schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 24
values | aliases
stringlengths 2
20
| summary
stringlengths 9
130
⌀ | details
stringlengths 34
11.7k
| severity
stringlengths 2
92
| affected
stringlengths 73
3.22k
| references
stringlengths 64
21.2k
| database_specific
stringlengths 131
202
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-68q3-7wjp-7q3j | 2022-10-07T20:40:49Z | 2020-06-09T00:25:34Z | null | ['CVE-2020-4041'] | The filename of uploaded files vulnerable to stored XSS | ### Impact
The filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it.
Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented.
### Patches
This is fixed in Bolt 3.7.1.
### References
Related issue: https://github.com/bolt/bolt/pull/7853 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bolt/bolt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4041'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/pull/7853'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}, {'type': 'PACKAGE', 'url': 'https://github.com/bolt/bolt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Jul/4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-08T23:14:12Z', 'nvd_published_at': '2020-06-08T22:15:00Z'} |
1.4.0 | GHSA-vmqm-g3vh-847m | 2021-07-22T22:28:36Z | 2020-06-15T18:51:38Z | null | ['CVE-2012-0881'] | Denial of service in Apache Xerces2 | Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0881'}, {'type': 'WEB', 'url': 'https://github.com/apache/xerces2-j/commit/992b5d9c24102ad20330d36c0a71162753a37449'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=787104'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/XERCESJ-1685'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2014/07/08/11'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-15T15:51:37Z', 'nvd_published_at': '2017-10-30T16:29:00Z'} |
1.4.0 | GHSA-ffvq-7w96-97p7 | 2021-01-14T21:29:27Z | 2020-06-15T19:34:50Z | null | ['CVE-2018-15756'] | Denial of Service in Spring Framework | Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15756'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15756'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105703'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T20:09:37Z', 'nvd_published_at': '2018-10-18T22:29:00Z'} |
1.4.0 | GHSA-3gw4-m5w7-v89c | 2021-01-08T21:17:55Z | 2020-06-11T00:04:15Z | null | ['CVE-2020-11090'] | Uncontrolled Resource Consumption in Indy Node | # Summary
Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network.
# Discovery
On May 18, Evernym's monitoring of Sovrin StagingNet showed a report of StagingNet losing sufficient consensus to validate write transactions. The problem resolved itself within a few minutes. On May 20th we saw the alert multiple times, and we began analyzing the logs of our steward node. On May 21st we continued to see the alerts with increasing frequency.
It appears that someone is unknowingly sending a malformed transaction, and retrying when the transaction fails. The cause of the errors appear to be the TAA acceptance.
# Proposed actions
* Reproduce problem in integration tests and create a fix
* Do a hotfix release branching from last stable (current master have some things merged that are too risky)
* Upgrade BuilderNet, StagingNet and MainNet as soon as possible
* Improve testing strategy on Indy Node to reduce probability of such bugs
# Notes
* The journalctl logs also show an out-of-memory problem on the Australia node. We need to evaluate if this should be raised as a separate issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'indy-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.2'}, {'fixed': '1.12.3'}]}], 'versions': ['1.12.2']}] | [{'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-3gw4-m5w7-v89c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11090'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1123'}, {'type': 'WEB', 'url': 'https://pypi.org/project/indy-node/1.12.3/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T00:02:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x7m2-6g99-84w5 | 2021-08-25T21:46:46Z | 2020-06-03T22:02:24Z | null | ['CVE-2020-7652'] | Arbitrary File Read in Snyk Broker | All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'snyk-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.80.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7652'}, {'type': 'PACKAGE', 'url': 'https://github.com/snyk/broker'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611'}, {'type': 'WEB', 'url': 'https://updates.snyk.io/snyk-broker-security-fixes-152338'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-01T19:42:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j3rh-8vwq-wh84 | 2023-01-20T18:53:25Z | 2020-06-26T16:48:13Z | null | ['CVE-2019-16303'] | JHipster Kotlin using insecure source of randomness `RandomStringUtils` before v1.2.0 | JHipster Kotlin is using an insecure source of randomness to generate all of its random values. JHipster Kotlin relies upon apache commons lang3 `RandomStringUtils`.
From the documentation:
> Caveat: Instances of Random, upon which the implementation of this class relies, are not cryptographically secure.
> \- https://commons.apache.org/proper/commons-lang/javadocs/api-3.9/org/apache/commons/lang3/RandomStringUtils.html
Here are the examples of JHipster Kotlin's use of an insecure PRNG:
https://github.com/jhipster/jhipster-kotlin/blob/193ae8f13c0be686f9687e78bacfedb144c47d8c/generators/server/templates/src/main/kotlin/package/service/util/RandomUtil.kt.ejs#L32
## Proof Of Concepts Already Exist
There has been a POC of taking one RNG value generated `RandomStringUtils` and reversing it to generate all of the past/future RNG values public since March 3rd, 2018.
https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd
POC Repository: https://github.com/alex91ar/randomstringutils
## Potential Impact Technical
All that is required is to get one password reset token from a JHipster Kotlin generated service and using the POC above, you can reverse what all future password reset tokens to be generated by this server. This allows an attacker to pick and choose what account they would like to takeover by sending account password reset requests for targeted accounts.
## Potential Impact Scale
Not as large as for the original jhipster project as the kotlin blueprint is not that widely used.
### Patches
Update your generated applications to > 1.2.0
### Workarounds
Change the content of `RandomUtil.kt` like this:
```kotlin
import java.security.SecureRandom
import org.apache.commons.lang3.RandomStringUtils
private const val DEF_COUNT = 20
object RandomUtil {
private val secureRandom: SecureRandom = SecureRandom()
init {
secureRandom.nextBytes(byteArrayOf(64.toByte()))
}
private fun generateRandomAlphanumericString(): String {
return RandomStringUtils.random(DEF_COUNT, 0, 0, true, true, null, secureRandom)
}
/**
* Generate a password.
*
* @return the generated password.
*/
fun generatePassword(): String = generateRandomAlphanumericString()
}
```
Important is to exchange **every** call of `RandomStringUtils.randomAlphaNumeric`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JHipster Kotlin](https://github.com/jhipster/jhipster-kotlin) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster-kotlin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-j3rh-8vwq-wh84'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16303'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/issues/10401'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/jhipster-kotlin/issues/183'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/jhipster-kotlin/commit/deec3587ef7721cf5de5b960d43e9b68beff6193'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhipster/generator-jhipster'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d243e7e3f25daeb242dacf3def411fba32a9388d3ff84918cb28ddd@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc3f00f5d3d2ec0e2381a3b9096d5f5b4d46ec1587ee7e251a3dbb897@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc87fa35a48b5d70b06af6fb81785ed82e82686eb83307aae6d250dc9@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-466980'}, {'type': 'WEB', 'url': 'https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1187'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1188'}] | {'cwe_ids': ['CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-26T16:47:54Z', 'nvd_published_at': '2019-09-14T00:15:00Z'} |
1.4.0 | GHSA-w3f4-3q6j-rh82 | 2021-09-22T18:44:19Z | 2020-06-30T20:40:50Z | null | ['CVE-2018-5968'] | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5968'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/1899'}, {'type': 'WEB', 'url': 'https://github.com/GulajavaMinistudio/jackson-databind/pull/92/commits/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0478'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0479'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0480'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0481'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1525'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180423-0002/'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4114'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-184', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-30T20:40:31Z', 'nvd_published_at': '2018-01-22T04:29:00Z'} |
1.4.0 | GHSA-fpjm-rp2g-3r4c | 2022-03-21T21:53:45Z | 2020-06-05T16:09:34Z | null | ['CVE-2020-10594'] | Django Rest Framework jwt allows obtaining new token from notionally invalidated token | An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'drf-jwt'}, 'ecosystem_specific': {'affected_functions': ['rest_framework_jwt.utils.check_payload']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10594'}, {'type': 'WEB', 'url': 'https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36'}, {'type': 'WEB', 'url': 'https://github.com/jpadilla/django-rest-framework-jwt/issues/484'}, {'type': 'WEB', 'url': 'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Styria-Digital/django-rest-framework-jwt'}, {'type': 'WEB', 'url': 'https://pypi.org/project/drf-jwt/1.15.1/#history'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T18:38:20Z', 'nvd_published_at': '2020-03-15T22:15:00Z'} |
1.4.0 | GHSA-48rw-j489-928m | 2021-06-15T17:44:45Z | 2020-06-05T16:13:29Z | null | ['CVE-2020-5407'] | Signature wrapping vulnerability in Spring Security | Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5407'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r73af928cf64bebf78b7fa4bc56a5253273ec7829f5f5827f64c72fc7@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra19a4e7236877fe12bfb52db07b27ad72d9e7a9f5e27bba7e928e18a@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd99601fbca514f214f88f9e53fd5be3cfbff05b350c994b4ec2e184c@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5407'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T19:19:34Z', 'nvd_published_at': '2020-05-13T17:15:00Z'} |
1.4.0 | GHSA-wpjr-j57x-wxfw | 2022-09-08T14:02:23Z | 2020-06-05T16:20:44Z | null | ['CVE-2020-13254'] | Data leakage via cache key collision in Django | An issue was discovered in Django version 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13254'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/07e59caa02831c4569bbebb9eb773bdd9cb4b206'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.0/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200611-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4381-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4381-2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4705'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T18:32:36Z', 'nvd_published_at': '2020-06-03T14:15:00Z'} |
1.4.0 | GHSA-r23f-c2j5-rx2f | 2021-03-04T18:20:28Z | 2020-06-03T21:58:16Z | null | ['CVE-2020-5295'] | Local File read vulnerability in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1108" alt="Screen Shot 2020-03-31 at 2 37 53 PM" src="https://user-images.githubusercontent.com/7253840/78072989-44b3ac80-735d-11ea-8676-09c69f0409c4.png"> | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-r23f-c2j5-rx2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5295'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Aug/2'}] | {'cwe_ids': ['CWE-829', 'CWE-98'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-03T21:23:15Z', 'nvd_published_at': '2020-06-03T22:15:00Z'} |
1.4.0 | GHSA-4rhm-m2fp-hx7q | 2021-03-04T18:26:33Z | 2020-06-03T21:58:35Z | null | ['CVE-2020-5299'] | Potential CSV Injection vector in OctoberCMS | ### Impact
Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed:
1. Have found a vulnerability in the victim's spreadsheet software of choice.
2. Control data that would potentially be exported through the `ImportExportController` by a theoretical victim.
3. Convince the victim to export above data as a CSV and run it in vulnerable spreadsheet software while also bypassing any sanity checks by said software.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a & https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484 to your installation manually if unable to upgrade to Build 466.
