schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
24 values
aliases
stringlengths
2
20
summary
stringlengths
9
130
details
stringlengths
34
11.7k
severity
stringlengths
2
92
affected
stringlengths
73
3.22k
references
stringlengths
64
21.2k
database_specific
stringlengths
131
202
1.4.0
GHSA-f5w6-r7rg-mcgq
2021-09-23T21:03:25Z
2020-08-31T23:01:13Z
null
['CVE-2014-8882']
Regular Expression Denial of Service in validator
Versions of `validator` prior to 3.22.1 are affected by a regular expression denial of service vulnerability in the `isURL` method. ## Recommendation Update to version 3.22.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.22.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8882'}, {'type': 'WEB', 'url': 'https://github.com/chriso/validator.js/issues/152#issuecomment-48107184'}, {'type': 'PACKAGE', 'url': 'https://github.com/chriso/validator.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:validator:20130705'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/42'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:58Z', 'nvd_published_at': None}
1.4.0
GHSA-cf8j-64h9-6q58
2021-09-23T18:57:05Z
2020-08-18T17:30:25Z
null
['CVE-2020-12480']
CSRF in Play Framework
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12480'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10285'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'}, {'type': 'PACKAGE', 'url': 'https://github.com/playframework/playframework'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-18T17:30:12Z', 'nvd_published_at': None}
1.4.0
GHSA-6gg3-pmm7-97xc
2021-01-07T23:40:43Z
2020-08-19T21:05:03Z
null
['CVE-2020-15119']
DOM-based XSS in auth0-lock
### Overview Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection. - For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification code input. - For Enterprise connection, the value of the input (IdP Domain) from the Enterprise connection setup screen (Auth0 Dashboard) is displayed back to the user when the `lock` widget opens. When Passwordless or Enterprise connection is used, the application and its users might be exposed to cross-site scripting (XSS) attacks. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using auth0-lock - You are using Passwordless or Enterprise connection mode ### How to fix that? Upgrade to version `11.26.3` ### Will this update impact my users? The fix provided in patch will not affect your users. ### Credit https://github.com/mvisat
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.26.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.25.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15119'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T21:02:01Z', 'nvd_published_at': None}
1.4.0
GHSA-qrg3-f6h6-vq8q
2020-08-19T22:15:57Z
2020-08-19T22:15:57Z
2020-08-19T22:15:57Z
[]
Denial of Service in https-proxy-agent
Withdrawn: Duplicate of GHSA-8g7p-74h8-hg48
[]
[{'package': {'ecosystem': 'npm', 'name': 'https-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/319532'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:15:10Z', 'nvd_published_at': None}
1.4.0
GHSA-r587-7jh2-4qr3
2022-09-09T20:56:50Z
2020-08-26T19:32:50Z
null
[]
Server secret was included in static assets and served to clients
### Impact Server JWT signing secret was included in static assets and served to clients. This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**. ### Background Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`. Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood. ### Patches Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components. Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend). ### Workarounds Users shall upgrade if they use Flood's builtin authentication system. While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments. > Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication. Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions. ### References [Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions) [Introduction to JSON Web Tokens](https://jwt.io/introduction/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [issue tracker](https://github.com/jesec/flood/issues) * Email us at [jc@linux.com](mailto:jc@linux.com)
[]
[{'package': {'ecosystem': 'npm', 'name': 'flood'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3'}, {'type': 'WEB', 'url': 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'}, {'type': 'WEB', 'url': 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jesec/flood'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-26T19:32:37Z', 'nvd_published_at': None}
1.4.0
GHSA-j7wp-vjj6-cp5m
2021-09-23T18:55:46Z
2020-08-11T19:40:10Z
null
[]
Cross-Site Scripting in @progress/kendo-angular-editor
Kendo UI for Angular Editor Component (npm package @progress/kendo-angular-editor) before version 1.2.3 is vulnerable to Cross-Site Scripting. When the Editor content contains potentially malicious scripts in element event handlers, they get executed. Adding the following content to the Editor value demonstrates the issue: `<img src="" onerror=alert(document.domain)>`.
