.
|
{'CVE-2021-41167'}
|
2021-10-27T17:05:59Z
|
2021-10-21T17:49:30Z
|
HIGH
| 7.5 |
{'CWE-400'}
|
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436', 'https://github.com/nicolas-van/modern-async/issues/5', 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://github.com/advisories/GHSA-3pcq-34w5-p4g2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'}
| null |
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}
|
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.