schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
24 values
aliases
stringlengths
2
20
summary
stringlengths
9
130
details
stringlengths
34
11.7k
severity
stringlengths
2
92
affected
stringlengths
73
3.22k
references
stringlengths
64
21.2k
database_specific
stringlengths
131
202
1.4.0
GHSA-8qxj-f9rh-9fg2
2021-08-31T21:18:12Z
2020-04-01T16:35:26Z
null
['CVE-2019-14859']
Improper Verification of Cryptographic Signature in Pure-Python ECDSA
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ecdsa'}, 'ecosystem_specific': {'affected_functions': ['ecdsa.der.remove_constructed', 'ecdsa.der.remove_sequence', 'ecdsa.der.remove_octet_string', 'ecdsa.der.remove_object', 'ecdsa.der.remove_integer', 'ecdsa.der.read_length', 'ecdsa.keys.VerifyingKey.verify_digest', 'ecdsa.util.sigdecode_string', 'ecdsa.util.sigdecode_strings']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14859'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/issues/114'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/pull/115'}, {'type': 'WEB', 'url': 'https://github.com/tlsfuzzer/python-ecdsa/commit/3427fa29f319b27898a28601955807abb44c0830'}, {'type': 'WEB', 'url': 'https://github.com/tlsfuzzer/python-ecdsa/commit/9080d1d5ac533da0de00466aaffb49bee808bb4e'}, {'type': 'WEB', 'url': 'https://github.com/tlsfuzzer/python-ecdsa/commit/b0ea52bb3aa9a16c9a4a91fdc0041edbfed10b31'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859'}, {'type': 'PACKAGE', 'url': 'https://github.com/warner/python-ecdsa'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3'}, {'type': 'WEB', 'url': 'https://pypi.org/project/ecdsa/0.13.3/'}]
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T15:40:54Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}
1.4.0
GHSA-w8rc-pgxq-x2cj
2021-01-08T21:09:16Z
2020-04-22T20:59:26Z
null
['CVE-2020-11007']
Negative charge in shopping cart in Shopizer
### Impact Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total. ### Patches Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0 ### Workarounds Without uprading, it's possible to just apply the fixes in the same files it's done for the patch. Or you use javax constraint validation on the quantity parameter. ### References [Input Validation](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html) [Using bean validation constraint](https://javaee.github.io/tutorial/bean-validation002.html) [Commits with fixes](https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a) CVE Details below : [Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11007) [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-11007) ### Credits Found and solved by Yannick Gosset from Aix-Marseille University cybersecurity master program supervised by Yassine Ilmi
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:sm-core-model'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T18:16:42Z', 'nvd_published_at': None}
1.4.0
GHSA-6gp3-h3jj-prx4
2022-04-28T17:58:13Z
2020-04-07T15:47:40Z
null
['CVE-2020-7637']
Prototype pollution in class-transformer
class-transformer through 0.2.3 is vulnerable to Prototype Pollution. The 'classToPlainFromExist' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'class-transformer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7637'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-transformer/commit/8f04eb9db02de708f1a20f6f2d2bb309b2fed01e'}, {'type': 'PACKAGE', 'url': 'https://github.com/typestack/class-transformer'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-transformer/blob/a650d9f490573443f62508bc063b857bcd5e2525/src/ClassTransformer.ts#L29-L31,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-07T15:46:31Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}
1.4.0
GHSA-hj69-c76v-86wr
2023-09-05T09:26:37Z
2020-04-01T16:36:00Z
null
['CVE-2020-5313']
Out-of-bounds Read in Pillow
`libImaging/FliDecode.c` in Pillow before 6.2.2 has an FLI buffer overflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5313'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4631'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:15:16Z', 'nvd_published_at': '2020-01-03T01:15:00Z'}
1.4.0
GHSA-gv3v-92v6-m48j
2021-07-29T15:47:43Z
2020-04-03T15:23:30Z
null
['CVE-2020-7622']
Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)
### Impact - Cross Site Scripting - Cache Poisoning - Page Hijacking ### Patches This was fixed in version `2.2.1`. ### Workarounds If you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters. ### References ##### [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) I've been poking at libraries to see if they are vulnerable to HTTP Response Splitting and Jooby is my third case of finding this vulnerability. ### Root Cause This roots cause back to this line in the Jooby codebase: https://github.com/jooby-project/jooby/blob/93cfc80aa20c188f71a442ea7a1827da380e1c27/modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java#L102 The `DefaultHttpHeaders` takes a parameter `validate` which, when `true` (as it is for the no-arg constructor) validates that the header isn't being abused to do HTTP Response Splitting. ### Reported By This vulnerability was reported by @JLLeitschuh ([Twitter](https://twitter.com/JLLeitschuh)) ### For more information If you have any questions or comments about this advisory: * Open an issue in [jooby-project/jooby](https://github.com/jooby-project/jooby/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jooby:jooby-netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7622'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249'}]
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-02T23:59:56Z', 'nvd_published_at': '2020-04-06T15:15:00Z'}
1.4.0
GHSA-265q-28rp-chq5
2021-08-23T15:25:55Z
2020-04-16T03:14:50Z
null
['CVE-2015-8851']
Insecure Entropy Source - Math.random() in node-uuid
Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's. ## Recommendation Update to version 1.4.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-uuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851'}, {'type': 'WEB', 'url': 'https://github.com/broofa/node-uuid/issues/108'}, {'type': 'WEB', 'url': 'https://github.com/broofa/node-uuid/issues/122'}, {'type': 'WEB', 'url': 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/93'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/13/8'}]
{'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T02:58:22Z', 'nvd_published_at': None}
1.4.0
GHSA-jgpq-g82g-6c39
2021-07-28T23:16:44Z
2020-04-07T15:52:05Z
null
['CVE-2020-7638']
confinit vulnerable to prototype pollution
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'confinit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7638'}, {'type': 'WEB', 'url': 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433'}]
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-07T15:51:51Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}
1.4.0
GHSA-5679-7qrc-5m7j
2021-09-02T18:48:11Z
2020-04-29T16:31:12Z
null
['CVE-2020-11009']
IDOR can reveal execution data and logs to unauthorized user in Rundeck
### Impact Authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see. > Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher. ### Details An authenticated user could craft a request to: * View Executions and download execution logs without access to `read` or `view` the associated Job, or ad-hoc resource. * Get the list of running executions in a project, without Event `read` access, if they have `read` access to view the project. * View the Options definitions of a Job without access to view the Job. * View the definition of a workflow step of a Job without access to view the Job. * View the SCM diff of a modified Job definition if SCM is enabled, without Project `export` access level. * View the New User Profile Form for a different username, without User `admin` access. Note: they would not be allowed to create or modify a profile for a different user, or reveal any user profile information for a different user. Some authenticated API requests were not correctly checking appropriate authorization levels: * The list of running Executions would be sent without `read` access to Events. * The Plugin Input Parameters for a SCM plugin would be sent without authorization for project `import`,`scm_import`,`export`, or `scm_export` actions. * Job Retry action could retry an execution without `read` or `view` access to the Execution, which would reveal the Execution's option values. (`run` access to the Job was still required). ### Patches Upgrade to Rundeck version 3.2.6 ### Workarounds None ### References [3.2.6 Release Notes](https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html) ### Report If you have any questions or comments about this advisory: * Email us at [security@rundeck.com](mailto:security@rundeck.com) To report security issues to Rundeck please use the form at [http://rundeck.com/security](http://rundeck.com/security) Reporter: Justine Osborne of Apple Information Security
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.rundeck:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11009'}, {'type': 'WEB', 'url': 'https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/rundeck/rundeck'}]
{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T16:30:45Z', 'nvd_published_at': '2020-04-29T17:15:00Z'}
1.4.0
GHSA-9w6v-m7wp-jwg4
2021-08-25T21:03:11Z
2020-04-29T17:58:53Z
null
['CVE-2020-11021']
Http request which redirect to another hostname do not strip authorization header in @actions/http-client
### Impact If consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname The authorization header will get passed to the other domain. Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with [these permissions](https://help.github.com/en/actions/configuring-and-managing-workflows/authenticating-with-the-github_token#permissions-for-the-github_token). ### Patches The problem is fixed in 1.0.8 at [npm here](https://www.npmjs.com/package/@actions/http-client). In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different. ### Workarounds None. ### References https://github.com/actions/http-client/pull/27 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/actions/http-client/issues
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@actions/http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11021'}, {'type': 'WEB', 'url': 'https://github.com/actions/http-client/pull/27'}, {'type': 'WEB', 'url': 'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'}, {'type': 'PACKAGE', 'url': 'https://github.com/actions/http-client/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T17:58:41Z', 'nvd_published_at': '2020-04-29T18:15:00Z'}
1.4.0
GHSA-vh95-rmgr-6w4m
2022-04-26T21:01:40Z
2020-04-03T21:48:32Z
null
['CVE-2020-7598']
Prototype Pollution in minimist
Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application. This is exploitable if attackers have control over the arguments being passed to `minimist`. ## Recommendation Upgrade to versions 0.2.1, 1.2.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ecosystem_specific': {'affected_functions': ['minimist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ecosystem_specific': {'affected_functions': ['minimist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7598'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/10bd4cdf49d9686d48214be9d579a9cdfda37c68'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94'}, {'type': 'PACKAGE', 'url': 'https://github.com/substack/minimist'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1179'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-03T21:42:08Z', 'nvd_published_at': '2020-03-11T23:15:00Z'}
1.4.0
GHSA-8h56-v53h-5hhj
2021-07-28T21:49:46Z
2020-04-14T15:27:14Z
null
['CVE-2020-10204']
Remote Code Execution - JavaEL Injection (low privileged accounts) in Nexus Repository Manager
Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10204'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-012-nxrm-sonatype'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044356194'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044882533'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:26:21Z', 'nvd_published_at': '2020-04-01T19:15:00Z'}
1.4.0
GHSA-6m9g-jr8c-cqw3
2023-08-07T15:19:35Z
2020-04-29T17:12:39Z
null
['CVE-2019-1000007']
Depth counting error in guard() leading to multiple potential security issues in aioxmpp
### Impact Possible remote Denial of Service or Data Injection. ### Patches Patches are available in https://github.com/horazont/aioxmpp/pull/268. They have been backported to the 0.10 release series and 0.10.3 is the first release to contain the fix. ### Workarounds To make the bug exploitable, an error suppressing ``xso_error_handler`` is required. By not using ``xso_error_handlers`` or not using the suppression function, the vulnerability can be mitigated completely (to our knowledge). ### References The pull request contains a detailed description: https://github.com/horazont/aioxmpp/pull/268 ### For more information If you have any questions or comments about this advisory: * [Join our chat](xmpp:aioxmpp@conference.zombofant.net?join) * Email the maintainer [Jonas Schäfer](mailto:jonas@wielicki.name)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aioxmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/security/advisories/GHSA-6m9g-jr8c-cqw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000007'}, {'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/pull/268'}, {'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/commit/29ff0838a40f58efe30a4bbcea95aa8dab7da475'}, {'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/commit/f151f920f439d97d4103fc11057ed6dc34fe98be'}, {'type': 'PACKAGE', 'url': 'https://github.com/horazont/aioxmpp'}]
{'cwe_ids': ['CWE-237'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T17:12:16Z', 'nvd_published_at': '2019-02-04T21:29:00Z'}
1.4.0
GHSA-g2f6-v5qh-h2mq
2021-07-28T21:48:57Z
2020-04-14T15:27:05Z
null
['CVE-2020-10199']
Nexus Repository Manager 3 - Remote Code Execution
Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-extdirect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10199'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/917.html'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-015-nxrm-sonatype'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044882533'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:26:13Z', 'nvd_published_at': '2020-04-01T19:15:00Z'}
1.4.0
GHSA-24m3-w8g9-jwpq
2021-10-20T22:23:05Z
2020-04-22T20:59:44Z
null
['CVE-2020-5301']
Information disclosure of source code in SimpleSAMLphp