[]
[{'package': {'ecosystem': 'npm', 'name': '@progress/kendo-angular-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/telerik/kendo-angular-editor'}, {'type': 'WEB', 'url': 'https://stackblitz.com/edit/angular-6xzuzp-tef7lb?file=app/app.component.ts'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1549'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-11T19:39:52Z', 'nvd_published_at': None}
1.4.0
GHSA-q9r2-f3vc-rjg8
2020-08-19T22:28:51Z
2020-08-19T22:28:51Z
2020-08-19T22:28:51Z
[]
Command Injection in macaddress
Withdrawn: Duplicate of GHSA-pp57-mqmh-44h7
[]
[{'package': {'ecosystem': 'npm', 'name': 'macaddress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/319467'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:32:29Z', 'nvd_published_at': None}
1.4.0
GHSA-mpcx-8qqw-rmcq
2020-08-19T21:51:20Z
2020-08-19T21:51:20Z
2020-08-19T21:51:20Z
[]
SQL Injection in waterline-sequel
Withdrawn: Duplicate of GHSA-cgpp-wm2h-6hqx
[]
[{'package': {'ecosystem': 'npm', 'name': 'waterline-sequel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cgpp-wm2h-6hqx'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:20:17Z', 'nvd_published_at': None}
1.4.0
GHSA-363h-vj6q-3cmj
2021-09-23T19:28:27Z
2020-08-31T22:45:35Z
null
['CVE-2014-4671']
Rosetta-Flash JSONP Vulnerability in hapi
This description taken from the pull request provided by Patrick Kettner. Versions 6.1.0 and earlier of hapi are vulnerable to a rosetta-flash attack, which can be used by attackers to send data across domains and break the browser same-origin-policy. ## Recommendation - Update hapi to version 6.1.1 or later. Alternatively, a solution previously implemented by Google, Facebook, and Github is to prepend callbacks with an empty inline comment. This will cause the flash parser to break on invalid inputs and prevent the issue, and how the issue has been resolved internally in hapi.
[]
[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4671'}, {'type': 'WEB', 'url': 'https://github.com/spumko/hapi/pull/1766'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/commit/d47f57abf23bdaa84f61aed2bac94ae5f358afb7'}, {'type': 'WEB', 'url': 'https://github.com/patrickkettner'}, {'type': 'PACKAGE', 'url': 'https://github.com/spumko/hapi'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/12'}, {'type': 'WEB', 'url': 'http://helpx.adobe.com/security/products/flash-player/apsb14-17.html'}, {'type': 'WEB', 'url': 'http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0860.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59774'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59837'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-201407-02.xml'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/68457'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1030533'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:45Z', 'nvd_published_at': None}
1.4.0
GHSA-9xgp-hfw7-73rq
2020-08-19T21:30:04Z
2020-08-19T21:30:04Z
2020-08-19T21:30:04Z
[]
Authentication Weakness in keystone
There is an authentication weakness vulnerability in keystone before version 0.3.16. Due to a bug in the the default sign in functionality, incomplete email addresses could be matched. A correct password is still required to complete sign in.
[]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/1085'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:21:31Z', 'nvd_published_at': None}
1.4.0
GHSA-wvhm-4hhf-97x9
2021-01-07T23:41:49Z
2020-08-07T22:28:30Z
null
['CVE-2020-15138']
Cross-Site Scripting in Prism
### Impact The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). ### Patches This problem is patched in v1.21.0. ### Workarounds To workaround the issue without upgrading, [disable the easing preview](https://prismjs.com/plugins/previewers/#disabling-a-previewer) on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround. ### References The vulnerability was introduced by this [commit](https://github.com/PrismJS/prism/commit/4303c940d3d3a20e8ce7635bf23331c75060f5c5) on Sep 29, 2015 and fixed by [Masato Kinugawa](https://twitter.com/kinugawamasato) (#2506). ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/PrismJS/prism/issues).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.21.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15138'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c'}, {'type': 'WEB', 'url': 'https://prismjs.com/plugins/previewers/#disabling-a-previewer'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-07T16:19:07Z', 'nvd_published_at': None}
1.4.0
GHSA-5cp4-xmrw-59wf
2021-10-08T21:25:58Z
2020-08-05T21:47:02Z
null
[]
XSS via JQLite DOM manipulation functions in AngularJS
### Summary XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`. ### Description JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`. One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218). If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM. This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/). ### Proof of concept ```javascript const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>`  ``` Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is. As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute. ```javascript angular.element(document).append(inertPayload); ``` This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`. ### Patches The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2). ### Workarounds Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended. ### References https://github.com/advisories/GHSA-mhp6-pxh8-r675 https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://snyk.io/vuln/SNYK-JS-ANGULAR-570058
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mhp6-pxh8-r675'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T21:46:46Z', 'nvd_published_at': None}
1.4.0
GHSA-jw37-5gqr-cf9j
2021-01-12T19:30:42Z
2020-08-17T21:44:54Z
null
['CVE-2020-15152']
Server-Side Request Forgery in ftp-srv
### Background The FTP protocol creates two connections, one for commands and one for transferring data. This second data connection can be created in two ways, on the server by sending the PASV command, or on the client by sending the PORT command. The PORT command sends the IP and port for the server to connect to the client with. ### Issue Since the client can send an arbitrary IP with the PORT command, this can be used to cause the server to make a connection elsewhere. ### Patches * _fix: disallow PORT connections to alternate hosts_: e449e75219d918c400dec65b4b0759f60476abca Deprecation notices have been published for older versions. ### Workarounds Blacklisting the FTP Command `PORT` will prevent the server from exposing this behaviour through active connections until a fix is applied. ```js const ftp = new FtpSrv({ blacklist: ['PORT'] }); ``` ### References https://www.npmjs.com/advisories/1445 ### Credits Thank you to; @trs for fixing it @andreeleuterio for reporting it to us for an anonymous user (Vincent) through the NPM platform @quiquelhappy for bringing it to our attention after it slipped through the cracks during Christmas ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/autovance/ftp-srv](https://github.com/autovance/ftp-srv) * Email us directly; security@autovance.com
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.19.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-jw37-5gqr-cf9j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15152'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1445'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ftp-srv'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-17T21:42:37Z', 'nvd_published_at': '2020-08-17T22:15:00Z'}