### References
Reported by @chrisvidal initially & [Sivanesh Ashok](https://stazot.com/) later.
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
Given the number of hoops that a potential attacker would have to jump through, this vulnerability really boils down to the possibility of abusing the trust that a user may have in the export functionality of the project. Thus, this has been rated low severity as it requires vulnerabilities to also exist in other software used by any potential victims as well as successful social engineering attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-4rhm-m2fp-hx7q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5299'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Aug/2'}] | {'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-03T21:26:57Z', 'nvd_published_at': '2020-06-03T22:15:00Z'} |
1.4.0 | GHSA-p66x-2cv9-qq3v | 2020-06-10T23:37:42Z | 2020-06-10T23:38:01Z | null | ['CVE-2014-0114'] | Arbitrary code execution in Apache Commons BeanUtils | Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-beanutils:commons-beanutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0114'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2669'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2995'}, {'type': 'WEB', 'url': 'https://access.redhat.com/solutions/869353'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1091938'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1116665'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BEANUTILS-463'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3Ccommits.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5@%3Ccommits.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3Ccommits.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd@%3Ccommits.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3Ccommits.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639@%3Ccommits.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3Cnotifications.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f@%3Cnotifications.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3Cnotifications.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3@%3Cnotifications.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3Ccommits.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201607-09'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20140911-0001/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0006/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMMONSBEANUTILS-30077'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140618110851/http://www.securityfocus.com/bid/67121'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150710065242/http://www.securityfocus.com/archive/1/534161/100/0/threaded'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2014-0219.html'}, {'type': 'WEB', 'url': 'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html'}, {'type': 'WEB', 'url': 'http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=140119284401582&w=2'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=140801096002766&w=2'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=141451023707502&w=2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/06/15/10'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/08/1'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Dec/23'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21674128'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21674812'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21675266'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21675387'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21675689'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21675898'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21675972'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676110'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676303'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676375'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21676931'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21677110'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg27042296'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2940'}, {'type': 'WEB', 'url': 'http://www.ibm.com/support/docview.wss?uid=swg21675496'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2014:095'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-10T23:37:42Z', 'nvd_published_at': '2014-04-30T10:49:00Z'} |
1.4.0 | GHSA-6q48-vjq2-mwcj | 2021-07-28T22:37:17Z | 2020-06-10T20:28:03Z | null | ['CVE-2020-7628'] | Command Injection in umount | All versions of `umount ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `umount` function . This may allow attackers to execute arbitrary code in the system if the `device` value passed to the function is user-controlled.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'umount'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7628'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UMOUNT-564265'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1512'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-10T20:24:03Z', 'nvd_published_at': '2020-04-02T22:15:00Z'} |
1.4.0 | GHSA-338v-3958-8v8r | 2021-08-30T13:39:36Z | 2020-06-10T20:54:15Z | null | ['CVE-2014-8122'] | Information disclosure in JBoss Weld | Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.weld:weld-core-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8122'}, {'type': 'WEB', 'url': 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745'}, {'type': 'WEB', 'url': 'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086'}, {'type': 'WEB', 'url': 'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100892'}, {'type': 'WEB', 'url': 'https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/weld/core/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0215.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0216.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0217.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0218.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0675.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0773.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0850.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0851.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0920.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/74252'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1031741'}] | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-10T20:53:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4vj3-f849-5r48 | 2021-07-29T17:23:47Z | 2020-06-03T22:02:21Z | null | ['CVE-2020-7653'] | Arbitrary File Read in Snyk Broker | All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network by creating symlinks to match whitelisted paths. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'snyk-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.80.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7653'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570612'}, {'type': 'WEB', 'url': 'https://updates.snyk.io/snyk-broker-security-fixes-152338'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-01T19:42:29Z', 'nvd_published_at': '2020-05-29T21:15:00Z'} |
1.4.0 | GHSA-37cf-r3w2-gjfw | 2023-09-01T10:17:33Z | 2020-06-05T16:09:19Z | null | ['CVE-2019-10682'] | django-nopassword stores secrets in cleartext | django-nopassword before 5.0.0 stores cleartext secrets in the database. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-nopassword'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10682'}, {'type': 'WEB', 'url': 'https://github.com/relekang/django-nopassword/commit/d8b4615f5fbfe3997d96cf4cb3e342406396193c'}, {'type': 'PACKAGE', 'url': 'https://github.com/relekang/django-nopassword'}, {'type': 'WEB', 'url': 'https://github.com/relekang/django-nopassword/blob/8e8cfc765ee00adfed120c2c79bf71ef856e9022/nopassword/models.py#L14'}, {'type': 'WEB', 'url': 'https://github.com/relekang/django-nopassword/compare/v4.0.1...v5.0.0'}] | {'cwe_ids': ['CWE-312', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T18:34:53Z', 'nvd_published_at': '2020-03-18T15:15:00Z'} |
1.4.0 | GHSA-mpgr-2cx9-327h | 2021-01-08T20:12:11Z | 2020-06-11T21:09:04Z | null | ['CVE-2020-4045'] | Information disclosure in SSB-DB | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately.
**There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.**
The `get()` method is supposed to only decrypt messages when you explicitly ask it to, but there's a bug where it's decrypting any message that it can. This means that it's returning the decrypted content of private messages, which a malicious peer could use to get access to private data. This only affects peers running SSB-DB@20.0.0 who also have private messages, and is only known to be exploitable if you're also running SSB-OOO (default in SSB-Server), which exposes a thin wrapper around `get()` to anonymous peers.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, please upgrade to SSB-DB 20.0.1 (or SSB-Server 16.0.1) immediately.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
You may be able to disable the most obvious attack vector, SSB-OOO, by disabling the plugin, but you should upgrade immediately anyway.
### For more information
If you have any questions or comments about this advisory, open an issue in [SSB-DB](https://github.com/ssbc/ssb-db/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ssb-db'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.1'}]}], 'versions': ['20.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045'}, {'type': 'WEB', 'url': 'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T21:08:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xfv3-rrfm-f2rv | 2021-09-22T18:45:29Z | 2020-06-30T21:01:21Z | null | ['CVE-2015-2156'] | Information Exposure in Netty | Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.28.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.3.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.3.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.8.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2156'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/3754'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1222923'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-IONETTY-73571'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html'}, {'type': 'WEB', 'url': 'http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/05/17/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/74704'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-30T20:59:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c265-37vj-cwcc | 2021-10-21T21:08:02Z | 2020-06-18T14:44:48Z | null | ['CVE-2020-14062'] | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14062'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2704'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200702-0003/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-18T13:06:04Z', 'nvd_published_at': '2020-06-14T20:15:00Z'} |
1.4.0 | GHSA-q3gh-5r98-j4h3 | 2023-01-27T21:41:14Z | 2020-06-26T16:26:50Z | null | ['CVE-2020-14968'] | RSA-PSS signature validation vulnerability by prepending zeros in jsrsasign | ### Impact
Jsrsasign can verify RSA-PSS signature which value can expressed as BigInteger. When there is a valid RSA-PSS signature value, this vulnerability is also accept value with prepending zeros as a valid signature.
- If you are not use RSA-PSS signature validation, this vulnerability is not affected.
- Risk to accept a forged or crafted message to be signed is low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
### Patches
Users using RSA-PSS signature validation should upgrade to 8.0.17.
### Workarounds
Reject RSA-PSS signatures with unnecessary prepending zeros.
### References
https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3
[https://github.com/kjur/jsrsasign/issues/438](https://github.com/kjur/jsrsasign/issues/438)
https://nvd.nist.gov/vuln/detail/CVE-2020-14968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968
https://vuldb.com/?id.157125
https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '8.0.17'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.0.16'}}] | [{'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14968'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/438'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968'}, {'type': 'PACKAGE', 'url': 'https://github.com/kjur/jsrsasign'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200724-0001/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.157125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1541'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jsrsasign'}] | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-26T16:19:52Z', 'nvd_published_at': '2020-06-22T12:15:00Z'} |
1.4.0 | GHSA-mvr2-9pj6-7w5j | 2023-09-07T22:25:36Z | 2020-06-15T20:35:11Z | null | ['CVE-2018-10237'] | Denial of Service in Google Guava | Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.guava:guava'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0'}, {'fixed': '24.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.guava:guava-jdk5'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.guava-osgi:guava-osgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'de.mhus.ports:vaadin-shared-deps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.hudsonci.lib.guava:guava'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.0.1-h-3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.sisu:sisu-guava'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.11.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10237'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2423'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2424'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2425'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2428'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2598'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2643'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2740'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2741'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2742'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2743'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/guava'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/wiki/CVE-2018-10237'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc@%3Chdfs-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540@%3Cdev.syncope.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220629-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041707'}] | {'cwe_ids': ['CWE-502', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T18:34:57Z', 'nvd_published_at': '2018-04-26T21:29:00Z'} |
1.4.0 | GHSA-5wm5-8q42-rhxg | 2022-02-08T22:05:36Z | 2020-06-05T16:11:02Z | null | ['CVE-2020-1963'] | File system access via H2 in Apache Ignite | Apache Ignite uses H2 database to build SQL distributed execution engine. H2 provides SQL functions which could be used by attacker to access to a filesystem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ignite:ignite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1963'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r119024ef71c8d39f952df0950a275d09714715179aff544aea0129a3@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95a651aab319ced6306759e1237ce67@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf032a13a4711f88c0a2c0734eecbee1026cc1b6cde27d16a653f8755@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03/2'}] | {'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T18:55:16Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-c6qr-h5vq-59jc | 2023-07-05T20:24:19Z | 2020-06-24T17:40:33Z | null | ['CVE-2020-8185'] | Untrusted users can run pending migrations in production in Rails | There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 < rails < 6.0.3.2
Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production)
Fixed Versions: rails >= 6.0.3.2
Impact
------
Using this issue, an attacker would be able to execute any migrations that are pending for a Rails app running in production mode. It is important to note that an attacker is limited to running migrations the application developer has already defined in their application and ones that have not already run.