### Background The module controller in `SimpleSAML\Module` that processes requests for pages hosted by modules, has code to identify paths ending with `.php` and process those as PHP code. If no other suitable way of handling the given path exists it presents the file to the browser. ### Description The check to identify paths ending with `.php` does not account for uppercase letters. If someone requests a path ending with e.g. `.PHP` and the server is serving the code from a case-insensitive file system, such as on Windows, the processing of the PHP code does not occur, and the source code is instead presented to the browser. ### Affected versions SimpleSAMLphp versions **1.18.5 and older**. ### Impact An attacker may use this issue to gain access to the source code in third-party modules that is meant to be private, or even sensitive. However, the attack surface is considered small, as the attack will only work when SimpleSAMLphp serves such content from a file system that is not case-sensitive, such as on Windows. ### Resolution Upgrade the SimpleSAMLphp installation to version **1.18.6**. ### Credit This vulnerability was discovered and reported by Sławek Naczyński.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp/'}]
{'cwe_ids': ['CWE-178', 'CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-04-21T19:50:30Z', 'nvd_published_at': '2020-04-21T20:15:00Z'}
1.4.0
GHSA-9j2c-x8qm-qmjq
2021-01-08T20:21:40Z
2020-04-20T21:31:23Z
null
['CVE-2020-11010']
SQL injection in Tortoise ORM
### Impact Various forms of SQL injection has been found, for MySQL and when filtering or doing mass-updates on char/text fields. SQLite & PostgreSQL was only affected when filtering with ``contains``, ``starts_with`` or ``ends_with`` filters (and their case-insensitive counterparts) ### Patches Please upgrade to 0.15.23+ or 0.16.6+ ### For more information If you have any questions or comments about this advisory: * Open an issue in [Github](https://github.com/tortoise/tortoise-orm/issues) * Chat to us on [Gitter](https://gitter.im/tortoise/community)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tortoise-orm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tortoise-orm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.16.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tortoise/tortoise-orm/security/advisories/GHSA-9j2c-x8qm-qmjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11010'}, {'type': 'WEB', 'url': 'https://github.com/tortoise/tortoise-orm/commit/91c364053e0ddf77edc5442914c6f049512678b3'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-20T21:31:05Z', 'nvd_published_at': None}
1.4.0
GHSA-6pmv-7pr9-cgrj
2021-08-23T15:17:35Z
2020-04-15T21:09:27Z
null
['CVE-2020-1731']
Predictable password in Keycloak
A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1731'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731'}]
{'cwe_ids': ['CWE-330', 'CWE-341'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:59:00Z', 'nvd_published_at': '2020-03-02T17:15:00Z'}
1.4.0
GHSA-3944-787c-f852
2021-08-23T15:11:55Z
2020-04-14T15:27:21Z
null
['CVE-2020-10203']
Persistent Cross-Site scripting in Nexus Repository Manager
Sonatype Nexus Repository before 3.21.2 allows XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10203'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-016-nxrm-sonatype'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360044361594'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:26:28Z', 'nvd_published_at': None}
1.4.0
GHSA-6495-8jvh-f28x
2021-10-04T21:23:14Z
2020-10-02T15:39:54Z
null
[]
File restriction bypass in socket.io-file
All versions of `socket.io-file`are vulnerable to a file restriction bypass. The validation for valid file types only happens on the client-side, which allows an attacker to intercept the Websocket request post-validation and alter the `name` value to upload any file types. No fix is currently available. Consider using an alternative package until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'socket.io-file'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807'}, {'type': 'PACKAGE', 'url': 'https://github.com/rico345100/socket.io-file'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1564'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T15:36:34Z', 'nvd_published_at': None}
1.4.0
GHSA-5hv6-mh8q-q9v8
2021-11-19T14:41:16Z
2020-10-16T16:55:49Z
null
['CVE-2020-15252']
RCE in XWiki
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. ### Patches It has been patched in both version XWiki 12.5 and XWiki 11.10.6. ### Workarounds The only workaround is to give SCRIPT right only to trusted users. ### References https://jira.xwiki.org/browse/XWIKI-17423 It's been reported by the GitHub Security Lab under https://jira.xwiki.org/browse/XWIKI-17141. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0'}, {'fixed': '12.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15252'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17141'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17423'}]
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T16:55:27Z', 'nvd_published_at': '2020-10-16T17:15:00Z'}
1.4.0
GHSA-8gv3-3j7f-wg94
2021-11-19T15:12:40Z
2020-10-02T16:22:19Z
null
['CVE-2020-15227']
Potential Remote Code Execution vulnerability
Packages nette/application versions prior to 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette versions prior to 2.0.19 and 2.1.13 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Reported by Cyku Hong from DEVCORE (https://devco.re) ### Impact Code injection, possible remote code execution. ### Patches Fixed in nette/application 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette 2.0.19 and 2.1.13
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'nette/application'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15227'}, {'type': 'PACKAGE', 'url': 'https://github.com/nette/application'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/nette/application'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/nette/nette'}]
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T19:00:48Z', 'nvd_published_at': '2020-10-01T19:15:00Z'}
1.4.0
GHSA-5jjv-x4fq-qjwp
2023-05-16T16:18:49Z
2020-10-05T15:48:34Z
null
['CVE-2020-15237']
Possible timing attack in derivation_endpoint
### Impact When using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. ### Patches The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. ### Workarounds Users of older Shrine versions can apply the following monkey-patch after loading the `derivation_endpoint` plugin: ```rb class Shrine class UrlSigner def verify_signature(string, signature) if signature.nil? fail InvalidSignature, "missing \"signature\" param" elsif !Rack::Utils.secure_compare(signature, generate_signature(string)) fail InvalidSignature, "provided signature does not match the calculated signature" end end end end ``` ### References You can read more about timing attacks [here](https://en.wikipedia.org/wiki/Timing_attack).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'shrine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shrinerb/shrine/security/advisories/GHSA-5jjv-x4fq-qjwp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15237'}, {'type': 'WEB', 'url': 'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/shrine/CVE-2020-15237.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/shrinerb/shrine'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-05T15:46:53Z', 'nvd_published_at': None}
1.4.0
GHSA-p68v-frgx-4rjp
2020-10-19T21:34:01Z
2020-10-19T21:34:14Z
null
[]
Denial of Service via Cache Flooding
### Impact Denial of Service via Cache Flooding ### Patches We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-p68v-frgx-4rjp'}]
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T21:34:01Z', 'nvd_published_at': None}
1.4.0
GHSA-82rf-q3pr-4f6p
2023-09-11T20:18:19Z
2020-10-08T22:11:32Z
null
['CVE-2020-26149']
Sensitive data exposure in NATS
Preview versions of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials. The `_connection_` configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's CONNECT message, immediately after TLS establishment. The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed. Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication is NOT affected. Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data. ### Security impact: * NPM package nats.js: + mainline is unaffected + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209 ### Logic flaw: * NPM package nats.ws: + status: preview + flawed from 1.0.0-85, fixed in 1.0.0-111 * Deno repository https://github.com/nats-io/nats.deno + status: preview + flawed in all git tags prior to fix + fixed with git tag v1.0.0-9 ### Impact: For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nats'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-201'}, {'fixed': '2.0.0-209'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-206'}}, {'package': {'ecosystem': 'npm', 'name': 'nats.ws'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-85'}, {'fixed': '1.0.0-111'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-110'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/nats.ws'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/30/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T22:11:09Z', 'nvd_published_at': None}
1.4.0
GHSA-6fmv-q269-55cw
2021-01-08T21:18:07Z
2020-10-30T17:05:59Z
null
['CVE-2020-15277']
Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit template. Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by Aquilao Null
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20201029'}]
{'cwe_ids': ['CWE-434', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-30T16:54:46Z', 'nvd_published_at': None}
1.4.0
GHSA-8hxh-r6f7-jf45
2021-10-04T21:26:20Z
2020-10-16T17:03:43Z
null
[]
Memory exhaustion in http4s-async-http-client with large or malicious compressed responses
### Impact A server we connect to with http4s-async-http-client could theoretically respond with a large or malicious compressed stream and exhaust memory in the client JVM. It does not affect http4s servers, other client backends, or clients that speak only to trusted servers. This is related to a transitive dependency on netty-codec-4.1.45.Final, which is affected by [CVE-2020-11612](https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897). ### Patches Upgrade to http4s-async-http-client >= 0.21.8. All 1.0 milestones are also safe. ### Workarounds Add an explicit runtime dependency on async-http-client's netty dependencies that evicts them to an unaffected version: ```scala libraryDependencies ++= Seq( "io.netty" % "netty-codec" % "4.1.53.Final" % Runtime, "io.netty" % "netty-codec-socks" % "4.1.53.Final" % Runtime, "io.netty" % "netty-handler-proxy" % "4.1.53.Final" % Runtime, "io.netty" % "netty-common" % "4.1.53.Final" % Runtime, "io.netty" % "netty-transport" % "4.1.53.Final" % Runtime, "io.netty" % "netty-handler" % "4.1.53.Final" % Runtime, "io.netty" % "netty-resolver-dns" % "4.1.53.Final" % Runtime ) ``` ### References * https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897 * https://github.com/http4s/http4s/issues/3681 ### For more information If you have any questions or comments about this advisory: * Open an issue in [http4s](https://github.com/http4s/http4s/issues/new) * Contact a maintainer privately per [http4s' security policy](https://github.com/http4s/http4s/blob/master/SECURITY.md#reporting-a-vulnerability)
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-async-http-client_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.7'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-async-http-client_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.21.7'}}]
[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-8hxh-r6f7-jf45'}, {'type': 'PACKAGE', 'url': 'https://github.com/http4s/http4s'}]
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T17:03:18Z', 'nvd_published_at': None}
1.4.0
GHSA-fw5q-j9p4-3vxg
2021-01-07T22:49:33Z
2020-10-30T19:10:20Z
null
['CVE-2020-15276']
Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Components are: Blog comment posting Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by yama
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15276'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20201029'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-30T18:54:55Z', 'nvd_published_at': None}
1.4.0
GHSA-2xwp-m7mq-7q3r
2020-10-28T17:04:54Z
2020-10-28T17:05:38Z
null
[]
CLI does not correctly implement strict mode
In the affected versions, the AWS Encryption CLI operated in "discovery mode" even when "strict mode" was specified. Although decryption only succeeded if the user had permission to decrypt with at least one of the CMKs, decryption could be successful using a CMK that was not included in the user-defined set when the CLI was operating in "strict mode." Affected users should upgrade to Encryption CLI v1.8.x or v2.1.x as soon as possible.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-cli/security/advisories/GHSA-2xwp-m7mq-7q3r'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-encryption-sdk-cli/commit/7d21b8051cab9e52e056fe427d2bff19cf146460'}]
{'cwe_ids': ['CWE-326'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-28T17:04:54Z', 'nvd_published_at': None}
1.4.0
GHSA-55w9-c3g2-4rrh
2020-10-07T17:50:33Z
2020-10-07T17:51:02Z
null
['CVE-2012-5784']
Man-in-the-middle attack in Apache Axis
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5784'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79829'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0269.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0683.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0037.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/51219'}, {'type': 'WEB', 'url': 'http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/56408'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-07T17:50:33Z', 'nvd_published_at': None}
1.4.0
GHSA-x56p-c8cg-q435
2021-10-06T21:27:19Z
2020-10-08T19:28:07Z
null
['CVE-2020-15242']
Open Redirect in Next.js versions
### Impact - **Affected**: Users of Next.js between 9.5.0 and 9.5.3 - **Not affected**: Deployments on Vercel ([https://vercel.com](https://vercel.com)) are not affected - **Not affected**: Deployments using `next export` We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. ### Patches https://github.com/vercel/next.js/releases/tag/v9.5.4 ### References https://github.com/vercel/next.js/releases/tag/v9.5.4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15242'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/v9.5.4'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T19:27:38Z', 'nvd_published_at': None}
1.4.0
GHSA-jrgf-vfw2-hj26
2021-11-19T13:46:38Z
2020-10-30T17:06:06Z
null
['CVE-2020-15244']
RCE via PHP Object injection via SOAP Requests
### Impact This vulnerability allows an admin user to generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. ### Patches The latest OpenMage Versions up from 19.4.7 and 20.0.3 have this Issue solved ### Credits Credit to Luke Rodgers for reporting
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15244'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}]
{'cwe_ids': ['CWE-502', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-30T16:25:06Z', 'nvd_published_at': '2020-10-21T20:15:00Z'}
1.4.0
GHSA-c27r-x354-4m68
2022-08-02T20:03:05Z
2020-10-27T20:39:46Z
null
[]
xml-crypto's HMAC-SHA1 signatures can bypass validation via key confusion
### Impact An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation. ### Patches Version 2.0.0 has the fix. ### Workarounds The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xmldsig#hmac-sha1' entry from SignedXml.SignatureAlgorithms.