1.4.0
GHSA-28gr-86hg-r48w
2021-09-23T19:27:57Z
2020-08-31T22:43:31Z
null
['CVE-2013-3364']
Unauthenticated Remote Command Injection in ep_imageconvert
ep_imageconvert is a plugin for [Etherpad Lite](https://github.com/ether/etherpad-lite). ep_imageconvert <= 0.0.2 is vulnerable to remote command injection. Authentication is not required for remote exploitation. ## Recommendation Update to version 0.0.3 or greater.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ep_imageconvert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3364'}, {'type': 'WEB', 'url': 'https://github.com/redhog/ep_imageconvert/pull/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/redhog/ep_imageconvert'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ep_imageconvert:20130506'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/7'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:33Z', 'nvd_published_at': None}
1.4.0
GHSA-69rr-wvh9-6c4q
2021-09-23T21:00:00Z
2020-08-31T22:58:04Z
null
['CVE-2014-3744']
Directory Traversal in st
Versions of `st` prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused `%2e` to be interpreted as `.` by the filesystem, resulting the potential for an attacker to read sensitive files on the server. ## Recommendation Update to version 0.2.5 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'st'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3744'}, {'type': 'PACKAGE', 'url': 'https://github.com/isaacs/st'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/st#security-status'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/36'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/67389'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:44Z', 'nvd_published_at': None}
1.4.0
GHSA-h29r-4vqp-8jxf
2020-08-20T17:21:46Z
2020-08-20T17:21:46Z
2020-08-20T17:21:46Z
[]
Cross-Site Scripting in keystone
Withdrawn: Duplicate of GHSA-7qcx-jmrc-h2rr
[]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/8ecb80960ffd2ae2f241b0bbb62367821a79ff63'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/980'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T22:03:28Z', 'nvd_published_at': None}
1.4.0
GHSA-f93j-hmcr-jcwh
2023-08-25T21:39:29Z
2020-08-19T16:45:49Z
null
['CVE-2015-4410']
Moped Rubygem Data Injection Vulnerability
`The Moped::BSON::ObjecId.legal?` method in rubygem-moped before [commit dd5a7c14b5d2e466f7875d079af71ad19774609b](https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24) allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'moped'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'moped'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410'}, {'type': 'WEB', 'url': 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1229757'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongoid/moped/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml'}, {'type': 'WEB', 'url': 'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html'}, {'type': 'WEB', 'url': 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2015/q2/653'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228085849/http://www.securityfocus.com/bid/75045'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html'}, {'type': 'WEB', 'url': 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/06/3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-14T16:47:12Z', 'nvd_published_at': None}
1.4.0
GHSA-wx84-69jh-jjp2
2020-08-03T18:22:36Z
2020-08-03T18:22:36Z
2020-08-03T18:22:36Z
[]
Withdrawn
Withdrawn: duplicate of GHSA-2m39-62fm-q8r3
[]
[{'package': {'ecosystem': 'npm', 'name': 'sshpk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sshpk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}], 'versions': ['1.14.0']}]
[{'type': 'WEB', 'url': 'https://hackerone.com/reports/319593'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:13:33Z', 'nvd_published_at': None}
1.4.0
GHSA-p4pj-9g59-4ppv
2021-11-19T15:41:13Z
2020-08-19T21:04:25Z
null
['CVE-2020-15143']
Remote Code Execution in SyliusResourceBundle
### Impact Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`. ### Example ```yaml foo: path: /foo/{id} defaults: _sylius: repository: method: findSome arguments: entity: "expr:service('repository').find($id)" ``` In this case, `$id` can be prepared in a way that calls other services. If you visit `/foo/"~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database. To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language. ### Patches This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched. ### Workarounds The fix requires adding `addslashes` in `ParametersParser::parseRequestValueExpression` to sanitize user input before evaluating it using the expression language. ```php - return is_string($variable) ? sprintf('"%s"', $variable) : $variable; + return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable; ``` ### Acknowledgements This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot! ### For more information If you have any questions or comments about this advisory: * Email us at [security@sylius.com](mailto:security@sylius.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-p4pj-9g59-4ppv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15143'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/commit/73ed8b8bb083f36c30ad7c3cec336f65d6a80650'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/SyliusResourceBundle'}]
{'cwe_ids': ['CWE-74', 'CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T20:30:42Z', 'nvd_published_at': '2020-08-20T01:17:00Z'}
1.4.0
GHSA-44g9-w23c-5rw7
2021-09-23T20:57:48Z
2020-08-31T22:53:54Z
null
['CVE-2014-8883']
Directory Traversal in nhouston
All versions of the static file server module nhouston are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory. ## Recommendation It is recommended that a different module be used, as we have been unable to reacher the maintainer of this module. We will continue to reach out to them, and if an update becomes available that fixes the issue, we will update this advisory accordingly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nhouston'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8883'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:nhouston:20141114'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/25'}, {'type': 'WEB', 'url': 'http://en.wikipedia.org/wiki/Directory_traversal_attack'}]
{'cwe_ids': ['CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:17Z', 'nvd_published_at': None}
1.4.0
GHSA-3fw8-66wf-pr7m
2021-04-07T19:56:51Z
2020-08-31T22:41:27Z
null
['CVE-2013-7370']
methodOverride Middleware Reflected Cross-Site Scripting in connect
Connect is a stack of middleware that is executed in order in each request. The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override". Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser. ###Example: ``` ~ curl "localhost:3000" -d "_method=<script src=http://nodesecurity.io/xss.js></script>" Cannot <SCRIPT SRC=HTTP://NODESECURITY.IO/XSS.JS></SCRIPT> / ``` ## Recommendation Update to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.