Workarounds
-----------
Until such time as the patch can be applied, application developers should disable the ActionDispatch middleware in their production environment via a line such as this one in their config/environment/production.rb:
`config.middleware.delete ActionDispatch::ActionableExceptions` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8185'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/899069'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8185.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/pAe9EV8gbM0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-24T17:33:58Z', 'nvd_published_at': '2020-07-02T19:15:00Z'} |
1.4.0 | GHSA-g78m-2chm-r7qv | 2021-08-25T21:51:05Z | 2020-06-05T16:16:12Z | null | ['CVE-2020-7662'] | Regular Expression Denial of Service in websocket-extensions (NPM package) | ### Impact
The ReDoS flaw allows an attacker to exhaust the server's capacity to process
incoming requests by sending a WebSocket handshake request containing a header
of the following form:
Sec-WebSocket-Extensions: a; b="\c\c\c\c\c\c\c\c\c\c ...
That is, a header containing an unclosed string parameter value whose content is
a repeating two-byte sequence of a backslash and some other character. The
parser takes exponential time to reject this header as invalid, and this will
block the processing of any other work on the same thread. Thus if you are
running a single-threaded server, such a request can render your service
completely unavailable.
### Patches
Users should upgrade to version 0.1.4.
### Workarounds
There are no known work-arounds other than disabling any public-facing
WebSocket functionality you are operating.
### References
- https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions/ | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'websocket-extensions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/faye/websocket-extensions-node/security/advisories/GHSA-g78m-2chm-r7qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7662'}, {'type': 'WEB', 'url': 'https://github.com/faye/websocket-extensions-node/commit/29496f6838bfadfe5a2f85dff33ed0ba33873237'}, {'type': 'WEB', 'url': 'https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/websocket-extensions-node'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEBSOCKETEXTENSIONS-570623'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-03T23:10:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xxxq-chmp-67g4 | 2023-01-31T01:29:40Z | 2020-06-26T16:27:08Z | null | ['CVE-2020-14967'] | RSA PKCS#1 decryption vulnerability with prepending zeros in jsrsasign | ### Impact
Jsrsasign supports RSA PKCS#1 v1.5 (i.e. RSAES-PKCS1-v1_5) and RSA-OAEP encryption and decryption. Its encrypted message is represented as BigInteger. When there is a valid encrypted message, a crafted message with prepending zeros can be decrypted by this vulnerability.
- If you don't use RSA PKCS1-v1_5 or RSA-OAEP decryption, this vulnerability is not affected.
- Risk to forge contents of encrypted message is very low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
### Patches
Users using RSA PKCS1-v1_5 or RSA-OAEP decryption should upgrade to 8.0.18.
### Workarounds
Reject RSA PKCS1-v1_5 or RSA-OAEP encrypted message with unnecessary prepending zeros.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-14967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967
https://vuldb.com/?id.157124
https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt
https://github.com/kjur/jsrsasign/issues/439
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.18'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-xxxq-chmp-67g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14967'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/439'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967'}, {'type': 'PACKAGE', 'url': 'https://github.com/kjur/jsrsasign'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200724-0001/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.157124'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jsrsasign'}] | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-26T16:26:32Z', 'nvd_published_at': '2020-06-22T12:15:00Z'} |
1.4.0 | GHSA-cxjc-r2fp-7mq6 | 2023-03-01T01:09:25Z | 2020-06-15T21:53:12Z | null | ['CVE-2020-4051'] | Cross-site Scripting in dijit editor's LinkDialog plugin | ### Impact
XSS possible for users of the Dijit Editor's LinkDialog plugin
### Patches
Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3
### Workarounds
Users may apply the patch made in these releases.
### For more information
If you have any questions or comments about this advisory, open an issue in [dojo/dijit](https://github.com/dojo/dijit/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201023-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-15T21:52:48Z', 'nvd_published_at': '2020-06-15T22:15:00Z'} |
1.4.0 | GHSA-6r3c-8xf3-ggrr | 2021-09-22T18:37:22Z | 2020-06-24T17:15:26Z | null | [] | Directory traversal outside of SENDFILE_ROOT in django-sendfile2 | django-sendfile2 currently relies on the backend to correctly limit file paths to `SENDFILE_ROOT`. This is not the case for the `simple` and `development` backends, it is also not necessarily the case for any of the other backends either (it's just an assumption that was made by the original author).
This will be fixed in 0.6.0 which is to be released the same day as this advisory is made public.
When upgrading, you will need to make sure `SENDFILE_ROOT` is set in your settings module if it wasn't already. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-sendfile2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moggers87/django-sendfile2/security/advisories/GHSA-6r3c-8xf3-ggrr'}, {'type': 'WEB', 'url': 'https://github.com/moggers87/django-sendfile2/commit/f870c52398a55b9b5189932dd8caa24efb4bc1e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/moggers87/django-sendfile2'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-18T16:55:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pfxf-wh96-fvjc | 2021-01-07T23:50:00Z | 2020-06-25T20:02:51Z | null | ['CVE-2020-4072'] | Log Forging in generator-jhipster-kotlin | ### Impact
We log the mail for invalid password reset attempts.
As the email is provided by a user and the api is public this can be used by an attacker to forge log entries.
This is vulnerable to https://cwe.mitre.org/data/definitions/117.html
This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.
### Patches
version 1.7.0.
### Workarounds
In `AccountResource.kt` you should change the line
```kotlin
log.warn("Password reset requested for non existing mail '$mail'");
```
to
```kotlin
log.warn("Password reset requested for non existing mail");
```
### References
* https://cwe.mitre.org/data/definitions/117.html
* https://owasp.org/www-community/attacks/Log_Injection
* https://www.baeldung.com/jvm-log-forging
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster-kotlin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.7.0'}]}], 'versions': ['1.6.0']}] | [{'type': 'WEB', 'url': 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4072'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/Log_Injection'}, {'type': 'WEB', 'url': 'https://www.baeldung.com/jvm-log-forging'}] | {'cwe_ids': ['CWE-117'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-25T20:02:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6wqp-v4v6-c87c | 2021-08-30T14:15:59Z | 2020-06-15T18:44:51Z | null | ['CVE-2018-12023'] | Deserialization of Untrusted Data | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12023'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2058'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105659'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T21:43:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-864j-6qpp-cmrr | 2023-07-05T19:29:08Z | 2020-06-10T20:03:02Z | null | ['CVE-2020-7981'] | SQL Injection in Geocoder | sql.rb in Geocoder before 1.6.1 allows Boolean-based SQL injection when `within_bounding_box` is used in conjunction with untrusted `sw_lat`, `sw_lng`, `ne_lat`, or `ne_lng` data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'geocoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7981'}, {'type': 'WEB', 'url': 'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7981'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexreisner/geocoder'}, {'type': 'WEB', 'url': 'https://github.com/alexreisner/geocoder/blob/master/CHANGELOG.md#161-2020-jan-23'}, {'type': 'WEB', 'url': 'https://github.com/alexreisner/geocoder/compare/v1.6.0...v1.6.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/geocoder/CVE-2020-7981.yml'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-10T18:28:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-334p-wv2m-w3vp | 2020-06-15T15:55:30Z | 2020-06-15T18:51:30Z | null | ['CVE-2009-2625'] | Denial of service in Apache Xerces2 | XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2625'}, {'type': 'WEB', 'url': 'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=512921'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2009-1199.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2009-1200.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2009-1201.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2009-1636.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2009-1637.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2009-1649.html'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2009-1650.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-XERCES-32014'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=125787273209737&w=2'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2012-1232.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2012-1537.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36162'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36176'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36180'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36199'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/37300'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/37460'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/37671'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/37754'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/38231'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/38342'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/43300'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/50549'}, {'type': 'WEB', 'url': 'http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026'}, {'type': 'WEB', 'url': 'http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1'}, {'type': 'WEB', 'url': 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1'}, {'type': 'WEB', 'url': 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1'}, {'type': 'WEB', 'url': 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1'}, {'type': 'WEB', 'url': 'http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h'}, {'type': 'WEB', 'url': 'http://www.cert.fi/en/reports/2009/vulnerability2009085.html'}, {'type': 'WEB', 'url': 'http://www.codenomicon.com/labs/xml/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2010/dsa-1984'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2009:209'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108'}, {'type': 'WEB', 'url': 'http://www.networkworld.com/columnists/2009/080509-xml-flaw.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/09/06/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/10/22/9'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/10/23/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/10/26/3'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2009-1615.html'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2011-0858.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/507985/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/35958'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id?1022680'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-890-1'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA09-294A.html'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA10-012A.html'}, {'type': 'WEB', 'url': 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/2543'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/3316'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2011/0359'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-15T15:55:30Z', 'nvd_published_at': '2009-08-06T15:30:00Z'} |
1.4.0 | GHSA-p8c3-7rj8-q963 | 2023-01-31T01:29:53Z | 2020-06-26T16:54:15Z | null | ['CVE-2020-14966'] | ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign | ### Impact
Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as:
- wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct)
- prepending zeros with ASN.1 INTEGER value (ex. 0x00000123 even though 0x0123 is correct)
- appending zeros to signature of ASN.1 TLV (ex. 0x3082....1fbc000000 even though 0x3082....1fbc, appending zeros are ignored.)
This vulnerability was fixed by strict ASN.1 DER checking.
Here is an assessment of this vulnerability:
- If you are not use ECDSA signature validation, this vulnerability is not affected.
- Not ASN.1 format signature like just concatenation of R and S value is not affected such as Bitcoin.
- This vulnerability is affected to all ECC curve parameters.
- Risk to accept a forged or crafted message to be signed is low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
- ECDSA signatures semantically the same to valid one may be accepted as valid. There are many malleable variants.