[]
[{'package': {'ecosystem': 'npm', 'name': 'xml-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68'}, {'type': 'WEB', 'url': 'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaronn/xml-crypto'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xml-crypto'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:35:52Z', 'nvd_published_at': None}
1.4.0
GHSA-f366-4rvv-95x2
2021-10-04T21:23:53Z
2020-10-02T16:33:19Z
null
[]
Buffer overflow in deprecated USB HALs and stack overflow in USB enumeration
### Impact 1) If an application is making use of the deprecated kit protocol HALs as the communication channel to the target device an attacker can masquerade as a device and return malformed packets of arbitrary length which the protocol stack will write to the stack. HALs intended for production use are unaffected (I2C, SWI, & SPI) as well as the hidapi HAL (hal_all_platforms_kit_hidapi.c). 2) The hidapi HAL can be made to overrun the application stack by attaching more than 10 (real or virtual) devices likely resulting in an application crash as this does not allow arbitrary data to be written to the stack. ### Patches USB kit enumeration has been patched in v3.2.3 for the hidapi HAL (hal_all_platforms_kit_hidapi.c). ### Removal of deprecated HALs Deprecated usb kit HALs have been removed in v3.2.3. ### Workarounds This vulnerability is limited to users of the kit protocol which is used with Microchip kits and kit firmware to bridge communication from USB-HID to I2C or SWI. It is not expected that kits would be used in an production environment. This is an optional component for users as well so they can always compile the library without the usb support option. ### Special python packaging notes The python package for cryptoauthlib uses date codes for identifying versions. The patched version for python packages is 20200912 ### References Please see [Microchip PSIRT](https://www.microchip.com/design-centers/embedded-security/how-to-report-potential-product-security-vulnerabilities) for Microchip's security policy and reporting procedures ### Credits Special thanks to Ruben Santamarta of [IOActive](https://blogs.ioactive.com/) for reporting
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptoauthlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20200912'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MicrochipTech/cryptoauthlib/security/advisories/GHSA-f366-4rvv-95x2'}, {'type': 'PACKAGE', 'url': 'https://github.com/MicrochipTech/cryptoauthlib'}]
{'cwe_ids': ['CWE-120'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:27:28Z', 'nvd_published_at': None}
1.4.0
GHSA-2q4g-w47c-4674
2021-11-19T14:44:04Z
2020-10-06T14:24:04Z
null
['CVE-2020-15174']
Unpreventable top-level navigation
### Impact The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites. ### Patches * `11.0.0-beta.1` * `10.0.1` * `9.3.0` * `8.5.1` ### Workarounds Sandbox all your iframes using the [`sandbox` attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-sandbox). This will prevent them creating top-frame navigations and is good practice anyway. ### For more information If you have any questions or comments about this advisory: * Email us at security@electronjs.org
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-beta.0'}, {'fixed': '8.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-beta.0'}, {'fixed': '9.3.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-beta.0'}, {'fixed': '10.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15174'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]
{'cwe_ids': ['CWE-20', 'CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-06T14:12:16Z', 'nvd_published_at': '2020-10-06T18:15:00Z'}
1.4.0
GHSA-269g-pwp5-87pp
2021-10-05T16:04:16Z
2020-10-12T17:33:00Z
null
['CVE-2020-15250']
TemporaryFolder on unix-like systems does not limit access to created files
### Vulnerability The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability. Example of vulnerable code: ```java public static class HasTempFolder { @Rule public TemporaryFolder folder = new TemporaryFolder(); @Test public void testUsingTempFolder() throws IOException { folder.getRoot(); // Previous file permissions: `drwxr-xr-x`; After fix:`drwx------` File createdFile= folder.newFile("myfile.txt"); // unchanged/irrelevant file permissions File createdFolder= folder.newFolder("subfolder"); // unchanged/irrelevant file permissions // ... } } ``` ### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability **does not** allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. When analyzing the impact of this vulnerability, here are the important questions to ask: 1. Do the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder? - If yes, this vulnerability impacts you, but only if you also answer 'yes' to question 2. - If no, this vulnerability does not impact you. 2. Do the JUnit tests ever execute in an environment where the OS has other untrusted users. _This may apply in CI/CD environments but normally won't be 'yes' for personal developer machines._ - If yes, and you answered 'yes' to question 1, this vulnerability impacts you. - If no, this vulnerability does not impact you. ### Patches Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. - Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. - Java 1.6 and lower users: **no patch is available, you must use the workaround below.** ### Workarounds If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. ### References - [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html) - Fix commit https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae #### Similar Vulnerabilities - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 ### For more information If you have any questions or comments about this advisory, please pen an issue in [junit-team/junit4](https://github.com/junit-team/junit4/issues).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'junit:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7'}, {'fixed': '4.13.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15250'}, {'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/issues/1676'}, {'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/junit-team/junit4'}, {'type': 'WEB', 'url': 'https://github.com/junit-team/junit4/blob/7852b90cfe1cea1e0cdaa19d490c83f0d8684b50/doc/ReleaseNotes4.13.1.md'}, {'type': 'WEB', 'url': 'https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01110833b63616ddbef59ae4e10c0fbd0060f0a51206defd4cb4d917@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r09cfbb5aedd76023691bbce9ca4ce2e16bb07dd37554a17efc19935d@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1209986f79359b518d09513ff05a88e5b3c398540e775edea76a4774@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r29d703d1986d9b871466ff24082a1828ac8ad27bb0965a93a383872e@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2b78f23bc2711a76a7fc73ad67b7fcd6817c5cfccefd6f30a4f54943@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30f502d2f79e8d635361adb8108dcbb73095163fcbd776ee7984a094@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500517c23200fb2fdb0b82770a62dd6c88b3521cfb01cfd0c76e3f8b@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f8841507576f595bb783ccec6a7cb285ea90d4e6f5043eae0e61a41@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r687f489b10b0d14e46f626aa88476545e1a2600b24c4ebd3c0d2a10b@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r717877028482c55acf604d7a0106af4ca05da4208c708fb157b53672@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r742b44fd75215fc75963b8ecc22b2e4372e68d67d3d859d2b5e8743f@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b02dc6f18df11ff39eedb3038f1e31e6f90a779b1959bae65107279@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r925eaae7dd8f77dd61eefc49c1fcf54bd9ecfe605486870d7b1e9390@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r934208a520b38f5cf0cae199b6b076bfe7d081809528b0eff2459e40@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95f8ef60c4b3a5284b647bb3132cda08e6fadad888a66b84f49da0b0@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9710067c7096b83cb6ae8f53a2f6f94e9c042d1bf1d6929f8f2a2b7a@%3Ccommits.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1bdb9efae84794e8ffa2f8474be8290ba57830eefe9714b95da714b@%3Cdev.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2771949c676ca984e58a5cd5ca79c2634dee1945e0406e48e0f8457@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaec90e699bc7c7bd9a053f76707a36fda48b6d558f31dc79147dbf9@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc49cf1547ef6cac1be4b3c92339b2cae0acacf5acaba13cfa429a872@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbdd30510a7c4d0908fd22075c02b75bbc2e0d977ec22249ef3133cb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde8e70b95c992378e8570e4df400c6008a9839eabdfb8f800a3e5af6@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdef7d1380c86e7c0edf8a0f89a2a8db86fce5e363457d56b722691b4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea812d8612fdc46842a2a57248cad4b01ddfdb1e9b037c49e68fdbfb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb700e60b9642eafa4b7922bfee80796394135aa09c7a239ef9f7486@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2ec93f4ca9a97d1958eb4a31b1830f723419ce9bf2018a6e5741d5b@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6e5d894d4b03bef537c9d6641272e0197c047c0d1982b4e176d0353@%3Cdev.knox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf797d119cc3f51a8d7c3c5cbe50cb4524c8487282b986edde83a9467@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-200', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-12T17:32:34Z', 'nvd_published_at': '2020-10-12T18:15:00Z'}
1.4.0
GHSA-qvp5-mm7v-4f36
2023-09-13T22:53:33Z
2020-10-29T19:40:08Z
null
['CVE-2020-27666']
Cross-site Scripting in Strapi
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi-plugin-content-manager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27666'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/8440'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-29T19:38:18Z', 'nvd_published_at': None}
1.4.0
GHSA-hggm-jpg3-v476
2022-07-29T18:12:08Z
2020-10-27T20:33:13Z
null
['CVE-2020-25659']
RSA decryption vulnerable to Bleichenbacher timing vulnerability
RSA decryption was vulnerable to Bleichenbacher timing vulnerabilities, which would impact people using RSA decryption in online scenarios. This is fixed in cryptography 3.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-hggm-jpg3-v476'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25659'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyca/cryptography'}, {'type': 'WEB', 'url': 'https://pypi.org/project/cryptography/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-385'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:32:44Z', 'nvd_published_at': '2021-01-11T16:15:00Z'}
1.4.0
GHSA-mp9m-g7qj-6vqr
2021-10-08T21:26:59Z
2020-10-27T20:30:48Z
null
[]
Unauthorized privilege escalation in Mod module
### Impact An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in. ### Patches This exploit has been fixed on version & ``3.4.1``. ### Workarounds Unloading the Mod module with ``unload mod`` __or__, disabling the ``massban`` command with ``command disable global massban`` can render this exploit not accessible. We still highly recommend updating to ``3.4.1`` to completely patch this issue. ### References * https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'red-discordbot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Red-DiscordBot/'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:26:42Z', 'nvd_published_at': None}
1.4.0
GHSA-6gw4-x63h-5499
2021-11-19T13:51:50Z
2020-10-19T20:40:59Z
null
['CVE-2020-15245']
Ability to switch customer email address on account detail page and stay verified
### Impact The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one). ### Patches Patch has been provided for Sylius 1.6.x and newer - 1.6.9, 1.7.9, 1.8.3. Versions older than 1.6 are not covered by our security support anymore. ### Workarounds If for whatever reason you are not able to upgrade your application version, you may resolve this issue on your own by creating a custom event listener, which will listen to the `sylius.customer.pre_update` event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain `/admin` prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here. ### Acknowledgements This security issue has been reported by Mircea Silviu (@decemvre), thanks a lot! ### For more information If you have any questions or comments about this advisory: * Email us at [security@sylius.com](mailto:security@sylius.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15245'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}]
{'cwe_ids': ['CWE-79', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:40:50Z', 'nvd_published_at': '2020-10-19T21:15:00Z'}
1.4.0
GHSA-36j3-xxf7-4pqg
2022-08-03T23:40:07Z
2020-10-02T16:22:41Z
null
['CVE-2020-6506']
Android WebView Universal Cross-site Scripting
A universal cross-site scripting (UXSS) vulnerability, CVE-2020-6506 (https://crbug.com/1083819), has been identified in the Android WebView system component, which allows cross-origin iframes to execute arbitrary JavaScript in the top-level document. This vulnerability affects React Native apps which use a `react-native-webview` that allows navigation to arbitrary URLs, and when that app runs on systems with an Android WebView version prior to 83.0.4103.106. ## Pending mitigation Ensure users update their Android WebView system component via the Google Play Store to 83.0.4103.106 or higher to avoid this UXSS. 'react-native-webview' is working on a mitigation but it could take some time. ### References https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-native-webview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.10.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/react-native-community/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg'}, {'type': 'WEB', 'url': 'https://github.com/react-native-webview/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6506'}, {'type': 'WEB', 'url': 'https://github.com/react-native-webview/react-native-webview/pull/1747'}, {'type': 'WEB', 'url': 'https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html'}, {'type': 'WEB', 'url': 'https://crbug.com/1083819'}, {'type': 'PACKAGE', 'url': 'https://github.com/react-native-community/react-native-webview'}, {'type': 'WEB', 'url': 'https://github.com/react-native-webview/react-native-webview/releases/tag/v11.0.0'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1ab80f8591d5c2147898076e3945dad1c897513630aabec556883275@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1eadf38b38ee20405811958c8a01f78d6b28e058c84c9fa6c1a8663d@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2769c33da7f7ece7e4e31837c1e1839d6657c7c13bb8d228670b8da0@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra58733fbb88d5c513b3f14a14850083d506b9129103e0ab433c3f680@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0ebe639927fa09e222aa56bf5ad6e700218f334ecc6ba9da4397728@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc81e12fc9287f8743d59099b1af40f968f1cfec9eac98a63c2c62c69@%3Cissues.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf082834ad237f78a63671aec0cef8874f9232b7614529cc3d3e304c5@%3Ccommits.cordova.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-08'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-30'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1560'}]
{'cwe_ids': ['CWE-79', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:22:01Z', 'nvd_published_at': '2020-07-22T17:15:00Z'}
1.4.0
GHSA-56pc-6jqp-xqj8
2021-01-07T22:51:36Z
2020-10-06T17:46:40Z
null
['CVE-2020-15215']
Context isolation bypass in Electron
### Impact Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nativeWindowOpen: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `11.0.0-beta.6` * `10.1.2` * `9.3.1` * `8.5.2` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-beta.0'}, {'fixed': '8.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-beta.0'}, {'fixed': '9.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-beta.0'}, {'fixed': '10.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-beta.0'}, {'fixed': '11.0.0-beta.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.0-beta.5'}}]
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-56pc-6jqp-xqj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15215'}]
{'cwe_ids': ['CWE-668', 'CWE-693'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-06T17:46:06Z', 'nvd_published_at': None}
1.4.0
GHSA-4fc4-chg7-h8gh
2021-11-19T14:40:52Z
2020-10-19T20:02:44Z
null
['CVE-2020-15262']
Unprotected dynamically loaded chunks