[]
[{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/issues/831'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-7370'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/21/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:25Z', 'nvd_published_at': None}
1.4.0
GHSA-6898-wx94-8jq8
2023-09-08T20:38:35Z
2020-08-31T22:50:48Z
null
['CVE-2013-7381']
Potential Command Injection in libnotify
Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify. Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this. ### Example ```js var libnotify = require('libnotify') libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () { console.log(arguments); }) ``` Special thanks to Neal Poole for submitting the pull request to fix this issue. ## Recommendation Update to version 1.0.4 or greater
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'libnotify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7381'}, {'type': 'WEB', 'url': 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448'}, {'type': 'PACKAGE', 'url': 'https://github.com/mytrile/node-libnotify'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/20'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:04Z', 'nvd_published_at': None}
1.4.0
GHSA-9vxc-g2jx-qj3p
2021-09-23T21:00:28Z
2020-08-31T22:59:07Z
null
['CVE-2013-7379']
API Admin Auth Weakness in tomato
Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests. ## Details The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access. Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key. ## Proof of Concept This is the snippet of code that does the comparison to authorize requests. ``` if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) { ``` For an access_key that is set to anything that includes the letter 'a' the following request would be authorized. ``` $ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a" { "cmd": "ls", "path": ".", "stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n", "stderr": "" } ``` ## Recommendation Update to version 0.0.6 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'tomato'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379'}, {'type': 'WEB', 'url': 'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'}, {'type': 'PACKAGE', 'url': 'https://github.com/leizongmin/tomato'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/38'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:49Z', 'nvd_published_at': None}
1.4.0
GHSA-f9vc-q3hh-qhfv
2020-08-31T18:08:29Z
2020-08-31T22:56:00Z
null
['CVE-2014-10065']
Content Injection in remarkable
Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used. ### Proof of Concept Markdown Source: ``` [link](<javascript:alert(1)>) ``` Rendered HTML: ``` <a href="javascript:alert(1)">link</a> ``` ## Recommendation Update to version 1.4.1 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10065'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/97'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/commit/d54ed887f4997221cd7cb9790e953a83c504de36'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/30'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:29Z', 'nvd_published_at': None}
1.4.0
GHSA-9m4x-8w29-r78g
2023-09-13T19:18:38Z
2020-08-13T18:54:19Z
null
['CVE-2020-8205']
Server-Side Request Forgery in @uppy/companion
The @uppy/companion npm package before versions 1.13.2 and 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.0'}, {'fixed': '2.0.0-alpha.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-alpha.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8205'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/pull/2322/commits/dbf2f4f30aeaf3bcc5971bb867bb0b5984084828'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/891270'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/blob/master/CHANGELOG.md#1161'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-13T18:54:01Z', 'nvd_published_at': None}
1.4.0
GHSA-673x-f5wx-fxpw
2021-01-07T23:39:00Z
2020-08-28T21:45:15Z
null
['CVE-2020-15159']
Cross Site Scripting and RCE in baserCMS
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE). * Impact: XSS to RCE via Arbitrary file upload. * Attack vector is: Administrator must be logged in. * Components are: ThemeFilesController.php, UploaderFilesController.php. * Tested baserCMS Version : 4.3.6 (Latest) * Affected baserCMS Version : 4.2.0 ~ 4.3.6 (XSS), 3.0.10 ~ 4.3.6 (RCE) * Patches : https://basercms.net/security/20200827 Found by Vulnerability Research team in [Flatt Security Inc.](https://flatt.tech/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}]
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20200827'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:44:58Z', 'nvd_published_at': None}
1.4.0
GHSA-x4rf-4mqf-cm8w
2020-08-19T22:44:23Z
2020-08-19T22:44:22Z
2020-08-19T22:44:22Z
[]
Open Redirect in ecstatic
Withdrawn: Duplicate of GHSA-9q64-mpxx-87fg
[]
[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/issues/259'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/be6fc25a826f190b67f4d16158f9d67899e38ee4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/830/versions'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:09:41Z', 'nvd_published_at': None}
1.4.0
GHSA-5j4m-89xf-mf5p
2020-08-27T22:58:46Z
2020-08-27T22:58:46Z
2020-08-27T22:58:46Z
[]
Missing Origin Validation in parcel-bundler
Withdrawn: Duplicate of GHSA-37q6-576q-vgr7
[]