As discussed [here](https://crypto.stackexchange.com/questions/24862/ber-or-der-x9-62-for-ecdsa-signature), there is no standards like X9.62 which requires ASN.1 DER. So ASN.1 BER can be applied to ECDSA however most of implementations like OpenSSL do strict ASN.1 DER checking.
### Patches
Users using ECDSA signature validation should upgrade to 8.0.19.
### Workarounds
Do strict ASN.1 DER checking for ASN.1 encoded ECDSA signature value.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-14966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966
https://vuldb.com/?id.157123
https://github.com/kjur/jsrsasign/issues/437
https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html
https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER
https://www.itu.int/rec/T-REC-X.690
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '8.0.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14966'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/437'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966'}, {'type': 'PACKAGE', 'url': 'https://github.com/kjur/jsrsasign'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200724-0001/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.157123'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jsrsasign'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-26T16:54:00Z', 'nvd_published_at': '2020-06-22T12:15:00Z'} |
1.4.0 | GHSA-g6wq-qcwm-j5g2 | 2023-05-16T16:17:54Z | 2020-06-05T14:21:29Z | null | ['CVE-2020-7663'] | Regular Expression Denial of Service in websocket-extensions (RubyGem) | ### Impact
The ReDoS flaw allows an attacker to exhaust the server's capacity to process incoming requests by sending a WebSocket handshake request containing a header of the following form:
Sec-WebSocket-Extensions: a; b="\c\c\c\c\c\c\c\c\c\c ...
That is, a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. The parser takes exponential time to reject this header as invalid, and this will block the processing of any other work on the same thread. Thus if you are running a single-threaded server, such a request can render your service completely unavailable.
### Patches
Users should upgrade to version 0.1.5.
### Workarounds
There are no known work-arounds other than disabling any public-facing WebSocket functionality you are operating.
### References
- https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions/ | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'websocket-extensions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/faye/websocket-extensions-ruby/security/advisories/GHSA-g6wq-qcwm-j5g2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7663'}, {'type': 'WEB', 'url': 'https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b'}, {'type': 'WEB', 'url': 'https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions'}, {'type': 'PACKAGE', 'url': 'https://github.com/faye/websocket-extensions-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/websocket-extensions/CVE-2020-7663.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00031.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4502-1/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-03T23:10:34Z', 'nvd_published_at': '2020-06-02T19:15:00Z'} |
1.4.0 | GHSA-2q66-6cc3-6xm8 | 2022-10-07T20:40:29Z | 2020-06-09T00:25:41Z | null | ['CVE-2020-4040'] | CSRF issue on preview pages in Bolt CMS | ### Impact
Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview.
### Patches
This has been fixed in Bolt 3.7.1
### References
Related issue: https://github.com/bolt/bolt/pull/7853 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bolt/bolt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/pull/7853'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}, {'type': 'PACKAGE', 'url': 'https://github.com/bolt/bolt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Jul/4'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-08T21:52:37Z', 'nvd_published_at': '2020-06-08T22:15:00Z'} |
1.4.0 | GHSA-96r7-mrqf-jhcc | 2021-08-30T13:39:02Z | 2020-06-10T20:27:53Z | null | ['CVE-2020-7617'] | Prototype Pollution in ini-parser | All versions of `ini-parser` are vulnerable to prototype pollution. The `parse` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ini-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7617'}, {'type': 'WEB', 'url': 'https://github.com/rawiroaisen/node-ini-parser/blob/master/index.js#L14'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-INIPARSER-564122'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1508'}] | {'cwe_ids': ['CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-10T20:13:15Z', 'nvd_published_at': '2020-04-02T18:15:00Z'} |
1.4.0 | GHSA-qjg4-w4c6-f6c6 | 2021-01-08T21:00:24Z | 2020-06-18T19:23:17Z | null | ['CVE-2020-4059'] | Command injection in mversion | ### Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
### Patches
Patched by version 2.0.0. Previous releases are deprecated in npm.
### Workarounds
Make sure to escape git commit messages when using the commitMessage option for the update function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'mversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mikaelbr/mversion/security/advisories/GHSA-qjg4-w4c6-f6c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4059'}, {'type': 'WEB', 'url': 'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T20:22:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qcxh-w3j9-58qr | 2021-08-30T14:24:31Z | 2020-06-15T18:51:09Z | null | ['CVE-2019-0199'] | Denial of Service in Tomcat | The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.38'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0199'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190419-0001/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K17321505'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107674'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-15T16:43:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6g6m-m6h5-w9gf | 2021-01-07T23:49:22Z | 2020-06-30T16:05:24Z | null | ['CVE-2020-15084'] | Authorization bypass in express-jwt | ### Overview
Versions before and including 5.3.3, we are not enforcing the **algorithms** entry to be specified in the configuration.
When **algorithms** is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
You are using express-jwt
AND
You do not have **algorithms** configured in your express-jwt configuration.
AND
You are using libraries such as jwks-rsa as the **secret**.
### How to fix that?
Specify **algorithms** in the express-jwt configuration. The following is an example of a proper configuration
```
const checkJwt = jwt({
secret: jwksRsa.expressJwtSecret({
rateLimit: true,
jwksRequestsPerMinute: 5,
jwksUri: `https://${DOMAIN}/.well-known/jwks.json`
}),
// Validate the audience and the issuer.
audience: process.env.AUDIENCE,
issuer: `https://${DOMAIN}/`,
// restrict allowed algorithms
algorithms: ['RS256']
});
```
### Will this update impact my users?
The fix provided in patch will not affect your users if you specified the algorithms allowed. The patch now makes **algorithms** a required configuration.
### Credit
IST Group | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15084'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef'}] | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-30T16:04:48Z', 'nvd_published_at': '2020-06-30T16:15:00Z'} |
1.4.0 | GHSA-c8wh-6jw4-2h79 | 2021-01-08T20:14:28Z | 2020-06-03T23:19:12Z | null | ['CVE-2020-11094'] | Potential unauthorized access to stored request & session data when plugin is misconfigured in October CMS Debugbar | ### Impact
The debugbar contains a perhaps little known feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as the potential exists for them to use this feature to view all requests being made to the application and obtain sensitive information from those requests. There even exists the potential for account takeovers of authenticated users by non-authenticated public users, which would then lead to a number of other potential issues as an attacker could theoretically get full access to the system if the required conditions existed.
### Patches
Issue has been patched in v3.1.0 by locking down access to the debugbar to all users; it now requires an authenticated backend user with a specifically enabled permission before it is even usable, and the feature that allows access to stored request information is restricted behind a different permission that's more restrictive.
### Workarounds
Apply https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18 to your installation manually if unable to upgrade to v3.1.0.
### For more information
If you have any questions or comments about this advisory:
* Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com)
### Acknowledgements
Thanks to [Freddie Poser](https://twitter.com/vogonjeltz101) for reporting the issue to the RainLab team. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'rainlab/debugbar-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rainlab/debugbar-plugin/security/advisories/GHSA-c8wh-6jw4-2h79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11094'}, {'type': 'WEB', 'url': 'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18'}] | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-03T23:18:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6hgm-866r-3cjv | 2023-05-31T15:55:08Z | 2020-06-15T20:36:20Z | null | ['CVE-2015-6420'] | Insecure Deserialization in Apache Commons Collection | Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-collections4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'commons-collections:commons-collections'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.sourceforge.collections:collections-generic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.servicemix.bundles:org.apache.servicemix.bundles.collections-generic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.01'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.servicemix.bundles:org.apache.servicemix.bundles.commons-collections'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6420'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/2306.05534'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-collections'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/581311'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2017-14'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2017-23'}, {'type': 'WEB', 'url': 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/78872'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T15:58:44Z', 'nvd_published_at': '2015-12-15T05:59:00Z'} |
1.4.0 | GHSA-w42g-7vfc-xf37 | 2020-08-31T19:02:14Z | 2020-06-05T19:38:14Z | null | [] | Introspection in schema validation in Apollo Server | We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions.
### Impact
If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled.
The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory.
> **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary.
In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)).
The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP).
**The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors.
### Affected packages
The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server.
Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`.
> Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form.
### Resolution
The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.)
### Workarounds
Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**:
```js
const server = new ApolloServer({
subscriptions: false,
/* Other options, such as typeDefs, resolvers, schema, etc. */
});
```
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist.
### Credit and appreciation
Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing.
Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing. | [] | [{'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-azure-functions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-cache-memcached'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-cloud-functions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-cloudflare'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-koa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-lambda'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server-micro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w42g-7vfc-xf37'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1525'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1526'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1527'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1528'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1529'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1530'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1531'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1532'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1533'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1534'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1535'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1536'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-05T19:37:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6phf-73q6-gh87 | 2022-02-08T22:07:58Z | 2020-06-15T20:36:17Z | null | ['CVE-2019-10086'] | Insecure Deserialization in Apache Commons Beanutils | In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-beanutils:commons-beanutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10086'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4317'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0057'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0194'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-beanutils'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T15:08:49Z', 'nvd_published_at': '2019-08-20T21:15:00Z'} |
1.4.0 | GHSA-f93p-f762-vr53 | 2021-06-15T17:28:04Z | 2020-06-10T20:02:33Z | null | ['CVE-2019-17573'] | Reflected Cross-Site Scripting in Apache CXF | By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17573'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/11/12/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-09T19:27:28Z', 'nvd_published_at': '2020-01-16T18:15:00Z'} |
1.4.0 | GHSA-g753-jx37-7xwh | 2021-09-22T18:43:42Z | 2020-06-30T16:05:08Z | null | [] | ECDSA signature vulnerability of Minerva timing attack in jsrsasign | ### Impact
ECDSA side-channel attack named [Minerava](https://minerva.crocs.fi.muni.cz/) have been found and it was found that it affects to jsrsasign.
Execution time of thousands signature generation have been observed then EC private key which is scalar value may be recovered since point and scalar multiplication time depends on bits of scalar. In jsrsasign 8.0.13 or later, execution time of EC point and scalar multiplication is almost constant and fixed for the issue.
- Minerva is one of timing attack or side channel attack for EC.
- If you don't use ECDSA class, you are not affected the vulnerability.
- The vulnerability is that attacker may guess private key by checking processing time of EC key generation or ECDSA signing.