### Impact All dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected. ### Patches This issue is patched in version 1.5.1. ### Workarounds N/A ### References https://github.com/waysact/webpack-subresource-integrity/issues/131 ### For more information If you have any questions or comments about this advisory: * Comment on [webpack-subresource-integrity issue #131](https://github.com/waysact/webpack-subresource-integrity/issues/131) * Or email us at [security@waysact.com](mailto:security@waysact.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'webpack-subresource-integrity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/waysact/webpack-subresource-integrity/security/advisories/GHSA-4fc4-chg7-h8gh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15262'}, {'type': 'WEB', 'url': 'https://github.com/waysact/webpack-subresource-integrity/issues/131'}, {'type': 'WEB', 'url': 'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f'}, {'type': 'PACKAGE', 'url': 'https://github.com/waysact/webpack-subresource-integrity/'}]
{'cwe_ids': ['CWE-345'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:02:31Z', 'nvd_published_at': '2020-10-19T20:15:00Z'}
1.4.0
GHSA-j257-jfvv-h3x5
2021-11-19T14:42:15Z
2020-10-13T17:30:30Z
null
['CVE-2020-15251']
Privilege Escalation in Channelmgnt plug-in for Sopel
### Impact Malicious users are able to op/voice and take over a channel ### Patches On version 1.0.3 ### Workarounds Disable channelmgnt ### References https://phab.bots.miraheze.wiki/T117 ### For more information If you have any questions or comments about this advisory: * Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sopel_plugins.channelmgnt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15251'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/pull/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/MirahezeBots/MirahezeBots'}, {'type': 'WEB', 'url': 'https://phab.bots.miraheze.wiki/T117'}, {'type': 'WEB', 'url': 'https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/sopel-plugins.channelmgnt/'}]
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-13T17:08:31Z', 'nvd_published_at': '2020-10-13T18:15:00Z'}
1.4.0
GHSA-38hx-3542-8fh3
2020-10-01T17:09:44Z
2020-10-01T17:09:56Z
null
[]
Malicious code in `electorn`
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information: - IP and IP-based geolocation - home directory name - local username The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
[]
[{'package': {'ecosystem': 'npm', 'name': 'electorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1562'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T17:09:44Z', 'nvd_published_at': None}
1.4.0
GHSA-fj59-f6c3-3vw4
2021-09-10T14:54:48Z
2020-10-27T20:40:00Z
null
['CVE-2020-26300']
Command Injection in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()` ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.26.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4'}, {'type': 'PACKAGE', 'url': 'https://github.com/sebhildebrandt/systeminformation'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:39:22Z', 'nvd_published_at': '2021-09-09T01:15:00Z'}
1.4.0
GHSA-2xm2-xj2q-qgpj
2021-10-06T22:02:05Z
2020-10-27T19:15:19Z
null
['CVE-2020-15270']
receiving subscription objects with deleted session
Original Message: Hi, I create objects with one client with an ACL of all users with a specific column value. Thats working so far. Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them. The client with the deleted session cant create new objects, which Parse restricts right. The LiveQueryServer doesnt detect deleted sessions after the websocket connection was established. There should be a mechanism that checks in an specific interval if the session exists. I dont know if its true with expired sessions. Any solutions? Parse version: 4.3.0 Parse js SDK version: 2.17 Solution: Hi guys. I've found and fixed the problem. It happens because there are two caches in place for the session token: - at Parse Server level, which, according with the docs, should be changed via cacheTTL option and defaults to 5 seconds; - at Parse Live Query level, which, according with the docs, should be changed via liveQueryServerOptions.cacheTimeout and defaults to 30 days. But there are three problems: - cacheTTL has currently no effect over Live Query Server; - cacheTimeout also has currently no effect over Live Query Server; - cacheTimeout actually defaults to 1h. So, currently, if you wait 1 hour after the session token was invalidated, the clients using the old session token are not able to receive the events. What I did: - Added a test case for the problem; - Fixed cacheTTL for Live Query Server; - Fixed cacheTimeout for Live Query Server; - Changed the cacheTimeout to default 5s; - Changed the docs to reflect the actual 5s default for cacheTimeout.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15270'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}]
{'cwe_ids': ['CWE-672'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-22T21:12:08Z', 'nvd_published_at': '2020-10-22T22:15:00Z'}
1.4.0
GHSA-7733-hjv6-4h47
2021-11-19T15:11:11Z
2020-10-08T19:55:53Z
null
['CVE-2020-15241']
Cross-Site Scripting in ternary conditional operator
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source: &nbsp;This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following. ``` {showFullName ? fullName : defaultValue} ``` ### Solution Update to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases: * TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5) * TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1) ### Credits Thanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue. ### References * [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3fluid/fluid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/Fluid'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2019-013'}]
{'cwe_ids': ['CWE-601', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T19:55:04Z', 'nvd_published_at': '2020-10-08T21:15:00Z'}
1.4.0
GHSA-5822-pw57-vv37
2021-10-04T21:25:08Z
2020-10-08T20:13:19Z
null
[]
XSS vulnerability when listing users on add & modify server pages.
### Impact An XSS vulnerability exists in versions of Pterodactyl Panel before 0.7.19. Affected versions do not properly sanitize account names before rendering them to the dropdown selector in the admin area when creating or modifying a server. ### Patches This XSS has been addressed in 0.7.19 and will be rolled forwards into the 1.0-rc.7 release. ### Workarounds No workaround exists without manual patching. See https://github.com/pterodactyl/panel/pull/2441/files for the files changed. ### For more information If you have any questions or comments about this advisory please reach out on Discord, or by emailing `dane` at `pterodactyl` dot `io`. _Thank you to Sergej for the responsible disclosure of this issue._
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc.0'}, {'fixed': '1.0.0-rc.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc.6'}}]
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5822-pw57-vv37'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T20:12:58Z', 'nvd_published_at': None}
1.4.0
GHSA-94xh-2fmc-xf5j
2023-09-06T23:53:46Z
2020-10-27T20:30:20Z
null
['CVE-2020-7752']
systeminformation command injection vulnerability
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite() ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.27.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'}, {'type': 'PACKAGE', 'url': 'https://github.com/sebhildebrandt/systeminformation'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T20:30:03Z', 'nvd_published_at': '2020-10-26T17:15:00Z'}
1.4.0
GHSA-r82c-j4mq-5xfw
2020-10-27T19:19:44Z
2020-10-27T19:19:56Z
null
[]
Update bitlyshortener to >=0.5.0 to prevent generating some invalid short URLs
### Impact Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.5.0 can generate an invalid short URL when a vanity domain exists. ### Patches Upgrading `bitlyshortener` to 0.5.0 or newer will prevent the generation of any such invalid short URLs. ### References * [Release notes](https://github.com/impredicative/bitlyshortener/releases)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'bitlyshortener'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-r82c-j4mq-5xfw'}, {'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d'}, {'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/releases/tag/0.5.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/bitlyshortener/'}]
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T19:19:44Z', 'nvd_published_at': None}
1.4.0
GHSA-g5vf-v6wf-7w2r
2021-01-07T22:50:52Z
2020-10-16T00:51:24Z
null
['CVE-2020-8929']
Ciphertext Malleability Issue in Tink Java
### Impact Tink's Java version before 1.5 under some circumstances allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a single key, and relying on the fact that there is only a single valid ciphertext per plaintext. No loss of confidentiality or loss of plaintext integrity occurs due to this problem, only ciphertext integrity is compromised. ### Patches The issue was fixed in this [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899). ### Workarounds The only workaround is to backport the fixing [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899). ### Details Tink uses the first five bytes of a ciphertext for a version byte and a four byte key ID. Since each key has a well defined prefix, this extends non-malleability properties (but technically not indistinguishability). However, in the Java version this prefix lookup used a hash map indexed by unicode strings instead of the byte array, which means that invalid Unicode characters would be [replaced by U+FFFD](https://en.wikipedia.org/wiki/UTF-8#Invalid_sequences_and_error_handling) by the [Java API's default behavior](https://docs.oracle.com/javase/7/docs/api/java/lang/String.html#String(byte[],%20java.nio.charset.Charset)). This means several different values for the five bytes would result in the same hash table key, which allows an attacker to exchange one invalid byte sequence for another, creating a mutated ciphertext that still decrypts (to the same plaintext). ### Acknowledgements We'd like to thank Peter Esbensen for finding this issue and raising it internally. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Tink](https://github.com/google/tink/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.crypto.tink:tink'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/tink/security/advisories/GHSA-g5vf-v6wf-7w2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8929'}, {'type': 'WEB', 'url': 'https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899'}]
{'cwe_ids': ['CWE-176', 'CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T00:49:43Z', 'nvd_published_at': None}
1.4.0
GHSA-cwx2-736x-mf6w
2021-11-19T14:05:56Z
2020-10-19T20:55:55Z
null
['CVE-2020-15256']
Prototype pollution in object-path
### Impact A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. ### Patches Upgrade to version >= 0.11.5 ### Workarounds Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0. ### References [Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638) ### For more information If you have any questions or comments about this advisory: * Open an issue in [object-path](https://github.com/mariocasciaro/object-path)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'object-path'}, 'ecosystem_specific': {'affected_functions': ['object-path.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256'}, {'type': 'WEB', 'url': 'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'}, {'type': 'PACKAGE', 'url': 'https://github.com/mariocasciaro/object-path'}]
{'cwe_ids': ['CWE-20', 'CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:52:39Z', 'nvd_published_at': '2020-10-19T22:15:00Z'}
1.4.0
GHSA-mfwh-5m23-j46w
2021-11-19T15:11:59Z
2020-10-01T17:16:20Z
null
['CVE-2020-15228']
Environment Variable Injection in GitHub Actions
### Impact The `@actions/core` npm module `addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. ### Patches The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new [Environment File Syntax](https://github.com/actions/toolkit/blob/main/docs/commands.md#environment-files). Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution. ### Workarounds None, it is strongly suggested that you upgrade as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Actions Toolkit](https://github.com/actions/toolkit/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@actions/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/actions/toolkit/security/advisories/GHSA-mfwh-5m23-j46w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15228'}, {'type': 'PACKAGE', 'url': 'https://github.com/actions/toolkit/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159794/GitHub-Widespread-Injection.html'}]
{'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T17:16:10Z', 'nvd_published_at': '2020-10-01T18:15:00Z'}
1.4.0
GHSA-pv36-h7jh-qm62
2022-01-31T22:01:40Z
2020-10-27T19:47:38Z
null
['CVE-2020-15999']
Heap buffer overflow in CefSharp
### Impact A memory corruption bug(Heap overflow) in the FreeType font rendering library. > This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images . As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild. ### Patches Upgrade to 85.3.130 or higher ### References - https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ - https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999 - https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942 To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.WinForms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Wpf.HwndHost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '85.3.130'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15999'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html'}, {'type': 'WEB', 'url': 'https://crbug.com/1139963'}, {'type': 'PACKAGE', 'url': 'https://github.com/cefsharp/CefSharp'}, {'type': 'WEB', 'url': 'https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202011-12'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202012-04'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4824'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.Common/'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.WinForms'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.Wpf'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/CefSharp.Wpf.HwndHost'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Nov/33'}]
{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-27T19:47:22Z', 'nvd_published_at': '2020-11-03T03:15:00Z'}
1.4.0
GHSA-4p55-xj37-fx7g
2023-09-13T19:30:47Z
2020-10-29T18:29:31Z
null
['CVE-2020-27665']
Improper Authorization in Strapi
In Strapi before 3.2.5, there is no `admin::hasPermissions` restriction for CTB (aka content-type-builder) routes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi-plugin-content-type-builder'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27665'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/8439'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616'}]
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-29T16:25:47Z', 'nvd_published_at': None}
1.4.0
GHSA-xpmx-h7xq-xffh
2021-11-19T15:30:46Z
2020-10-02T16:33:41Z
null
['CVE-2020-15170']
Potential access control security issue in apollo-adminservice
### Impact If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations. ### Patches Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1). ### Workarounds To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet. ### Credits [Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it. ### References [Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3) ### For more information If you have any questions or comments about this advisory: * Open an [issue](https://github.com/ctripcorp/apollo/issues) * Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ctrip.framework.apollo:apollo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15170'}, {'type': 'WEB', 'url': 'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'}, {'type': 'PACKAGE', 'url': 'https://github.com/ctripcorp/apollo'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:32:24Z', 'nvd_published_at': '2020-09-10T19:15:00Z'}
1.4.0
GHSA-6r7x-hc8m-985r
2022-01-04T19:44:56Z
2020-10-13T17:29:25Z
null
['CVE-2020-9038']
Cross-site Scripting in Joplin
Joplin through 1.0.184 allows Arbitrary File Read via Cross-site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9038'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-02T16:40:35Z', 'nvd_published_at': '2020-02-17T16:15:00Z'}
1.4.0
GHSA-xgh6-85xh-479p
2020-10-16T18:56:02Z
2020-10-16T18:56:26Z
null
[]
Regular Expression Denial of Service in npm-user-validate
`npm-user-validate` before version `1.0.1` is vulnerable to a Regular Expression Denial of Service (REDos). The regex that validates user emails took exponentially longer to process long input strings beginning with `@` characters. ### Impact The issue affects the `email` function. If you use this function to process arbitrary user input with no character limit the application may be susceptible to Denial of Service. ### Patches The issue is patched in version 1.0.1 by improving the regular expression used and also enforcing a 254 character limit. ### Workarounds Restrict the character length to a reasonable degree before passing a value to `.emal()`; Also, consider doing a more rigorous sanitizing/validation beforehand.