[{'package': {'ecosystem': 'npm', 'name': 'parcel-bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/issues/1783'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/pull/1794'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/721'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:44:00Z', 'nvd_published_at': None}
1.4.0
GHSA-w4pj-7p68-3vgv
2023-01-31T01:29:13Z
2020-08-05T14:52:44Z
null
['CVE-2020-11083']
Stored XSS in October
### Impact A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field. ### Patches Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission. ### Workarounds Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin). ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png">
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'}, {'type': 'WEB', 'url': 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Aug/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-28T19:36:22Z', 'nvd_published_at': '2020-07-14T21:15:00Z'}
1.4.0
GHSA-hxcc-f52p-wc94
2021-09-23T18:50:59Z
2020-08-11T17:21:13Z
null
['CVE-2020-7660']
Insecure serialization leading to RCE in serialize-javascript
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of `<UID>`. The UID has a keyspace of approximately 4 billion making it a realistic network attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ecosystem_specific': {'affected_functions': ['serialize-javascript']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd'}, {'type': 'PACKAGE', 'url': 'https://github.com/yahoo/serialize-javascript'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-11T14:14:51Z', 'nvd_published_at': None}
1.4.0
GHSA-mqm2-cgpr-p4m6
2022-04-29T20:26:19Z
2020-08-07T22:27:41Z
null
['CVE-2020-14001']
Unintended read access in kramdown gem
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'kramdown'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mqm2-cgpr-p4m6'}, {'type': 'PACKAGE', 'url': 'https://github.com/gettalong/kramdown'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kramdown/CVE-2020-14001.yml'}, {'type': 'WEB', 'url': 'https://kramdown.gettalong.org'}, {'type': 'WEB', 'url': 'https://kramdown.gettalong.org/news.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/kramdown'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200731-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4562-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4743'}]
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-07T22:27:22Z', 'nvd_published_at': '2020-07-17T16:15:00Z'}
1.4.0
GHSA-4r3m-j6x5-48m3
2021-01-07T23:39:22Z
2020-08-28T21:20:42Z
null
['CVE-2020-15155']
Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}]
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20200827'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:20:29Z', 'nvd_published_at': None}
1.4.0
GHSA-7257-96vg-qf6x
2021-11-19T15:31:10Z
2020-08-21T17:03:24Z
null
['CVE-2020-15147']
Remote Code Execution in Red Discord Bot
### Impact A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. ### Patches This critical exploit has been fixed on version ``3.3.12`` & ``3.4``. ### Workarounds Unloading the Streams module with ``unload streams`` can render this exploit not accessible. We still highly recommend updating to ``3.3.12`` or ``3.4`` to completely patch this issue. ### References * https://github.com/Cog-Creators/Red-DiscordBot/pull/4183 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Red-DiscordBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.11'}}]
[{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15147'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/'}]
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T17:02:40Z', 'nvd_published_at': '2020-08-21T18:15:00Z'}
1.4.0
GHSA-h6m7-j4h3-9rf5
2021-11-19T15:36:47Z
2020-08-19T19:52:30Z
null
['CVE-2020-15146']
Remote Code Execution in SyliusResourceBundle
### Impact Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`. ### Example ```yaml sylius_grid: grids: foo: fields: bar: options: baz: "expr:service('sylius.repository.product').find($id)" ``` In this case, `$id` can be prepared in a way that calls other services. If you visit `/route?id="~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database. To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language. ### Patches This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched. ### Workarounds The fix requires adding `addslashes` in `OptionsParser::parseOptionExpression` to sanitize user input before evaluating it using the expression language. ```php - return is_string($variable) ? sprintf('"%s"', $variable) : $variable; + return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable; ``` ### Acknowledgements This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot! ### For more information If you have any questions or comments about this advisory: * Email us at [security@sylius.com](mailto:security@sylius.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/commit/73d9aba182947473a5935b31caf65ca263091e00'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/SyliusResourceBundle'}]
{'cwe_ids': ['CWE-74', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T19:50:49Z', 'nvd_published_at': '2020-08-20T01:17:00Z'}
1.4.0
GHSA-w542-cpp9-r3g7
2023-07-05T20:19:49Z
2020-08-05T14:53:34Z
null
['CVE-2020-16252']
Field Test CSRF vulnerability