- The cause issue is that point multiplication processing time in ECDSA signing is depends on private key value.
- After 8.0.13, processing time of point multiplication in ECDSA signing have become constant for key value in theory.
### Patches
Users using ECDSA signature generation should upgrade to 8.0.13 or later.
### Workarounds
There is no workarounds in jsrsasign. Update jsrsasign or use other ECDSA library.
### ACKNOWLEDGEMENT
Thanks to Jan Jancar @J08nY, Petr Svenda and Vladimir Sedlacek of Masaryk University in Czech Republic to find and report this vulnerability.
### References
https://minerva.crocs.fi.muni.cz/
https://www.npmjs.com/advisories/1505
https://github.com/kjur/jsrsasign/issues/411 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '8.0.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-g753-jx37-7xwh'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/411'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73'}, {'type': 'PACKAGE', 'url': 'https://github.com/kjur/jsrsasign'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/8.0.13'}, {'type': 'WEB', 'url': 'https://minerva.crocs.fi.muni.cz/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-561755'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1505'}] | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-29T19:33:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2fmp-7xwf-wvwr | 2021-07-29T17:47:30Z | 2020-06-03T22:02:16Z | null | ['CVE-2020-7650'] | Arbitrary File Read in Snyk Broker | All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'snyk-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.73.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7650'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609'}, {'type': 'WEB', 'url': 'https://updates.snyk.io/snyk-broker-security-fixes-152338'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-01T19:41:38Z', 'nvd_published_at': '2020-05-29T22:15:00Z'} |
1.4.0 | GHSA-j823-4qch-3rgm | 2021-10-21T21:08:16Z | 2020-06-18T14:44:46Z | null | ['CVE-2020-14060'] | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14060'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2688'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200702-0003/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-18T13:05:54Z', 'nvd_published_at': '2020-06-14T21:15:00Z'} |
1.4.0 | GHSA-v4rh-8p82-6h5w | 2021-09-22T18:35:57Z | 2020-06-22T14:39:03Z | null | ['CVE-2020-7661'] | Regular expression denial of service in url-regex | all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7661'}, {'type': 'WEB', 'url': 'https://github.com/kevva/url-regex/issues/70'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevva/url-regex'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-URLREGEX-569472'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-18T14:26:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rgh3-987h-wpmw | 2021-09-22T18:47:03Z | 2020-06-30T22:48:14Z | null | ['CVE-2016-3674'] | XML External Entity Injection in XStream | Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3674'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183180.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183208.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2822.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2823.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3575'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/03/25/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/03/28/1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/85381'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1036419'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.9'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-30T22:47:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-32xf-jwmv-9hf3 | 2022-09-21T19:31:46Z | 2020-06-05T16:13:20Z | null | ['CVE-2020-5410'] | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5410'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-cloud/spring-cloud-config'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5410'}] | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T19:07:50Z', 'nvd_published_at': '2020-06-02T17:15:00Z'} |
1.4.0 | GHSA-mhp6-pxh8-r675 | 2023-09-08T20:50:35Z | 2020-06-18T14:19:58Z | null | ['CVE-2020-7676'] | Cross site scripting in Angular | angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping `<option>` elements in `<select>` ones changes parsing behavior, leading to possibly unsanitizing code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7676'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/pull/17028'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/2df43c07779137d1bddf7f3b282a1287a8634acd'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-18T14:09:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j6w9-fv6q-3q52 | 2023-08-28T12:13:59Z | 2020-06-24T17:15:00Z | null | ['CVE-2020-8184'] | Rack allows Percent-encoded cookies to overwrite existing prefixed cookie names | A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it possible for an attacker to forge a secure or host-only cookie prefix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8184'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/895727'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8184.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4561-1/'}] | {'cwe_ids': ['CWE-20', 'CWE-784'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-24T17:14:36Z', 'nvd_published_at': '2020-06-19T17:15:00Z'} |
1.4.0 | GHSA-9722-rr68-rfpg | 2021-03-04T18:26:59Z | 2020-06-03T21:58:27Z | null | ['CVE-2020-5297'] | Upload whitelisted files to any directory in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8 to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1241" alt="Screen Shot 2020-03-31 at 12 21 10 PM" src="https://user-images.githubusercontent.com/7253840/78061230-255f5400-734a-11ea-92b4-1120f6960505.png"> | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5297'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Aug/2'}] | {'cwe_ids': ['CWE-610', 'CWE-73'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-03T21:26:41Z', 'nvd_published_at': '2020-06-03T22:15:00Z'} |
1.4.0 | GHSA-xxgp-pcfc-3vgc | 2022-07-20T14:21:17Z | 2020-06-15T19:57:48Z | null | ['CVE-2017-7536'] | Privilege Escalation in Hibernate Validator | In Hibernate Validator 5.2.x before 5.2.5.Final, 5.3.x before 5.3.6.Final, and 5.4.x before 5.4.2.Final, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue(). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hibernate:hibernate-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.5.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.hibernate:hibernate-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.6.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.5.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.hibernate:hibernate-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.2.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.4.1.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7536'}, {'type': 'WEB', 'url': 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b'}, {'type': 'WEB', 'url': 'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2808'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2809'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2810'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2811'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3141'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3454'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3458'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2740'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2741'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2742'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2743'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3817'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1465573'}, {'type': 'PACKAGE', 'url': 'https://github.com/hibernate/hibernate-validator'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101048'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039744'}] | {'cwe_ids': ['CWE-470'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T18:50:29Z', 'nvd_published_at': '2018-01-10T15:29:00Z'} |
1.4.0 | GHSA-x64g-4xx9-fh6x | 2021-10-21T21:14:28Z | 2020-06-10T20:02:58Z | null | ['CVE-2020-7226'] | Denial of Service in Cryptacular | CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.cryptacular:cryptacular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.cryptacular:cryptacular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7226'}, {'type': 'WEB', 'url': 'https://github.com/vt-middleware/cryptacular/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/pull/4685'}, {'type': 'WEB', 'url': 'https://github.com/vt-middleware/cryptacular/pull/56'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75'}, {'type': 'WEB', 'url': 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f'}, {'type': 'WEB', 'url': 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796'}, {'type': 'WEB', 'url': 'https://github.com/vt-middleware/cryptacular/commit/ec2fb65f2455c479376695e3d75d30c7f6884b3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/vt-middleware/cryptacular'}, {'type': 'WEB', 'url': 'https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153'}, {'type': 'WEB', 'url': 'https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a@%3Cdev.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547@%3Ccommits.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44@%3Cdev.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945@%3Cdev.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-10T18:23:35Z', 'nvd_published_at': '2020-01-24T15:15:00Z'} |
1.4.0 | GHSA-jv6v-fvvx-4932 | 2021-03-04T18:28:29Z | 2020-06-03T21:58:21Z | null | ['CVE-2020-5296'] | Arbitrary File Deletion vulnerability in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466.
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1241" alt="Screen Shot 2020-03-31 at 12 16 53 PM" src="https://user-images.githubusercontent.com/7253840/78060872-89354d00-7349-11ea-8c2b-5881b0a50736.png"> | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5296'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Aug/2'}] | {'cwe_ids': ['CWE-610', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-03T21:26:30Z', 'nvd_published_at': '2020-06-03T22:15:00Z'} |
1.4.0 | GHSA-f3j5-rmmp-3fc5 | 2023-09-13T18:28:28Z | 2020-06-15T18:44:48Z | null | ['CVE-2019-17267'] | Improper Input Validation in jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10 and 2.8.11.5. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17267'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2460'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/191a4cdf87b56d2ddddb77edd895ee756b7f75eb'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.3...jackson-databind-2.9.10'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d727fc681fb3828794acbefcaee31393742b4d73a29461ccd9597a8@%3Cdev.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191017-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T21:47:17Z', 'nvd_published_at': '2019-10-07T00:15:00Z'} |
1.4.0 | GHSA-4852-vrh7-28rf | 2021-11-04T17:11:46Z | 2020-06-09T00:24:57Z | null | ['CVE-2020-4038'] | Reflected XSS in GraphQL Playground | ### Impact
**directly impacted:**
- `graphql-playground-html@<1.6.22` - all unsanitized user input for `renderPlaygroundPage()`
**all of our consuming packages** of `graphql-playground-html` are impacted:
- `graphql-playground-middleware-express@<1.7.16` - unsanitized user input to `expressPlayground()`
- `graphql-playground-middleware-koa@<1.6.15` - unsanitized user input to `koaPlayground()`
- `graphql-playground-middleware-lambda@<1.7.17` - unsanitized user input to `lambdaPlayground()`
- `graphql-playground-middleware-hapi@<1.6.13` - unsanitized user input to `hapiPlayground()`
as well as ***any other packages*** that use these methods with unsanitized user input.
**not impacted:**
- `graphql-playground-electron` - uses `renderPlaygroundPage()` statically for a webpack build for electron bundle, no dynamic user input
- `graphql-playground-react` - usage of the component directly in a react application does not expose reflected XSS vulnerabilities. only the demo in `public/` contains the vulnerability, because it uses an old version of the html pacakge.
### Patches
upgrading to the above mentioned versions will solve the issue.