[]
[{'package': {'ecosystem': 'npm', 'name': 'npm-user-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T18:56:02Z', 'nvd_published_at': None}
1.4.0
GHSA-h385-52j6-9984
2021-01-13T19:25:43Z
2020-10-20T19:15:38Z
2021-01-13T19:25:43Z
['CVE-2020-7670']
Withdrawn: HTTP Request Smuggling in Agoo
# Withdrawn reason Withdrawn on 1/13/2021 due to [this comment from the maintainer](https://github.com/ohler55/agoo/issues/88#issuecomment-723580783). This is no longer considered a vulnerability. # Original description agoo through 2.12.3 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'agoo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7670'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/agoo/issues/88'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-AGOO-569137'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-20T19:04:34Z', 'nvd_published_at': None}
1.4.0
GHSA-939m-4xpw-v34v
2020-10-26T20:14:25Z
2020-10-27T17:55:04Z
null
['CVE-2020-26943']
Arbitrary Code Execution in blazar-dashboard
An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'blazar-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'blazar-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'blazar-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26943'}, {'type': 'WEB', 'url': 'https://launchpad.net/bugs/1895688'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755810'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755812'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755813'}, {'type': 'WEB', 'url': 'https://review.opendev.org/755814'}, {'type': 'WEB', 'url': 'https://review.opendev.org/756064'}, {'type': 'WEB', 'url': 'https://security.openstack.org/ossa/OSSA-2020-007.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/10/16/5'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-26T20:14:25Z', 'nvd_published_at': None}
1.4.0
GHSA-vr9x-mm65-2438
2020-10-19T18:55:38Z
2020-10-08T21:38:51Z
2020-10-19T18:55:38Z
['CVE-2020-8178']
Command Injection in jison
**Withdrawn:** This vulnerability is not present in the released npm package. Rather the vulnerable code is part of the repo, but not part of the package. See linked hackerone report for more details. Insufficient input validation in npm package `jison` <= 0.4.18 may lead to OS command injection attacks.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8178'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/690010'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-08T21:36:44Z', 'nvd_published_at': None}
1.4.0
GHSA-3x8c-fmpc-5rmq
2022-11-22T17:43:33Z
2020-10-16T16:56:04Z
null
['CVE-2020-26891']
Cross-site scripting (XSS) vulnerability in the fallback authentication endpoint
### Impact The fallback authentication endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. ### Patches This is fixed by #8444, which is included in Synapse v1.21.0. ### Workarounds If the homeserver is not configured to use reCAPTCHA, consent (terms of service), or single sign-on then the affected endpoint can be blocked at a reverse proxy: * `/_matrix/client/r0/auth/.*/fallback/web` * `/_matrix/client/unstable/auth/.*/fallback/web`
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26891'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/8444'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.21.2'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2020/10/15/synapse-1-21-2-released-and-security-advisory'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-16T16:55:42Z', 'nvd_published_at': None}
1.4.0
GHSA-c84h-w6cr-5v8q
2022-03-22T20:38:43Z
2020-10-27T17:59:54Z
null
['CVE-2020-15271']
Markdown-supplied Shell Command Execution
### Impact lookatme versions prior to 2.3.0 automatically loaded the built-in "terminal" and "file_loader" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. ### Patches Users should upgrade to lookatme versions 2.3.0 or above. ### Workarounds The `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme. ### References * https://github.com/d0c-s4vage/lookatme/pull/110 * https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [d0c-s4vage/lookatme](https://github.com/d0c-s4vage/lookatme)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lookatme'}, 'ecosystem_specific': {'affected_functions': ['lookatme.contrib.load_contribs']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/security/advisories/GHSA-c84h-w6cr-5v8q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15271'}, {'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/pull/110'}, {'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/commit/72fe36b784b234548d49dae60b840c37f0eb8d84'}, {'type': 'PACKAGE', 'url': 'https://github.com/d0c-s4vage/lookatme'}, {'type': 'WEB', 'url': 'https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/lookatme/#history'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-10-26T18:07:46Z', 'nvd_published_at': None}
1.4.0
GHSA-mfc2-93pr-jf92
2020-10-01T17:09:29Z
2020-10-01T17:10:15Z
null
[]
Malicious code in `loadyaml`
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information: - IP and IP-based geolocation - home directory name - local username The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
[]
[{'package': {'ecosystem': 'npm', 'name': 'loadyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1563'}]
{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-10-01T17:09:29Z', 'nvd_published_at': None}
1.4.0
GHSA-8xv9-qcr9-ww9j
2021-10-04T21:28:06Z
2020-10-19T21:32:18Z
null
[]
Authenticated XML External Entity Processing
### Impact Authenticated XML External Entity Processing ### Patches We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-10-2020
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-8xv9-qcr9-ww9j'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SHOPWAREPLATFORM-1019470'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T21:32:05Z', 'nvd_published_at': None}
1.4.0
GHSA-f8cm-364f-q9qh
2021-11-19T13:51:14Z
2020-10-20T20:03:52Z
null
['CVE-2020-15269']
Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls
### Impact The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints. ### Patches Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. ### Workarounds In your project directory create a decorator file `app/controllers/spree/api/v2/base_controller_decotatror.rb` with contents: ```ruby module Spree module Api module V2 module BaseControllerDecorator private def spree_current_user return nil unless doorkeeper_token return @spree_current_user if @spree_current_user doorkeeper_authorize! @spree_current_user ||= ::Spree.user_class.find_by(id: doorkeeper_token.resource_owner_id) end end end end Spree::Api::V2::BaseController.prepend(Spree::Api::V2::BaseControllerDecorator) ``` ### For more information If you have any questions or comments about this advisory: * Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2020-15269.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}]
{'cwe_ids': ['CWE-287', 'CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-20T20:03:19Z', 'nvd_published_at': '2020-10-20T21:15:00Z'}
1.4.0
GHSA-589w-hccm-265x
2021-01-07T22:50:45Z
2020-10-19T20:17:47Z
null
['CVE-2020-15263']
Inline attribute values were not processed.