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2. ## Impact The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected. A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user. All users running an affected release should upgrade immediately. ## Technical Details Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'field_test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252'}, {'type': 'WEB', 'url': 'https://github.com/ankane/field_test/issues/28'}, {'type': 'WEB', 'url': 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/field_test'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T14:47:06Z', 'nvd_published_at': None}
1.4.0
GHSA-pwqf-9h7j-7mv8
2021-09-23T19:05:25Z
2020-08-21T16:25:26Z
null
['CVE-2020-6174']
Incorrect threshold signature computation in TUF
### Impact Metadadata signature verification, as used in `tuf.client.updater`, counted each of multiple signatures with identical authorized keyids separately towards the threshold. Therefore, an attacker with access to a valid signing key could create multiple valid signatures in order to meet the minimum threshold of keys before the metadata was considered valid. The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue. ### Patches A [fix](https://github.com/theupdateframework/tuf/pull/974) is available in version [0.12.2](https://github.com/theupdateframework/tuf/releases/tag/v0.12.2) or newer. ### Workarounds No workarounds are known for this issue. ### References * [CVE-2020-6174](https://nvd.nist.gov/vuln/detail/CVE-2020-6174) * Pull request resolving the issue [PR 974](https://github.com/theupdateframework/tuf/pull/974)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ecosystem_specific': {'affected_functions': ['tuf.sig.verify']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-pwqf-9h7j-7mv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6174'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/974'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}]
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:25:02Z', 'nvd_published_at': None}
1.4.0
GHSA-xw5p-hw6r-2j98
2020-08-03T21:25:40Z
2020-08-05T14:53:22Z
null
['CVE-2020-8192']
Denial of service in fastify
A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.
[]
[{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/903521'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T21:25:40Z', 'nvd_published_at': None}
1.4.0
GHSA-4x7c-cx64-49w8
2020-08-19T22:06:03Z
2020-08-19T22:06:03Z
2020-08-19T22:06:03Z
[]
Regular Expression Denial of Service in is-my-json-valid
Withdrawn: Duplicate of GHSA-f522-ffg8-j8r6
[]
[{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:28:24Z', 'nvd_published_at': None}
1.4.0
GHSA-wwrj-35w6-77ff
2021-01-07T23:42:18Z
2020-08-04T14:54:08Z
null
['CVE-2020-15135']
CSRF vulnerability in save-server
### Impact Versions prior to version v1.05 are affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version v1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing [Double submit](https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f). The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including: - Upload file - Delete file - Add redirect #### If you are logged in as root, this attack is significantly more severe. They can (in addition to the above): - Create users - Delete users - Update users (change password) If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password. Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be sure they succeeded. ### Patches This issue has been patched. Update to version v1.0.7 or above to benefit from this fix. ### Workarounds None. You should upgrade. ### References What is CSRF: https://owasp.org/www-community/attacks/csrf Fix type: https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f ### For more information If you have any questions or comments about this advisory: * Open an issue in [Save-server](https://github.com/Neztore/save-server/) * Email us at [hi@nezto.re](mailto:hi@nezto.re) * Join our discord (preferred): [Invite](https://discord.gg/QevWabU)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'save-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.0.5'}}]
[{'type': 'WEB', 'url': 'https://github.com/Neztore/save-server/security/advisories/GHSA-wwrj-35w6-77ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15135'}, {'type': 'WEB', 'url': 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/save-server'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-04T14:53:13Z', 'nvd_published_at': None}
1.4.0
GHSA-55mm-5399-7r63
2021-03-04T18:25:42Z
2020-08-05T14:52:54Z
null
['CVE-2020-15128']
Reliance on Cookies without validation in OctoberCMS
### Impact Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding. Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them. ### Patches Issue has been patched in Build 468 (v1.0.468). >**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires). ### Workarounds Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468. ### References - https://blog.laravel.com/laravel-cookie-security-releases - https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9 ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat Assessment Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences. ### Acknowledgements Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/rain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.468'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/pull/508'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'}]
{'cwe_ids': ['CWE-327', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:44:58Z', 'nvd_published_at': '2020-07-31T18:15:00Z'}