If you're using `graphql-playground-html` directly, then:
```
yarn add graphql-playground-html@^1.6.22
```
or
```
npm install --save graphql-playground-html@^1.6.22
```
Then, similar steps need to be taken for each middleware:
- [Upgrade Express Middleware](https://www.npmjs.com/package/graphql-playground-middleware-express#security-upgrade-steps)
- [Upgrade Koa Middleware](https://www.npmjs.com/package/graphql-playground-middleware-koa#security-upgrade-steps)
- [Upgrade Lambda Middleware](https://www.npmjs.com/package/graphql-playground-middleware-lambda#security-upgrade-steps)
- [Upgrade Hapi Middleware](https://www.npmjs.com/package/graphql-playground-middleware-hapi#security-upgrade-steps)
### Workarounds
Ensure you properly sanitize *all* user input for options you use for whatever function to initialize GraphQLPlayground:
for example, with `graphql-playground-html` and express:
```js
const { sanitizeUrl } = require('@braintree/sanitize-url');
const qs = require('querystringify');
const { renderPlaygroundPage } = require('graphql-playground-html');
module.exports = (req, res, next) => {
const { endpoint } = qs.parse(req.url)
res.html(renderPlaygroundPage({endpoint: sanitizeUrl(endpoint) })).status(200)
next()
}
```
or, with `graphql-playground-express`:
```js
const { expressPlayground } = require('graphql-playground-middleware-express');
const { sanitizeUrl } = require('@braintree/sanitize-url');
const qs = require('querystringify');
const { renderPlaygroundPage } = require('graphql-playground-html');
module.exports = (req, res, next) => {
const { endpoint } = qs.parse(req.url)
res.html(expressPlayground({endpoint: sanitizeUrl(endpoint) })).status(200)
next()
}
```
### References
- [OWASP: How to Test for CSS Reflection Attacks](https://github.com/OWASP/wstg/blob/master/document/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting.md)
- [Original Report from Cure53](https://user-images.githubusercontent.com/1368727/84191028-dfb7b980-aa65-11ea-8e18-4b8706f538e2.jpg) (jpg)
### Credits
Masato Kinugawa of Cure53
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [graphql-playground](https://github.com/prisma-labs/graphql-playground/issues/new/choose)
* Email us at [rikki.schulte@gmail.com](mailto:rikki.schulte@gmail.com)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'graphql-playground-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.22'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf'}, {'type': 'WEB', 'url': 'https://github.com/prisma-labs/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4038'}, {'type': 'WEB', 'url': 'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7'}, {'type': 'WEB', 'url': 'https://github.com/prisma-labs/graphql-playground#security-details'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-08T20:27:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hwj3-m3p6-hj38 | 2022-02-08T22:06:12Z | 2020-06-05T16:13:36Z | null | ['CVE-2020-10683'] | dom4j allows External Entities by default which might enable XXE attacks | dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'dom4j:dom4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10683'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/issues/87'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1694235'}, {'type': 'WEB', 'url': 'https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dom4j/dom4j'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/commits/version-2.0.3'}, {'type': 'WEB', 'url': 'https://github.com/dom4j/dom4j/releases/tag/version-2.1.3'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200518-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4575-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T19:38:22Z', 'nvd_published_at': '2020-05-01T19:15:00Z'} |
1.4.0 | GHSA-45hw-29x7-9x95 | 2021-07-29T17:23:08Z | 2020-06-03T22:02:11Z | null | ['CVE-2020-7651'] | Arbitrary File Read in Snyk Broker | All versions of snyk-broker before 4.79.0 are vulnerable to Arbitrary File Read. It allows partial file reads for users who have access to Snyk's internal network via patch history from GitHub Commits API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'snyk-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.79.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7651'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610'}, {'type': 'WEB', 'url': 'https://updates.snyk.io/snyk-broker-security-fixes-152338'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-01T19:40:59Z', 'nvd_published_at': '2020-05-29T21:15:00Z'} |
1.4.0 | GHSA-v8v8-6859-qxm4 | 2023-09-08T20:47:27Z | 2020-06-05T14:47:02Z | null | ['CVE-2020-8149'] | Arbitrary shell command execution in logkitty | Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'logkitty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8149'}, {'type': 'WEB', 'url': 'https://github.com/zamotany/logkitty/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/825729'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T19:33:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c9hw-wf7x-jp9j | 2022-05-02T16:27:24Z | 2020-06-15T18:51:21Z | null | ['CVE-2020-1938'] | Improper Privilege Management in Tomcat | When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: returning arbitrary files from anywhere in the web application, processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.100'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1938'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200226-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4673'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html'}, {'type': 'WEB', 'url': 'http://support.blackberry.com/kb/articleDetail?articleNumber=000062739'}] | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-15T16:10:05Z', 'nvd_published_at': '2020-02-24T22:15:00Z'} |
1.4.0 | GHSA-2m34-jcjv-45xf | 2022-09-08T14:02:49Z | 2020-06-05T16:24:28Z | null | ['CVE-2020-13596'] | XSS in Django | An issue was discovered in Django version 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13596'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.0/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200611-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4381-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4381-2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4705'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T18:32:57Z', 'nvd_published_at': '2020-06-03T14:15:00Z'} |
1.4.0 | GHSA-7hwc-46rm-65jh | 2021-09-22T18:46:25Z | 2020-06-30T22:48:24Z | null | ['CVE-2017-7957'] | Denial of service in XStream | XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7957'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2888'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2889'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/125800'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://www-prd-trops.events.ibm.com/node/715749'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3841'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100687'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039499'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/CVE-2017-7957.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-30T22:47:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2q3-4qrh-fm48 | 2021-10-21T21:08:31Z | 2020-06-18T14:44:50Z | null | ['CVE-2020-14061'] | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14061'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2698'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200702-0003/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-18T13:06:14Z', 'nvd_published_at': '2020-06-14T20:15:00Z'} |
1.4.0 | GHSA-v73w-r9xg-7cr9 | 2021-10-08T21:26:19Z | 2020-06-05T19:37:49Z | null | [] | Use of insecure jQuery version in OctoberCMS | ### Impact
Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code.
### Patches
Issue has been patched in Build 466 (v1.0.466) by applying the recommended patch from @jquery.
### Workarounds
Apply https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892 to your installation manually if unable to upgrade to Build 466.
### References
- https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
- https://jquery.com/upgrade-guide/3.5/
### For more information
If you have any questions or comments about this advisory:
* Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Moderate by the @jquery team.
### Acknowledgements
Thanks to @mrgswift for reporting the issue to the October CMS team. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-v73w-r9xg-7cr9'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/issues/5097'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-05T18:45:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6vwp-35w3-xph8 | 2021-08-30T13:21:58Z | 2020-06-10T20:02:39Z | null | ['CVE-2019-17570'] | Insecure Deserialization in Apache XML-RPC | An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code.
Apache XML-RPC is no longer maintained and this issue will not be fixed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlrpc:xmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0310'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-17570;'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/846551673bbb7ec8d691008215384bcef03a3fb004d2da845cfe88ee%401390230951%40%3Cdev.ws.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00033.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3QCRLJYQRGVTIYF4BXYRFSF3ONP3TBF/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2020/Feb/8'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4496-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4619'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/01/24/2'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-09T19:53:09Z', 'nvd_published_at': '2020-01-23T22:15:00Z'} |
1.4.0 | GHSA-3gh2-xw74-jmcw | 2021-08-25T21:54:33Z | 2020-06-05T14:52:07Z | null | ['CVE-2020-9402'] | SQL injection in Django | Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.29'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9402'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.0/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4296-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4705'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/mar/04/security-releases/'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T18:32:29Z', 'nvd_published_at': '2020-03-05T15:15:00Z'} |
1.4.0 | GHSA-g86w-v5vg-9gxf | 2021-08-25T22:01:25Z | 2020-06-05T16:11:36Z | null | ['CVE-2020-5405'] | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5405'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-cloud/spring-cloud-config/spring-cloud-config-server'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2020-5405'}] | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T19:06:58Z', 'nvd_published_at': '2020-03-05T19:15:00Z'} |
1.4.0 | GHSA-2ppp-9496-p23q | 2021-06-09T20:15:25Z | 2020-06-15T19:34:31Z | null | ['CVE-2020-5408'] | Insufficient Entropy in Spring Security | Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5408'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5408'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}] | {'cwe_ids': ['CWE-329', 'CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-11T20:44:52Z', 'nvd_published_at': '2020-05-14T18:15:00Z'} |
1.4.0 | GHSA-qr95-4mq5-r3fh | 2022-10-11T18:27:10Z | 2020-06-10T19:40:30Z | null | ['CVE-2020-4043'] | Phar unserialization vulnerability in phpMussel | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone using >= v1.0.0 < v1.6.0.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes. Upgrading to at least >= v1.6.0 (the earliest safe version) will resolve the problem. However, as multiple new major versions have been released since that version, upgrading to the latest available version is recommended, in order to protect against any potential future vulnerabilities, unknown at the time of writing this advisory.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Yes. In the package's configuration, disable archive checking by setting `check_archives` to `false` (thus avoiding execution of the affected parts of the codebase entirely).
### References
_Are there any links users can visit to find out more?_
Yes. The vulnerability is documented at [SECURITY.md](https://github.com/phpMussel/phpMussel/security/policy) and also at [#167](https://github.com/phpMussel/phpMussel/issues/167).
### For more information
If you have any questions or comments about this advisory:
* Comment at the issue linked to this advisory, or..
* Contact [the package author](https://github.com/Maikuolan).
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmussel/phpmussel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'maikuolan/phpmussel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4043'}, {'type': 'WEB', 'url': 'https://github.com/phpMussel/phpMussel/issues/167'}, {'type': 'WEB', 'url': 'https://github.com/phpMussel/phpMussel/pull/173'}, {'type': 'WEB', 'url': 'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpMussel/phpMussel'}, {'type': 'WEB', 'url': 'https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-10T19:39:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p4x4-rw2p-8j8m | 2023-05-16T16:18:26Z | 2020-06-16T22:08:06Z | null | ['CVE-2020-4054'] | Cross-site Scripting in Sanitize | When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist.
You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements:
- `iframe`
- `math`
- `noembed`
- `noframes`
- `noscript`
- `plaintext`
- `script`
- `style`
- `svg`
- `xmp`
### Impact
Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser.
### Releases
This problem has been fixed in Sanitize 5.2.1.
### Workarounds
If upgrading is not possible, a workaround is to override the default value of Sanitize's `:remove_contents` config option with the following value, which ensures that the contents of `math` and `svg` elements (among others) are removed entirely when those elements are not in the allowlist:
```ruby
%w[iframe math noembed noframes noscript plaintext script style svg xmp]
```
For example, if you currently use Sanitize's relaxed config, you can create a custom config object that overrides the default value of `:remove_contents` like this:
```ruby
custom_config = Sanitize::Config.merge(
Sanitize::Config::RELAXED,
:remove_contents => %w[iframe math noembed noframes noscript plaintext script style svg xmp]
)
```
You would then pass this custom config to Sanitize when sanitizing HTML.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in the [Sanitize repo](https://github.com/rgrove/sanitize).