### Impact Inline attributes have not been processed escape. If the data that came from users was not processed, then an XSS vulnerability is possible ### Patches Fixed in 9.4.4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'orchid/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/orchidsoftware/platform/security/advisories/GHSA-589w-hccm-265x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15263'}, {'type': 'WEB', 'url': 'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-10-19T20:17:37Z', 'nvd_published_at': None}
1.4.0
GHSA-hwv5-w8gm-fq9f
2021-01-07T22:52:06Z
2020-10-06T18:21:02Z
null
['CVE-2020-15239']
Directory Traversal vulnerability in GET/PUT allows attackers to Disclose Information or Write Files via a crafted GET/PUT request
### Impact #### Information Disclosure When the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. #### File Write If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. ### Patches PR #12 fixes the issue. The PR has been merged into version 0.4.0 and 0.4.0 has been released and pushed to PyPI. Users are advised to upgrade immediately. ### Workarounds - Apache can apparently be configured to filter such malicious paths when reverse-proxying. - There are no other workarounds known. ### References - [Pull Request #12](https://github.com/horazont/xmpp-http-upload/pull/12)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'xmpp-http-upload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/horazont/xmpp-http-upload/security/advisories/GHSA-hwv5-w8gm-fq9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15239'}, {'type': 'WEB', 'url': 'https://github.com/horazont/xmpp-http-upload/pull/12'}, {'type': 'WEB', 'url': 'https://github.com/horazont/xmpp-http-upload/commit/82056540191e89f0cd697c81f57714c00962ed75'}, {'type': 'WEB', 'url': 'https://pypi.org/project/xmpp-http-upload/#history'}]
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-10-06T18:20:50Z', 'nvd_published_at': None}
1.4.0
GHSA-9vg3-cf92-h2h7
2023-02-13T20:45:22Z
2020-03-10T20:39:05Z
null
['CVE-2013-2167']
Insufficient Verification of Data Authenticity in python-keystoneclient
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['keystoneclient.middleware.auth_token.AuthProtocol._protect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._unprotect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._get_cache_key', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_get', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_store', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_put', 'keystoneclient.middleware.memcache_crypt.generate_aes_key', 'keystoneclient.middleware.memcache_crypt.compute_mac', 'keystoneclient.middleware.memcache_crypt.hash_data', 'keystoneclient.middleware.memcache_crypt.sign_data', 'keystoneclient.middleware.memcache_crypt.verify_signed_data', 'keystoneclient.middleware.memcache_crypt.encrypt_data', 'keystoneclient.middleware.memcache_crypt.decrypt_data']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.3'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2167'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-2167'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/85492'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commits/0.3.0'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-2167'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0992.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/06/19/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/60680'}]
{'cwe_ids': ['CWE-345'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T20:35:54Z', 'nvd_published_at': '2019-12-10T15:15:00Z'}
1.4.0
GHSA-6v7p-v754-j89v
2021-08-19T19:37:59Z
2020-03-03T15:32:03Z
null
['CVE-2020-6858']
HTTP Response Splitting in Styx
# Vulnerability Styx is vulnerable to CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers (&#39;HTTP Response Splitting&#39;). # Vulnerable Component The vulnerable component is the `com.hotels.styx.api.HttpHeaders.Builder` due to disabling the HTTP Header validation built into Netty in these locations: https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145 https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145 `new DefaultHttpHeaders(false)` disables the built-in validation in Netty. Either use the default constructor or `new DefaultHttpHeaders(true` instead. Additionally, another vulnerable component is the StyxToNettyResponseTranslator due to also disabling the HTTP Header validation built into netty in this location. https://github.com/HotelsDotCom/styx/blob/8d60e5493e65d0d536afc0b350dcb02d24e0f7a7/components/server/src/main/java/com/hotels/styx/server/netty/connectors/StyxToNettyResponseTranslator.java#L30 `DefaultHttpResponse nettyResponse = new DefaultHttpResponse(version, httpResponseStatus, false); ` `new DefaultHttpResponse(version, httpResponseStatus, false);` disables the built-in validation in Netty. Please use the constructor `new DefaultHttpResponse(version, httpResponseStatus, true);` # Proof of Concept The following test plugin proves that there is no header validation occurring. ```java static class VulnerablePlugin implements Plugin { @Override public Eventual&lt;LiveHttpResponse&gt; intercept(LiveHttpRequest request, Chain chain) { String header = request.queryParam(&quot;header-value&quot;).get(); LiveHttpRequest newRequest = request.newBuilder() .header(&quot;myRequestHeader&quot;, header) .build(); return chain.proceed(newRequest).map(response -&gt; response.newBuilder().header(&quot;myResponseHeader&quot;, header).build() ) ; } } @Test public void simpleHeaderInjectionVulnerabilityPOC() { Plugin vulnerablePlugin = new VulnerablePlugin(); // a simple way to mock the downstream system HttpInterceptor.Chain chain = request -&gt; { assertThat(request.header(&quot;myRequestHeader&quot;).orElse(null), is(&quot;test\r\nAnother: CRLF_Injection&quot;)); return Eventual.of(response(OK).build()); }; // an example request you expect your plugin to receive String encodedGet = URLEncoder.encode(&quot;test\r\nAnother: CRLF_Injection&quot;); LiveHttpRequest request = get(&quot;/foo?header-value=&quot; + encodedGet) .build(); // since this is a test, we want to wait for the response LiveHttpResponse response = Mono.from(vulnerablePlugin.intercept(request, chain)).block(); assertThat(response.header(&quot;myResponseHeader&quot;).orElse(null), is(&quot;test\r\nAnother: CRLF_Injection&quot;)); } ``` Additionally, if you run this LiveHttpResponse from this test through the `StyxToNettyResponseTranslator::toNettyResponse`, ideally, it would have caused an exception to be thrown. In its current state, it does not. # Similar Vulnerabilities There have been reports of similar vulnerabilities in other popular libraries. GHSA-35fr-h7jr-hh86 -&gt; CVE-2019-16771 GHSA-mvqp-q37c-wf9j -&gt; CVE-2019-17513 # Finding This vulnerability was found due to this query that [Jonathan Leitschuh](https://twitter.com/jlleitschuh) contributed to the Semmle QL project. https://lgtm.com/rules/1510696449842/alerts/
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.hotels.styx:styx-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0.beta8'}}]
[{'type': 'WEB', 'url': 'https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6858'}, {'type': 'WEB', 'url': 'https://twitter.com/JLLeitschuh'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-03T15:31:22Z', 'nvd_published_at': None}
1.4.0
GHSA-h96w-mmrf-2h6v
2023-09-01T10:17:08Z
2020-03-31T15:42:42Z
null
['CVE-2020-10108']
Improper Input Validation in Twisted
In Twisted Web before 20.3.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10108'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13'}, {'type': 'WEB', 'url': 'https://know.bishopfox.com/advisories/twisted-version-19.10.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-24'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': ['CWE-20', 'CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:28:25Z', 'nvd_published_at': '2020-03-12T13:15:00Z'}
1.4.0
GHSA-cg75-6938-wx58
2021-08-23T14:31:39Z
2020-03-13T20:04:51Z
null
['CVE-2009-5042']
python-docutils allows insecure usage of temporary files
python-docutils allows insecure usage of temporary files
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'docutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5'}, {'fixed': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5042'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560755'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2009-5042'}]
{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:03:40Z', 'nvd_published_at': None}
1.4.0
GHSA-fq77-7p7r-83rj
2021-01-08T20:24:23Z
2020-03-30T20:40:50Z
null
['CVE-2020-5284']
Directory Traversal in Next.js
### Impact - **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected - **Not affected**: Deployments using the `serverless` target - **Not affected**: Deployments using `next export` - **Affected**: Users of Next.js below 9.3.2 We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. ### Patches https://github.com/zeit/next.js/releases/tag/v9.3.2 ### References https://github.com/zeit/next.js/releases/tag/v9.3.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5284'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/v9.3.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1503'}]
{'cwe_ids': ['CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T20:40:39Z', 'nvd_published_at': None}
1.4.0
GHSA-ff5x-w9wg-h275
2020-02-28T16:38:18Z
2020-03-06T01:15:46Z
null
[]
Holder can generate proof of ownership for credentials it does not control in vp-toolkit
### Impact The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L150) DID matches the signer of the VP proof. The **verifier** is impacted by this vulnerability. ### Patches Patch will be available in version 0.2.2. ### Workarounds - Compute the address out of the `verifiablePresentation.proof.n.verificationMethod` using `getAddressFromPubKey()` from `crypt-util@0.1.5` and match it with the `credentialSubject.id` address from the credential. ### References [Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14) ### For more information If you have any questions or comments about this advisory: * Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/14) * [Contact me](https://github.com/rabomarnix)
[]
[{'package': {'ecosystem': 'npm', 'name': 'vp-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-28T16:38:18Z', 'nvd_published_at': None}
1.4.0
GHSA-5f37-gxvh-23v6
2023-09-06T13:51:03Z
2020-03-05T22:09:17Z
null
['CVE-2016-10033']
Remote code execution in PHPMailer
### Impact The `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \&quot; (backslash double quote) in a crafted `Sender` property. ### Patches Fixed in 5.2.18 ### Workarounds Filter and validate user input before passing it to internal functions. ### References https://nvd.nist.gov/vuln/detail/CVE-2016-10033 Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.18'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-5f37-gxvh-23v6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10033'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10033.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer/PHPMailer'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities'}, {'type': 'WEB', 'url': 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html'}, {'type': 'WEB', 'url': 'https://www.drupal.org/psa-2016-004'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40968/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40969/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40970/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40974/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40986/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41962/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/41996/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42024/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/42221/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2016/Dec/78'}, {'type': 'WEB', 'url': 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/539963/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95108'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1037533'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:05:13Z', 'nvd_published_at': '2016-12-30T19:59:00Z'}
1.4.0
GHSA-pq4w-qm9g-qx68
2021-07-28T18:54:53Z
2020-03-16T22:46:50Z
null
['CVE-2019-19135']
Insufficient Nonce Validation in Eclipse Milo Client
### Impact Credential replay affecting those connected to a server when *all 3* of the following conditions are met: - `SecurityPolicy` is `None` - using username/password or X509-based authentication - the server has a defect causing it to send null/empty or zeroed nonces ### Patches The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`. ### Workarounds Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`. ### References https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues) * Email [the mailing list](mailto:milo-dev@eclipse.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.milo:sdk-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19135'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/security-bulletins/'}]
{'cwe_ids': ['CWE-330', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-16T20:59:53Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}
1.4.0
GHSA-m8qc-mf6p-pfq9
2021-08-19T21:52:46Z
2020-03-11T20:56:34Z
null
['CVE-2014-1938']
Link Following in rply
python-rply before 0.7.4 insecurely creates temporary files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1938'}, {'type': 'WEB', 'url': 'https://github.com/alex/rply/issues/42'}, {'type': 'WEB', 'url': 'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737627'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2014-1938'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/02/11/1'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-11T20:55:50Z', 'nvd_published_at': None}
1.4.0
GHSA-mr6r-mvw4-736g
2020-03-25T18:19:55Z
2020-03-25T18:20:19Z
null
[]
Vyper interfaces returning integer types less than 256 bits can be manipulated if uint256 is used
# VVE-2020-0001 Earlier today, we received a responsible disclosure of a potential issue from @montyly (security researcher at @trailofbits) for Vyper users who make assumptions about what values certain interface types can return. ### Impact We determined the issue to be mild and unlikely to be exploited, with an easy workaround while the correct resolution is in process. The issue stems from a number of things, which we will detail here. (1) The ABI Specification is under-defined such that function return type is not always reflected in how you use it This means that a function which returns `uint8` under the hood actually returns a 32 byte integer, making it identical to a function that returns `uint256`. This allows users to read an interface that returns a `uint8` value to be stored into a `uint256` variable without any explicit casting or input validation. (2) Vyper doesn&#39;t have `uint8` types When Vyper was originally created, it only had one numeric type, but we added just enough types to be able to work with the majority of ERC interfaces that exist. Unfortunately, we never added `uint8`, because it&#39;s only majority usage was for `ERC20.decimals()` as the return type, which isn&#39;t reflected in the method ID. Because of (1), it didn&#39;t matter that we didn&#39;t have these types implemented because you could capture the return value as `uint256` and use it just fine. (3) `ERC20.decimals()` returns `uint8` `ERC20.decimal()` (which is an optional function) returns a `uint8` type. While it was never intentioned to be used directly within a smart contract (hence being optional), someone could easily make the decision to rely on it to perform important functionality within their Vyper smart contract. This might lead to a scenario where an unexpectedly large value (&gt; 255) returned by calling this function (which a malicious contract writer might write) would allow an attacker to manipulate or bypass certain logic depending on this value. In summary, because of (1), it isn&#39;t necessary to have to cast the return value of a function that returns `uint8` to `uint256`, and because of (2) it isn&#39;t possible to have the type system protect against this type of error. This could lead to scenarios like (3) where this behavior can be exploited. ### Patches We are currently refactoring our typing system so we can implement all ABI-compliant integer types, but no currently patched version is available that gives users access to the `uint8` type. ### Workarounds There is an easy workaround where you should check that the value returned by an interface which specifies `uint8` should be checked to be within the bounds of a `uint8` integer. As an example: ```python ... # returns uint8, but we implicitly cast to uint256 without checking decimals: uint256 = ERC20(_token).decimal() # FIX: Insert this line assert decimals &lt; 256 ... ``` Depending on how you use this value, it may not be necessary to insert this check. ### References * [ABI Specification](https://solidity.readthedocs.io/en/latest/abi-spec.html) ### For more information If you have any questions or comments about this advisory: * Chat with us in [our gitter ](https://gitter.im/vyperlang/community) * Open an issue in [https://github.com/vyperlang/vyper](https://github.com/vyperlang/vyper) * Email us at [security@vyperlang.org](mailto:security@vyperlang.org)
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0b16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-mr6r-mvw4-736g'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-25T18:19:55Z', 'nvd_published_at': None}