1.4.0
GHSA-vrv8-v4w8-f95h
2023-05-22T14:51:38Z
2020-08-11T14:55:01Z
null
['CVE-2020-12648']
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower. ### Patches This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic. ### Workarounds The workarounds available are: - upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1 or - enable the media plugin, which overrides the default parsing behaviour for iframes or - add the following workaround to update the parsing schema rules for iframes: #### Example: Change the default schema for iframes ```js setup: function(editor) { editor.on('PreInit', function() { editor.schema.getSpecialElements()['iframe'] = /</iframe[^>]*>/gi; }); } ``` ### Acknowledgements Tiny Technologies would like to thank George Steketee and Chris Davis at [Bishop Fox](https://www.bishopfox.com/) for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-vrv8-v4w8-f95h'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/pull/5843'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/2b71c922214d388838d930806207a66c14e80f63'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/696e43658dc9750ec24fdc4650bd2be9653daf5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-10T22:39:05Z', 'nvd_published_at': '2020-08-14T14:15:00Z'}
1.4.0
GHSA-69p9-9qm9-h447
2020-08-19T22:34:43Z
2020-08-19T22:34:43Z
2020-08-19T22:34:43Z
[]
Sandbox Breakout / Arbitrary Code Execution in safer-eval
Withdrawn: Duplicate of GHSA-hgch-jjmr-gp7w
[]
[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/commit/1c29f6a6e304fb650c05056e217e457a0d2cc3c5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/787'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/787/versions'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:59:29Z', 'nvd_published_at': None}
1.4.0
GHSA-3mvg-rrrw-m7ph
2021-11-19T15:41:33Z
2020-08-04T22:17:57Z
null
['CVE-2020-15109']
Ability to change order address without triggering address validations in solidus
### Impact This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment. All stores with at least two shipping zones and different costs of shipment per zone are impacted. E.g. 1. Store admin configured the store so that there are two zones in US: - East Cost Zone - Shipping Method cost: $1 - West Cost Zone - Shipping Method cost: $10 The attacker user can know that shipping to NY is less expensive than to LA just by testing different addresses in checkout. 2. The attacker user enters any NY shipping address in the address step 3. The attacker user chooses the $1 delivery option 4. The attacker user crafts a request with their real LA address, similar to: ``` // POST #checkout/update: { state: 'payment', order: { ship_address_attributes: { city: 'Los Angeles', ... } } } ``` 5. The attacker user proceeds with checking out with a new address and the $1 shipment costs. Another scenario where this could be dangerous is: > You cannot ship products in some zones and you are relying on Solidus Shipping Method building only to filter out unwanted zones. Malicious users can enter an allowed zone's address and change back to an unwanted one in the payment step by crafting a request with some proper ship_address_attributes. This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted. ### Patches A PR has been attached to fix the security concern for each of all the Solidus supported versions following the rules of the [Solidus Security Policy](https://solidus.io/security). ### Workarounds When it's not possible to upgrade to a supported patched version, please use this gist to patch the store: https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-3mvg-rrrw-m7ph'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15109'}, {'type': 'WEB', 'url': 'https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_api/CVE-2020-15109.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_frontend/CVE-2020-15109.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}, {'type': 'WEB', 'url': 'https://solidus.io/blog/2020/07/16/new-releases.html'}]
{'cwe_ids': ['CWE-20', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-04T20:54:07Z', 'nvd_published_at': '2020-08-04T23:15:00Z'}
1.4.0
GHSA-55j9-849x-26h4
2021-11-19T15:35:36Z
2020-08-21T16:30:52Z
null
['CVE-2020-15140']
Remote Code Execution in Red Discord Bot
### Impact A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. ### Patches This critical exploit has been fixed on version 3.3.11. ### Workarounds Unloading the Trivia module with ``unload trivia`` can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue. ### References https://github.com/Cog-Creators/Red-DiscordBot/pull/4175 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Red-DiscordBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-55j9-849x-26h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15140'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:30:30Z', 'nvd_published_at': '2020-08-21T17:15:00Z'}
1.4.0
GHSA-m75h-cghq-c8h5
2021-09-23T20:56:01Z
2020-08-31T22:51:50Z
null
['CVE-2013-6393']
Heap Based Buffer Overflow in libyaml
Versions 0.2.2 and earlier depend on native libyaml version 0.1.5 or earlier. As such, they are affected by a heap-based buffer overflow vulnerability that may result in a crash or arbitrary code execution when parsing YAML tags. ## Recommendation - Update to version 0.2.3 that includes a version of LibYAML that contains a fix for this issue.