- See Sanitize's [security policy](https://github.com/rgrove/sanitize/security/policy).
### Credits
Many thanks to Michal Bentkowski of Securitum for reporting this bug and helping to verify the fix.
### References
- [GHSA-p4x4-rw2p-8j8m](https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m)
- [CVE-2020-4054](https://nvd.nist.gov/vuln/detail/CVE-2020-4054)
- https://github.com/rgrove/sanitize/releases/tag/v5.2.1 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9'}, {'type': 'PACKAGE', 'url': 'https://github.com/rgrove/sanitize'}, {'type': 'WEB', 'url': 'https://github.com/rgrove/sanitize/releases/tag/v5.2.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sanitize/CVE-2020-4054.yml'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4543-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4730'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vwqq-5vrc-xw9h | 2022-03-28T22:26:27Z | 2020-06-05T14:15:51Z | null | ['CVE-2020-9488'] | Improper validation of certificate with host mismatch in Apache Log4j SMTP appender | Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9488'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-2819'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200504-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5020'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-04T19:29:20Z', 'nvd_published_at': '2020-04-27T16:15:00Z'} |
1.4.0 | GHSA-f6pc-crhh-cp96 | 2022-10-22T00:58:08Z | 2020-06-30T16:33:23Z | null | ['CVE-2020-15087'] | Privilege escalation in Presto | ### Affected
This affects Presto server installations. This does NOT affect clients such as the CLI or JDBC driver.
### Impact
Authenticated users can bypass authorization checks by directly accessing internal APIs. This impacts Presto server installations with secure internal communication configured.
This does not affect installations that have not configured secure internal communication, as these installations are inherently insecure.
### Patches
This issue has been fixed starting with PrestoSQL version 337.
### Workarounds
This issue can be mitigated by blocking network access to internal APIs on the coordinator and workers.
### References
See the Presto documentation for [Secure Internal Communication](https://trino.io/docs/current/security/internal-communication.html).
### For more information
If you have any questions or comments about this advisory:
* Join the **#security** channel on [Slack](https://trino.io/slack.html).
* Contact the security team at [security@trino.io](mailto:security@trino.io) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.prestosql:presto-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '337'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/prestosql/presto/security/advisories/GHSA-f6pc-crhh-cp96'}, {'type': 'WEB', 'url': 'https://github.com/trinodb/trino/security/advisories/GHSA-f6pc-crhh-cp96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15087'}, {'type': 'WEB', 'url': 'https://prestosql.io/docs/current/release/release-337.html#security-changes'}, {'type': 'WEB', 'url': 'https://trino.io/docs/current/release/release-337.html#security-changes'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-30T16:33:11Z', 'nvd_published_at': '2020-06-30T17:15:00Z'} |
1.4.0 | GHSA-32vw-r77c-gm67 | 2020-08-03T17:57:05Z | 2020-08-03T17:57:05Z | 2020-08-03T17:57:05Z | [] | null | Versions 0.3.2 and earlier of marked are affected by a cross-site scripting vulnerability even when sanitize:true is set. | [] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24/versions'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:58:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cpxc-67rc-c775 | 2021-01-07T23:39:30Z | 2020-08-28T20:48:12Z | null | ['CVE-2020-15154'] | Cross Site Scripting in baserCMS | baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS).
* Impact: XSS via Arbitrary script execution.
* Attack vector is: Administrator must be logged in.
* Components are: content_fields.php, content_info.php, content_options.php, content_related.php, index_list_tree.php, jquery.bcTree.js
* Tested baserCMS Version : 4.3.6 (Latest)
* Affected baserCMS Version : 4.0.0 ~ 4.3.6
* Patches : https://basercms.net/security/20200827
Found by Aquilao Null | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}] | [{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-cpxc-67rc-c775'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15154'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/7f4b905b90954e394ec10dd35bad2a5dec505371'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20200827'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T20:47:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4gpv-cvmq-6526 | 2020-08-19T22:23:09Z | 2020-08-19T22:23:09Z | 2020-08-19T22:23:09Z | [] | Denial of Service in protobufjs | Withdrawn: Duplicate of GHSA-762f-c2wg-m8c8 | [] | [{'package': {'ecosystem': 'npm', 'name': 'protobufjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.8.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'protobufjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/319576'}, {'type': 'WEB', 'url': 'https://github.com/dcodeIO/protobuf.js/blob/6.8.5/src/parse.js#L27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/605'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:21:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4mv4-gmmf-q382 | 2022-08-03T22:59:15Z | 2020-08-31T22:42:29Z | null | ['CVE-2015-6584'] | DataTable Vulnerable to Cross-Site Scripting | Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php.
## Recommendation
Update to a version greater than 1.10.8. A [fix](https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d) appears in [version 1.10.10](https://github.com/DataTables/DataTablesSrc/commits/1.10.10?after=9780a3693572757d87bf70e48bd7555faf974f28+34&branch=1.10.10&qualified_name=refs%2Ftags%2F1.10.10). | [] | [{'package': {'ecosystem': 'npm', 'name': 'datatables'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'datatables/datatables'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6584'}, {'type': 'WEB', 'url': 'https://github.com/DataTables/DataTables/issues/602'}, {'type': 'WEB', 'url': 'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d'}, {'type': 'PACKAGE', 'url': 'https://github.com/DataTables/DataTables'}, {'type': 'WEB', 'url': 'https://github.com/DataTables/DataTablesSrc/commits/1.10.10?after=9780a3693572757d87bf70e48bd7555faf974f28+34&branch=1.10.10&qualified_name=refs%2Ftags%2F1.10.10'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/5'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2015/Sep/37'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/536437/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/archive/1/536437/100/0/threaded'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g4xp-36c3-f7mr | 2020-08-31T18:07:50Z | 2020-08-31T22:47:41Z | null | ['CVE-2014-10068'] | Hidden Directories Always Served in inert | Versions 1.1.1 and earlier of `inert` are vulnerable to an information leakage vulnerability which causes files in hidden directories to be served, even when showHidden is false.
The inert directory handler always allows files in hidden directories to be served, even when `showHidden` is false.
## Recommendation
Update to version >= 1.1.1. | [] | [{'package': {'ecosystem': 'npm', 'name': 'inert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10068'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/inert/pull/15'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/inert/commit/e8f99f94da4cb08e8032eda984761c3f111e3e82'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/14'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hwch-749c-rv63 | 2021-04-12T21:34:54Z | 2020-08-31T22:46:38Z | null | ['CVE-2013-7378'] | Potential Command Injection in hubot-scripts | Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module.
### Mitigating Factors
The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts.
## Recommendation
Update hubot-scripts to version 2.4.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hubot-scripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7378'}, {'type': 'WEB', 'url': 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x3rh-m7vp-35f2 | 2021-06-15T18:11:20Z | 2020-08-05T14:52:59Z | null | ['CVE-2019-17638'] | Operation on a Resource after Expiration or Release in Jetty Server | In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.27'}, {'fixed': '9.4.30.v20200611'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.30.v20200610'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17638'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/issues/4936'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r29073905dc9139d0d7a146595694bf57bb9e35e5ec6aa73eb9c8443a@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r378e4cdec15e132575aa1dcb6296ffeff2a896745a8991522e266ad4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bdd3f7bb6820a79f9416b6667d718a06d269018619a75ce4b759318@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fc5f2ed49641ea91c433e3cd0fc3d31c0278c87b82b15c33b881415@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81f58591fb4716fb867b36956f30c7c8ad4ab3f23abc952d9d86a2a0@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8661fc8c69c647cb06153c1485d48484a833d873f75dfe45937e9de@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe1f230e87ea947593145d0072d0097ddb0af10fee1161db8ca1546c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-575561'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/08/17/1'}] | {'cwe_ids': ['CWE-672', 'CWE-675'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T20:11:29Z', 'nvd_published_at': '2020-07-09T18:15:00Z'} |
1.4.0 | GHSA-m45f-4828-5cv5 | 2020-08-19T22:39:44Z | 2020-08-19T22:39:44Z | 2020-08-19T22:39:44Z | [] | Regular Expression Denial of Service in highcharts | Withdrawn: Duplicate of GHSA-xmc8-cjfr-phx3 | [] | [{'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/793'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:56:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3j95-fjv2-3m4p | 2021-09-23T18:53:23Z | 2020-08-12T14:29:15Z | null | ['CVE-2020-16254'] | CSS Injection in Chartkick gem | The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'chartkick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16254'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/issues/546'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/chartkick'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-11T17:50:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qqj-rx4w-r3cj | 2021-09-23T19:45:13Z | 2020-08-31T22:48:44Z | null | [] | CSRF Vulnerability in jquery-ujs | Versions 1.0.3 and earlier of jquery-ujs are vulnerable to an information leakage attack that may enable attackers to launch CSRF attacks, as it allows attackers to send CSRF tokens to external domains.
When an attacker controls the href attribute of an anchor tag, or
the action attribute of a form tag triggering a POST action, the attacker can set the
href or action to " https://attacker.com". By prepending a space to the external domain, it causes jQuery to consider it a same origin request, resulting in the user's CSRF token being sent to the external domain.
## Recommendation
Upgrade jquery-ujs to version 1.0.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ujs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/49935'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jquery-ujs:20150624'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/15'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wcg-jrwf-8gg7 | 2022-05-04T02:19:36Z | 2020-08-05T14:53:16Z | null | ['CVE-2020-7699'] | Prototype Pollution in express-fileupload | This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7699'}, {'type': 'WEB', 'url': 'https://github.com/richardgirges/express-fileupload/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/richardgirges/express-fileupload/pull/237'}, {'type': 'WEB', 'url': 'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f'}, {'type': 'PACKAGE', 'url': 'https://github.com/richardgirges/express-fileupload'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200821-0003/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969'}] | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T21:20:00Z', 'nvd_published_at': '2020-07-30T09:15:00Z'} |
1.4.0 | GHSA-c3x7-gjmx-r2ff | 2021-09-23T20:59:30Z | 2020-08-31T22:57:02Z | null | ['CVE-2015-1164'] | Open Redirect in serve-static | Versions of `serve-static` prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory.