1.4.0
GHSA-22jr-vc7j-g762
2023-08-30T22:57:40Z
2020-03-16T22:46:19Z
null
['CVE-2020-10571']
Potential buffer overflow in psd-tools
### Impact An issue was discovered in psd-tools before 1.9.4. The Cython implementation of RLE decoding did not check for malformed PSD input data during decoding to the PIL.Image or NumPy format, leading to a Buffer Overflow. ### Patches Users of psd-tools version v1.8.37 to v1.9.3 should upgrade to v1.9.4. ### Workarounds Without Cython present on installation, buffer overflow does not occur but IndexError will be thrown. However, already installed psd-tools with Cython extention should be upgraded. ### References https://github.com/psd-tools/psd-tools/pull/198 ### For more information If you have any questions or comments about this advisory: * Open an issue in [psd-tools](https://github.com/psd-tools/psd-tools/issues)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'psd-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.37'}, {'fixed': '1.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.9.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/security/advisories/GHSA-22jr-vc7j-g762'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10571'}, {'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/pull/198'}, {'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/commit/fd51f8b4a52bc9c1c06d1035dfdf2cd920e87074'}, {'type': 'WEB', 'url': 'https://github.com/psd-tools/psd-tools/releases/tag/v1.9.4'}]
{'cwe_ids': ['CWE-754'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-16T20:55:37Z', 'nvd_published_at': None}
1.4.0
GHSA-58mj-pw57-4vm2
2021-08-19T19:44:10Z
2020-03-05T22:09:13Z
null
['CVE-2017-11503']
Cross-site scripting in PHPMailer
PHPMailer versions prior to 5.2.24 (released July 26th 2017) have an XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a `.phps` extension, so it it not normally executable unless it is explicitly renamed, and the file is not included when PHPMailer is loaded through composer, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project. ### Impact PHPMailer 5.2.23 has XSS in the &quot;From Email Address&quot; and &quot;To Email Address&quot; fields of code_generator.php. ### Patches Fixed in 5.2.24 ### Workarounds None. ### References https://nvd.nist.gov/vuln/detail/CVE-2017-11503 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.24'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-58mj-pw57-4vm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11503'}, {'type': 'WEB', 'url': 'https://cxsecurity.com/issue/WLB-2017060181'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2017-11503.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.24'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/143138/phpmailer-xss.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99293/'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039026'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:06:39Z', 'nvd_published_at': None}
1.4.0
GHSA-6c8f-qphg-qjgp
2021-08-23T15:03:55Z
2020-03-31T15:59:54Z
null
['CVE-2019-20149']
Validation Bypass in kind-of
Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation. ## Recommendation Upgrade to versions 6.0.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'kind-of'}, 'ecosystem_specific': {'affected_functions': ['kind-of.ctorName']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/kind-of/issues/30'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/kind-of/pull/31'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1490'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:59:30Z', 'nvd_published_at': None}
1.4.0
GHSA-8867-vpm3-g98g
2021-08-19T21:46:51Z
2020-03-10T20:56:41Z
null
['CVE-2012-5578']
Incorrect Default Permissions in keyring
Python keyring has insecure permissions on new databases allowing world-readable files to be created
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5578'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-5578'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/python-keyring/+bug/1031465'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5578'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5578'}, {'type': 'WEB', 'url': 'https://github.com/jaraco/keyring/blob/master/CHANGES.rst#010'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-5578'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/27/4'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T20:56:29Z', 'nvd_published_at': None}
1.4.0
GHSA-mcx4-f5f5-4859
2021-01-08T20:25:26Z
2020-03-30T20:09:16Z
null
['CVE-2020-5255']
Prevent cache poisoning via a Response Content-Type header in Symfony
Description ----------- When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache where the cached format is not the right one. Resolution ---------- Symfony does not use the `Accept` header anymore to guess the `Content-Type`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6) for the 4.4 branch. Credits ------- I would like to thank Xavier Lacot from JoliCode for reporting & Yonel Ceruto and Tobias Schultze for fixing the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5255'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header'}]
{'cwe_ids': ['CWE-435'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T19:28:58Z', 'nvd_published_at': None}
1.4.0
GHSA-m884-279h-32v2
2021-05-12T23:54:24Z
2020-03-30T20:09:31Z
null
['CVE-2020-5274']
Exceptions displayed in non-debug configurations in Symfony
Description ----------- When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments. Resolution ---------- The `ErrorHandler` class now escapes all properties coming from the related Exception, and the stacktrace is not displayed anymore in non-`debug` environments. The patches for this issue are available [here](https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad) and [here](https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db) for branch 4.4. Credits ------- I would like to thank Luka Sikic for reporting & Yonel Ceruto and Jérémy Derussé for fixing the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5274'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad'}]
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T19:36:11Z', 'nvd_published_at': None}
1.4.0
GHSA-754x-4jwp-cqp6
2023-09-11T21:38:46Z
2020-03-31T17:02:26Z
null
['CVE-2019-15600']
Cross-Site Scripting in http_server
All versions of `http_server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'http_server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15600'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/578138'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/692262'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1170'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:39:05Z', 'nvd_published_at': None}
1.4.0
GHSA-7w4p-72j7-v7c2
2021-08-19T19:57:58Z
2020-03-05T22:08:55Z
null
['CVE-2018-19296']
Phar object injection in PHPMailer
PHPMailer versions prior to 6.0.6 and 5.2.27 are vulnerable to an object injection attack by passing phar:// paths into `addAttachment()` and other functions that may receive unfiltered local paths, possibly leading to RCE. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info on this type of vulnerability. Mitigated by blocking the use of paths containing URL-protocol style prefixes such as `phar://`. Reported by Sehun Oh of cyberone.kr. ### Impact Object injection, possible remote code execution ### Patches Fixed in 6.0.6 and 5.2.27 ### Workarounds Validate and sanitise user input before using. ### References https://nvd.nist.gov/vuln/detail/CVE-2018-19296 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.27'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7w4p-72j7-v7c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19296'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2018-19296.yaml'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27'}, {'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4351'}]
{'cwe_ids': ['CWE-502', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-05T22:08:10Z', 'nvd_published_at': '2018-11-16T09:29:00Z'}
1.4.0
GHSA-vqhp-cxgc-6wmm
2023-02-17T00:33:59Z
2020-03-30T19:45:56Z
null
['CVE-2020-6817']
regular expression denial-of-service (ReDoS) in Bleach
### Impact `bleach.clean` behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to ``bleach.clean`` with an allowed tag with an allowed ``style`` attribute are vulnerable to ReDoS. For example, ``bleach.clean(..., attributes={'a': ['style']})``. ### Patches 3.1.4 ### Workarounds * do not whitelist the style attribute in `bleach.clean` calls * limit input string length ### References * https://bugzilla.mozilla.org/show_bug.cgi?id=1623633 * https://www.regular-expressions.info/redos.html * https://blog.r2c.dev/posts/finding-python-redos-bugs-at-scale-using-dlint-and-r2c/ * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6817 ### Credits * Reported by schwag09 of r2c ### For more information If you have any questions or comments about this advisory: * Open an issue at https://github.com/mozilla/bleach/issues * Email us at security@mozilla.org
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-vqhp-cxgc-6wmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6817'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1623633'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/releases/tag/v3.1.4'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-BLEACH-561754'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-27T19:58:38Z', 'nvd_published_at': '2023-02-16T22:15:00Z'}
1.4.0
GHSA-h4mf-75hf-67w4
2021-01-08T20:27:29Z
2020-03-04T20:20:27Z
null
['CVE-2020-5251']
Information disclosure in parse-server
1. you can fetch all the users' objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken `("_SessionToken":{"$regex":"r:027f"}}` and find valid accounts this way. Using this method, it's possible to retrieve accounts without interaction from the users. GET /parse/users/me HTTP/1.1 ``` { "_ApplicationId": "appName", "_JavaScriptKey": "javascriptkey", "_ClientVersion": "js2.10.0", "_InstallationId": "ca713ee2-6e60-d023-a8fe-14e1bfb2f300", "_SessionToken": { "$regex": "r:5" } } ``` When trying it with an update query the same thing luckily doesn't seem to work: POST /parse/classes/_User/PPNk59jPPZ 2. There is another similar vulnerability in verify email and the request password reset. If you sign up with someone else's email address, you can simply use regex in the token param to verify the account: `http://localhost:1337/parse/apps/kickbox/verify_email?token[$regex]=a&username=some@email.com` The same thing can be done for reset password: `http://localhost:1337/parse/apps/kickbox/request_password_reset?token[$regex]=a&username=some@email.com` You may need to do it a few times with a different letter/number, but as long as the tokens contain the character it will succeed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-h4mf-75hf-67w4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5251'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269'}]
{'cwe_ids': ['CWE-200', 'CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-04T19:54:37Z', 'nvd_published_at': None}
1.4.0
GHSA-p86x-652p-6385
2021-08-19T21:56:09Z
2020-03-11T21:36:38Z
null
['CVE-2012-5577']
Incorrect Default Permissions in keyring
Python keyring lib before 0.10 created keyring files with world-readable permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keyring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5577'}, {'type': 'WEB', 'url': 'https://bitbucket.org/kang/python-keyring-lib/commits/049cd181470f1ee6c540e1d64acf1def7b1de0c1'}, {'type': 'WEB', 'url': 'https://bitbucket.org/kang/python-keyring-lib/issue/67/set-go-rwx-on-keyring_passcfg'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5577'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2012-5577'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/11/27/3'}]
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-11T21:36:23Z', 'nvd_published_at': None}
1.4.0
GHSA-p94w-42g3-f7h4
2020-02-28T16:38:09Z
2020-03-06T01:16:00Z
null
[]
Holder can (re)create authentic credentials after receiving a credential in vp-toolkit
### Impact The [`verifyVerifiableCredential()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-credential-signer.ts#L57) method check the cryptographic integrity of the Verifiable Credential, but it does not check if the [`credential.issuer`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L129) DID matches the signer of the credential. The **verifier** is impacted by this vulnerability. ### Patches Patch will be available in version 0.2.2. ### Workarounds In case you trust certain issuers for certain credentials as a verifier, trust the issuer&#39;s public key from the `credential.proof.verificationMethod` field. ### References [Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13) ### For more information If you have any questions or comments about this advisory: * Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13) * [Contact me](https://github.com/rabomarnix)
[]
[{'package': {'ecosystem': 'npm', 'name': 'vp-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-p94w-42g3-f7h4'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-28T16:38:09Z', 'nvd_published_at': None}
1.4.0
GHSA-3hw5-q855-g6cw
2021-02-18T19:45:35Z
2020-03-10T18:03:32Z
null
['CVE-2020-5259']
Prototype Pollution in Dojox
The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution. Affected Area: ``` //https://github.com/dojo/dojox/blob/master/jq.js#L442 var tobj = {}; for(var x in props){ // the "tobj" condition avoid copying properties in "props" // inherited from Object.prototype. For example, if obj has a custom // toString() method, don't overwrite it with the toString() method // that props inherited from Object.prototype if((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){ if(dojo.isObject(obj[x]) && dojo.isObject(props[x])){ if(dojo.isArray(props[x])){ obj[x] = props[x]; }else{ obj[x] = jqMix(obj[x], props[x]); } }else{ obj[x] = props[x]; } ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html'}]
{'cwe_ids': ['CWE-94'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T18:02:07Z', 'nvd_published_at': None}
1.4.0
GHSA-gww7-p5w4-wrfv
2023-09-14T15:06:09Z
2020-03-04T20:52:11Z
null
['CVE-2019-20330']