## Proof of Concept
A link to `http://example.com//www.google.com/%2e%2e` will redirect to `//www.google.com/%2e%2e`
Some browsers will interpret this as `http://www.google.com/%2e%2e`, resulting in an external redirect.
## Recommendation
Version 1.7.x: Update to version 1.7.2 or later.
Version 1.6.x: Update to version 1.6.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serve-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.6.5'}}, {'package': {'ecosystem': 'npm', 'name': 'serve-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1164'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-static/issues/26'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1181917'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99936'}, {'type': 'PACKAGE', 'url': 'https://github.com/expressjs/serve-static'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:serve-static:20150113'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/35'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/72064'}] | {'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9cw2-jqp5-7x39 | 2021-09-23T20:56:39Z | 2020-08-31T22:52:52Z | null | ['CVE-2014-3743'] | Multiple Content Injection Vulnerabilities in marked | Versions 0.3.0 and earlier of `marked` are affected by two cross-site scripting vulnerabilities, even when `sanitize: true` is set.
The attack vectors for this vulnerability are GFM Codeblocks and JavaScript URLs.
## Recommendation
Upgrade to version 0.3.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1850'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/22'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5wg4-74h6-q47v | 2021-07-29T20:49:30Z | 2020-08-20T14:38:49Z | null | ['CVE-2020-7689'] | Integer Overflow or Wraparound and Use of a Broken or Risky Cryptographic Algorithm in bcrypt | In bcrypt (npm package) before version 5.0.0, data is truncated wrong when its length is greater than 255 bytes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bcrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7689'}, {'type': 'WEB', 'url': 'https://github.com/kelektiv/node.bcrypt.js/issues/776'}, {'type': 'WEB', 'url': 'https://github.com/kelektiv/node.bcrypt.js/pull/806'}, {'type': 'WEB', 'url': 'https://github.com/kelektiv/node.bcrypt.js/pull/807'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BCRYPT-572911'}] | {'cwe_ids': ['CWE-190', 'CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-20T14:37:17Z', 'nvd_published_at': '2020-07-01T14:15:00Z'} |
1.4.0 | GHSA-q6j3-c4wc-63vw | 2021-09-23T18:50:16Z | 2020-08-11T14:54:40Z | null | [] | CSRF tokens leaked in URL by canned query form | ### Impact
The HTML form for a read-only canned query includes the hidden CSRF token field added in #798 for writable canned queries (#698).
This means that submitting those read-only forms exposes the CSRF token in the URL - for example on https://latest.datasette.io/fixtures/neighborhood_search submitting the form took me to:
https://latest.datasette.io/fixtures/neighborhood_search?text=down&csrftoken=CSRFTOKEN-HERE
This token could potentially leak to an attacker if the resulting page has a link to an external site on it and the user clicks the link, since the token would be exposed in the referral logs.
### Patches
A fix for this issue has been released in Datasette 0.46.
### Workarounds
You can fix this issue in a Datasette instance without upgrading by copying the [0.46 query.html template](https://raw.githubusercontent.com/simonw/datasette/0.46/datasette/templates/query.html) into a custom `templates/` directory and running Datasette with the `--template-dir=templates/` option.
### References
Issue 918 discusses this in details: https://github.com/simonw/datasette/issues/918
### For more information
Contact swillison at gmail with any questions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'datasette'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.46'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/simonw/datasette/security/advisories/GHSA-q6j3-c4wc-63vw'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette/issues/918'}, {'type': 'WEB', 'url': 'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b'}, {'type': 'PACKAGE', 'url': 'https://github.com/simonw/datasette'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-DATASETTE-598229'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-10T22:36:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9x4c-63pf-525f | 2022-06-01T21:58:48Z | 2020-08-20T14:38:24Z | null | ['CVE-2020-15142'] | Arbitrary Code Generation | ### Impact
Clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution.
Giving this a CVSS of 8.0 (high) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:U/RC:C .
### Patches
Fix will be included in version 0.5.3
### Workarounds
Inspect OpenAPI documents before generating, or inspect generated code before executing.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues)
* Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'openapi-python-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-9x4c-63pf-525f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15142'}, {'type': 'WEB', 'url': 'https://github.com/openapi-generators/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'}, {'type': 'PACKAGE', 'url': 'https://github.com/openapi-generators/openapi-python-client'}, {'type': 'WEB', 'url': 'https://github.com/openapi-generators/openapi-python-client/releases/tag/v.0.5.3'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13'}, {'type': 'WEB', 'url': 'https://pypi.org/project/openapi-python-client/'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-14T16:09:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hrpq-r399-whgw | 2023-09-11T23:01:24Z | 2020-08-25T23:40:53Z | null | ['CVE-2020-7710'] | Sandbox Breakout / Arbitrary Code Execution in safe-eval | All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through Error objects. This may allow attackers to execute arbitrary code in the system.
Evaluating the payload
```js
(function (){
var ex = new Error
ex.__proto__ = null
ex.stack = {
match: x => {
return x.constructor.constructor("throw process.env")()
}
}
return ex
})()
```
prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'safe-eval'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7710'}, {'type': 'WEB', 'url': 'https://github.com/hacksparrow/safe-eval/issues/19'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1322'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-25T21:20:22Z', 'nvd_published_at': '2020-08-21T10:15:00Z'} |
1.4.0 | GHSA-m273-wwfv-h6jp | 2020-08-31T18:07:38Z | 2020-08-31T22:44:33Z | null | ['CVE-2014-10066'] | Directory Traversal in fancy-server | Versions 0.1.4 and earlier of fancy-server are vulnerable to a directory traversal attack.
Standard attack vectors such as `../` will allow an attacker to read files outside of the served directory.
## Recommendation
Upgrade to version 0.1.4 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'fancy-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10066'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/9'}, {'type': 'WEB', 'url': 'http://en.wikipedia.org/wiki/Directory_traversal_attack'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p56r-jr4p-4wgh | 2020-08-03T18:16:37Z | 2020-08-03T18:16:37Z | 2020-08-03T18:16:37Z | [] | Withdrawn | Withdrawn: duplicate of GHSA-wjr4-2jgw-hmv8 | [] | [{'package': {'ecosystem': 'npm', 'name': 'whereis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:36:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-43m5-c88r-cjvv | 2021-01-07T23:39:51Z | 2020-08-26T18:55:38Z | null | ['CVE-2020-15156'] | XSS due to lack of CSRF validation for replying/publishing | ### Impact
Due to lack of CSRF validation, a logged in user is potentially vulnerable to an XSS attack which could allow a third party to post on their behalf on the forum.
### Patches
Upgrade to the latest version v0.7.0
### Workarounds
You can cherry-pick the following commit: [https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618](https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618)
### References
Visit https://community.nodebb.org if you have any questions about this issue or on how to patch / upgrade your instance. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodebb-plugin-blog-comments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/psychobunny/nodebb-plugin-blog-comments/security/advisories/GHSA-43m5-c88r-cjvv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15156'}, {'type': 'WEB', 'url': 'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/nodebb-plugin-blog-comments'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-26T18:55:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-chgg-rrmv-5q7x | 2020-08-03T18:05:48Z | 2020-08-03T18:05:48Z | 2020-08-03T18:05:48Z | [] | Withdrawn | Withdrawn: Duplicate of GHSA-vgrx-w6rg-8fqf | [] | [{'package': {'ecosystem': 'npm', 'name': 'jwt-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:18:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c6h2-mpc6-232h | 2020-08-27T22:27:20Z | 2020-08-27T22:26:15Z | 2020-08-27T22:26:15Z | [] | Command Injection in dns-sync | Withdrawn: Duplicate of GHSA-jcw8-r9xm-32c6 | [] | [{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/153'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/523'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:16:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vjfr-p6hp-jqqw | 2021-09-23T21:01:14Z | 2020-08-31T23:00:10Z | null | ['CVE-2015-4130'] | Command Injection in ungit | Versions of `ungit` prior to 0.9.0 are affected by a command injection vulnerability in the `url` parameter.
## Recommendation
Update version 0.9.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ungit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4130'}, {'type': 'WEB', 'url': 'https://github.com/FredrikNoren/ungit/issues/486'}, {'type': 'PACKAGE', 'url': 'https://github.com/FredrikNoren/ungit'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/40'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c5j4-vw9m-xc95 | 2020-08-27T22:44:08Z | 2020-08-27T22:44:08Z | 2020-08-27T22:44:08Z | [] | Open Redirect in hekto | Withdrawn: Duplicate of GHSA-qmm9-x5gr-4gfm | [] | [{'package': {'ecosystem': 'npm', 'name': 'hekto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/herber/hekto/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/320693'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/669'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:45:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-whrh-9j4q-g7ph | 2021-09-23T18:38:11Z | 2020-08-05T21:43:19Z | null | [] | CSRF Vulnerability in polaris-website | ### Impact
CSRF vulnerability:
In some very specific circumstances, an attacker would be able to update your settings.
Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings.
### Patches
As of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Polaris-React](https://github.com/polaris-rbx/polaris-react)
* Email us at [hi@nezto.re](mailto:hi@nezto.re)
* Join our discord (preferred): https://discord.gg/QevWabU | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'polaris-website'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph'}, {'type': 'WEB', 'url': 'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b'}, {'type': 'PACKAGE', 'url': 'https://github.com/polaris-rbx/Polaris-React'}, {'type': 'WEB', 'url': 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/csrf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473'}, {'type': 'WEB', 'url': 'https://www.barracuda.com/glossary/csrf'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T21:42:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-82mg-x548-gq3j | 2021-09-23T19:58:02Z | 2020-08-31T22:49:46Z | null | ['CVE-2015-7294'] | LDAP Injection in ldapauth | Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter.
## Recommendation
ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ldapauth-fork'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ldapauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.2.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7294'}, {'type': 'WEB', 'url': 'https://github.com/vesse/node-ldapauth-fork/issues/21'}, {'type': 'WEB', 'url': 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/vesse/node-ldapauth-fork'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/18'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/19'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/18/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/18/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09/21/2'}] | {'cwe_ids': ['CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:59Z', 'nvd_published_at': None} |