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5, and 2.9.x before 2.9.10.2 lacks certain `net.sf.ehcache` blocking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.7.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20330'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2526'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c77dd6ab8344285bd8e481b57cf3029965a4b0036eefccef74cdd44@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f8180d0d25a7c6473ebb9714b0c1d19a73f455ae70d0c5fefc17e6c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r428735963bee7cb99877b88d3228e28ec28af64646455c4f3e7a3c94@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r50f513772f12e1babf65c7c2b9c16425bac2d945351879e2e267517f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c14fdcabdeaba258857bcb67198652e4dce1d33ddc590cd81d82393@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c3644c97f0434d1ceb48ff48897a67bdbf3baf7efbe7d04625425b3@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d3d10fdf28110da3f9ac1b7d08d7e252f98d7d37ce0a6bd139a2e4f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67f4d4c48197454b83d62afbed8bebbda3764e6e3a6e26a848961764@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r707d23bb9ee245f50aa909add0da6e8d8f24719b1278ddd99d2428b2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7a0821b44247a1e6c6fe5f2943b90ebc4f80a8d1fb0aa9a8b29a59a2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fb123e7dad49af5886cfec7135c0fd5b74e4c67af029e1dc91ba744@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8831b7fa5ca87a1cf23ee08d6dedb7877a964c1d2bd869af24056a63@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r909c822409a276ba04dc2ae31179b16f6864ba02c4f9911bdffebf95@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2e572f568de8df5ba151e6aebb225a0629faaf0476bf7c7ed877af8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra5ce96faec37c26b0aa15b4b6a8b1cbb145a748653e56ae83e9685d0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8a80dbc7319916946397823aec0d893d24713cbf7b5aee0e957298c@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb532fed78d031fff477fd840b81946f6d1200f93a63698dae65aa528@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd1f346227e11fc515914f3a7b20d81543e51e5822ba71baa0452634a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49cfa41bbb71ef33b53736a6af2aa8ba88c2106e30f2a34902a87d2@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd6c6fef14944f3dcfb58d35f9317eb1c32a700e86c1b5231e45d3d0b@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa57d9c2a27d3af14c69607fb1a3da00e758b2092aa88eb6a51b6e99@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200127-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T02:46:33Z', 'nvd_published_at': '2020-01-03T04:15:00Z'}
1.4.0
GHSA-p5xh-vx83-mxcj
2022-03-23T23:12:13Z
2020-03-31T15:40:12Z
null
['CVE-2020-10109']
HTTP Request Smuggling in Twisted
In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Twisted'}, 'ecosystem_specific': {'affected_functions': ['twisted.web.http.HTTPChannel', 'twisted.web.http.HTTPChannel.headerReceived']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10109'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13'}, {'type': 'WEB', 'url': 'https://know.bishopfox.com/advisories/twisted-version-19.10.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-24'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-2/'}]
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:28:17Z', 'nvd_published_at': '2020-03-12T13:15:00Z'}
1.4.0
GHSA-7fhm-mqm4-2wp7
2020-04-03T21:54:52Z
2020-03-13T20:36:16Z
2020-04-03T21:47:06Z
[]
Withdrawn: ESLint dependencies are vulnerable (ReDoS and Prototype Pollution)
**Withdrawn** GitHub has withdrawn this advisory in place of GHSA-vh95-rmgr-6w4m and GHSA-6chw-6frg-f759. The reason for withdrawing is that some mistakes were made during the ingestion of CVE-2020-7598 which caused this advisory to be published with incorrect information. In order to provide accurate advisory information, new advisories were created: - minimist: https://github.com/advisories/GHSA-vh95-rmgr-6w4m - acorn: https://github.com/advisories/GHSA-6chw-6frg-f759
[]
[{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6chw-6frg-f759'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vh95-rmgr-6w4m'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T20:21:06Z', 'nvd_published_at': None}
1.4.0
GHSA-66q9-f7ff-mmx6
2021-01-14T17:48:17Z
2020-03-25T17:35:51Z
null
['CVE-2020-5280']
Local file inclusion vulnerability in http4s
### Impact This vulnerability applies to all users of: * `org.http4s.server.staticcontent.FileService` * `org.http4s.server.staticcontent.ResourceService` * `org.http4s.server.staticcontent.WebjarService` #### Path escaping URI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can expose resources outside of the configured location. Specifically: * `FileService` may expose any file on the local file system. * `ResourceService` may expose any resource on the class path. #### Prefix matching When the service is configured with a non-empty `pathPrefix` that doesn't end in a slash, any directories whose names are a prefix of `systemPath` (from `FileService`) or `pathPrefix` (from `ResourceService`) are exposed. For example, if `pathPrefix` is `/foo` and `systemPath` is `/bar`, a request to `/foobaz/quux.txt` exposes file `/barbaz/quux.txt`, when only files beneath `/bar` should be available. #### URI decoding URI segments are not decoded before resource resolution. This causes resources with reserved characters in their name to incorrectly return a 404. It also may incorrectly expose the rare resource whose name is URI encoded. This applies to `FileService`, `ResourceService`, and `WebjarService`. ### Patches In all three services, paths with an empty segment, a `.` segment, or a `..` segment are now rejected with a `400 Bad Request` response. This fixes exposure outside the configured root. Many clients already eliminate dot segments according to the rules in [RFC3986, Section 5.2.4](https://tools.ietf.org/html/rfc3986#section-5.2.4). A middleware that does so at the server level may be considered if there is demand. If `pathInfo` is non-empty, and does not begin with `/`, then a 404 response is generated. This fixes the prefix matching exposure. All path segments are URI decoded before being passed to the file system or resource path. This allows resolution of resources with reserved characters in the name, and prevents incorrect exposure of resources whose names are themselves URI encoded. ### Workarounds The recommended course is to upgrade: * v0.18.26, binary compatible with the 0.18.x series * v0.20.20, binary compatible with the 0.20.x series * v0.21.2, binary compatible with the 0.21.x series Note that 0.19.0 is a deprecated release and has never been supported. If an upgrade is impossible: * Temporarily copy `FileService.scala`, `ResourceService.scala`, and `WebjarService.scala` from the appropriate release series into your project and recompile with that, changing the package name and reference in your application. * Users of a servlet backend can use the servlet container's file serving capabilities. ### Credits Thank you to Thomas Gøytil for the discovery, responsible disclosure, and assistance testing of this vulnerability. ### For more information If you have any questions or comments about this advisory: * Open an issue in [http4s/http4s](http://github.com/http4s/http4s) * Email a maintainer: * [Ross A. Baker](mailto:ross@rossabaker.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.26'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'fixed': '0.20.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.http4s:http4s-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.0'}, {'fixed': '0.21.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/http4s/http4s/security/advisories/GHSA-66q9-f7ff-mmx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5280'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca'}, {'type': 'WEB', 'url': 'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b'}]
{'cwe_ids': ['CWE-23'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-03-25T17:34:45Z', 'nvd_published_at': None}
1.4.0
GHSA-j27j-4w6m-8fc4
2020-08-31T18:54:26Z
2020-03-31T17:02:12Z
null
['CVE-2019-15596']
Path Traversal in statics-server
All versions of `statics-server` are vulnerable to Path Traversal. The package fails to limit access to files outside of the served folder through symlinks. ## Recommendation No fix is currently available. Do not use `statics-server` in production or consider using an alternative module until a fix is made available.
[]
[{'package': {'ecosystem': 'npm', 'name': 'statics-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15596'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/695416'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1303'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-31T15:38:57Z', 'nvd_published_at': None}
1.4.0
GHSA-9gjv-6qq6-v7qm
2021-01-08T20:26:35Z
2020-03-13T21:18:55Z
null
['CVE-2020-5240']
2FA bypass through deleting devices in wagtail-2fa
### Impact Any user with access to the CMS can view and delete other users&#39; 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other user&#39;s device they can disable the target user&#39;s 2FA devices and potentially compromise the account if they figure out their password. ### Patches The problem has been patched in version 1.4.1. ### Workarounds There is no workaround for this issue. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa) * Email us at [security@labdigital.nl](mailto:security@labdigital.nl)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail-2fa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5240'}, {'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-13T21:18:19Z', 'nvd_published_at': None}
1.4.0
GHSA-65cv-r6x7-79hv
2023-02-03T20:47:05Z
2020-03-19T17:30:29Z
null
['CVE-2020-5267']
Cross site scripting vulnerability in ActionView
There is a possible cross site scripting (XSS) vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. ### Impact There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this: ```erb <script>let a = `<%= j unknown_input %>`</script> ``` or ```erb <script>let a = `<%= escape_javascript unknown_input %>`</script> ``` ### Releases The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations. ### Workarounds For those that can't upgrade, the following monkey patch may be used: ```ruby ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!( { "`" => "\\`", "$" => "\\$" } ) module ActionView::Helpers::JavaScriptHelper alias :old_ej :escape_javascript alias :old_j :j def escape_javascript(javascript) javascript = javascript.to_s if javascript.empty? result = "" else result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP) end javascript.html_safe? ? result.html_safe : result end alias :j :escape_javascript end ``` ### Patches To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series * [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series Please note that only the 5.2 and 6.0 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. ### Credits Thanks to Jesse Campos from Chef Secure
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.2.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-5267.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/19/1'}]
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-19T17:29:40Z', 'nvd_published_at': '2020-03-19T18:15:00Z'}
1.4.0
GHSA-2mxr-89gf-rc4v
2021-01-08T20:25:19Z
2020-03-30T20:09:58Z
null
['CVE-2020-5289']
Read permissions not enforced for client provided filter expressions in Elide.
### Impact It is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field. For example, a User model has two fields: _name_ and _role_. The adversary has read permissions to see the _name_ field of the User collection but not the _role_. By constructing a filter like the one below, the adversary can determine which users have admin role by presence or absence in the returned collection: `filter=role=="Admin"` ### Patches Resolved in Elide 4.5.14 and greater. ### Workarounds The adversary can only access the fields if a model includes fields with different read permission levels (some less secure and some more secure). Model security can be adjusted by restricting read permissions on existing models. ### References Fixed in https://github.com/yahoo/elide/pull/1236 ### For more information If you have any questions or comments about this advisory: * Open an issue in [elide](https://github.com/yahoo/elide) * Contact us at [spectrum](https://spectrum.chat/elide?tab=posts)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.elide:elide-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5289'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/1236'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-30T20:08:40Z', 'nvd_published_at': None}
1.4.0
GHSA-jxfh-8wgv-vfr2
2022-02-08T22:06:45Z
2020-03-10T18:03:14Z
null
['CVE-2020-5258']
Prototype pollution in dojo
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5258'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojo'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-1321', 'CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-03-10T18:02:00Z', 'nvd_published_at': '2020-03-10T18:15:00Z'}
1.4.0
GHSA-2wx6-wc87-rmjm
2021-01-26T03:25:42Z
2020-03-19T17:29:58Z
null
['CVE-2020-5262']
GitHub personal access token leaking into temporary EasyBuild (debug) logs
### Impact The GitHub Personal Access Token (PAT) used by EasyBuild for the GitHub integration features (like `--new-pr`, `--from-pr`, etc.) is shown in plain text in EasyBuild debug log files. Scope: * the log message only appears in the top-level log file, *not* in the individual software installation logs (see https://easybuild.readthedocs.io/en/latest/Logfiles.html); - as a consequence, tokens are *not* included in the partial log files that are uploaded into a gist when using `--upload-test-report` in combination with `--from-pr`, nor in the installation logs that are copied to the software installation directories; * the message is only logged when using `--debug`, so it will not appear when using the default EasyBuild configuration (only info messages are logged by default); * the log message is triggered via `--from-pr`, but also via various other GitHub integration options like `--new-pr`, `--merge-pr`, `--close-pr`, etc., but usually only appears in the temporary log file that is cleaned up automatically as soon as eb completes successfully; * you may have several debug log files that include your GitHub token in `/tmp` (or a different location if you've set the `--tmpdir` EasyBuild configuration option) on the systems where you use EasyBuild, but they are located in a subdirectory that is only accessible to your account (permissions set to 700); * the only way that a log file that may include your token could have been made public is *if you shared it yourself*, for example by copying the contents of the log file into a gist manually, or by sending a log file to someone; * for log files uploaded to GitHub, your token would be revoked automatically when GitHub notices it; ### Patches The issue is fixed with the changes in https://github.com/easybuilders/easybuild-framework/pull/3248. This fix is included in EasyBuild v4.1.2 (released on Mon Mar 16th 2020), and in the `master`+ `develop` branches of the `easybuild-framework` repository since Mon Mar 16th 2020 (see https://github.com/easybuilders/easybuild-framework/pull/3248 and https://github.com/easybuilders/easybuild-framework/pull/3249 resp.). **Make sure you revoke the existing GitHub tokens you're using with EasyBuild** (via https://github.com/settings/tokens), and install new ones using "`eb --install-github-token --force`" (see also https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html#installing-a-github-token-install-github-token). ### Workarounds * avoid using the GitHub integration features (see https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html) with EasyBuild versions older than version 4.1.2; * don't share top-level EasyBuild (debug) log files with others, unless you are sure your GitHub token is not included in them; * clean up temporary EasyBuild log files in `/tmp`on the system(s) where you`re using EasyBuild ### References * https://github.com/easybuilders/easybuild-framework/pull/3248 (PR that fixes the issue) * (release announcement to EasyBuild mailing list) ### For more information * Open an issue in [the `easybuild-framework` repository](https://github.com/easybuilders/easybuild-framework) * Email us at [easybuild-admin@lists.ugent.be](mailto:easybuild-admin@lists.ugent.be)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'easybuild-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5262'}, {'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/pull/3248'}, {'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/pull/3249'}, {'type': 'WEB', 'url': 'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-03-19T17:04:51Z', 'nvd_published_at': None}