[]
[{'package': {'ecosystem': 'npm', 'name': 'libyaml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6393'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/xi/libyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048'}, {'type': 'WEB', 'url': 'https://bitbucket.org/xi/libyaml/commits/tag/0.1.5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/attachment.cgi?id=847926&action=diff'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1033990'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6393'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT6536'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140302205713/http://www.securityfocus.com/bid/65258'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055002/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:060/?name=MDVSA-2015:060'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/21'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2014-0040.html'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html'}, {'type': 'WEB', 'url': 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6393'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0353.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0354.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0355.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2850'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2870'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2098-1'}]
{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:07Z', 'nvd_published_at': None}
1.4.0
GHSA-49rv-g7w5-m8xx
2021-09-23T19:08:01Z
2020-08-28T21:24:59Z
null
['CVE-2017-18635']
Cross-Site Scripting in @novnc/novnc
Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `include/ui.js` and users of `vnc_auto.html` and `vnc.html`. ## Recommendation Upgrade to version 0.6.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@novnc/novnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18635'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/issues/748'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0754'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/horizon/+bug/1656435'}, {'type': 'WEB', 'url': 'https://github.com/ShielderSec/cve-2017-18635'}, {'type': 'PACKAGE', 'url': 'https://github.com/novnc/noVNC'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/releases/tag/v0.6.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NOVNCNOVNC-469136'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4522-1/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1204'}, {'type': 'WEB', 'url': 'https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:21:28Z', 'nvd_published_at': '2019-09-25T23:15:00Z'}
1.4.0
GHSA-h698-r4hm-w94p
2021-09-23T20:58:30Z
2020-08-31T22:54:56Z
null
['CVE-2014-10067']
Validation Bypass in paypal-ipn
Versions 2.x.x and earlier of `paypal-ipn` are affected by a validation bypass vulnerability. paypal-ipn uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox. A motivated attacker could craft a request string using the simulator to fool the application into entering the sandbox mode, potentially allowing purchases without valid payment. ## Recommendation Upgrade to version 3.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'paypal-ipn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10067'}, {'type': 'WEB', 'url': 'https://github.com/andzdroid/paypal-ipn/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/andzdroid/paypal-ipn'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/26'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:20Z', 'nvd_published_at': None}
1.4.0
GHSA-86qr-9vqc-pgc6
2021-10-21T20:51:16Z
2020-08-05T14:53:06Z
null
['CVE-2020-5413']
Code execution in Spring Integration
Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.23'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-integration'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5413'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T21:06:31Z', 'nvd_published_at': '2020-07-31T20:15:00Z'}
1.4.0
GHSA-2828-9vh6-9m6j
2021-09-23T19:00:16Z
2020-08-21T16:25:48Z
null
['CVE-2020-6173']
Client Denial of Service on TUF
### Impact An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted. The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue. ### Patches No fix exists for this issue. ### Workarounds No workarounds are known for this issue. ### References * [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173) * [Issue #973](https://github.com/theupdateframework/tuf/issues/973)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/issues/973'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/commits/develop'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:19:09Z', 'nvd_published_at': None}
1.4.0
GHSA-7wgr-7666-7pwj
2021-01-07T23:41:29Z
2020-08-20T14:38:13Z
null
['CVE-2020-15141']
Path Traversal in openapi-python-client
### Impact Path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk. Giving this a CVSS score of 3.0 (Low) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C ### Patches A fix is being worked on for version 0.5.3 ### Workarounds Inspect OpenAPI documents before generating clients for them. ### For more information If you have any questions or comments about this advisory: * Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues) * Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'openapi-python-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15141'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13'}, {'type': 'WEB', 'url': 'https://pypi.org/project/openapi-python-client'}, {'type': 'WEB', 'url': 'https://pypi.org/project/openapi-python-client/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-14T16:08:41Z', 'nvd_published_at': None}
1.4.0
GHSA-crf2-xm6x-46p6
2021-11-19T15:36:13Z
2020-08-19T18:02:36Z
null
['CVE-2020-15151']
Observable Timing Discrepancy in OpenMage LTS
### Impact This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks ### Patches The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved ### References Related to Adobes CVE-2020-9690 ( https://helpx.adobe.com/security/products/magento/apsb20-47.html ) fixed in Magento2 https://github.com/magento/magento2/commit/52d72b8010c9cecb5b8e3d98ec5edc1ddcc65fb4 as part of 2.4.0/2.3.5-p2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15151'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/magento/apsb20-47.html'}]
{'cwe_ids': ['CWE-203', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T18:02:10Z', 'nvd_published_at': '2020-08-20T01:17:00Z'}
1.4.0
GHSA-chqj-j4fh-rw7m
2023-09-13T18:51:44Z
2020-08-28T21:25:11Z
null
['CVE-2019-16728']
Cross-Site Scripting in dompurify
Versions of `dompurify` prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of `<svg>`/`<math>` elements and `</p>`/`</br>`. An example payload is: `<svg></p><style><a id="</style><img src=1 onerror=alert(1)>">`. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.0.3 or later. You may also disallow `<svg>` and `<math>` through `dompurify` configurations: ```DOMPurify.sanitize(input, { FORBID_TAGS: ['svg', 'math'] });```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'dompurify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16728'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html'}, {'type': 'WEB', 'url': 'https://research.securitum.com/dompurify-bypass-using-mxss/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1205'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:24:05Z', 'nvd_published_at': None}
1.4.0
GHSA-wfm4-pq59-wg6r
2021-01-07T23:41:55Z
2020-08-05T21:27:44Z
null
['CVE-2020-15132']
Reset Password / Login vulnerability in Sulu
### Impact _What kind of vulnerability is it? Who is impacted?_ This vulnerability consists of a few related issues: #### Forget password leaks information if the user exists When the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist: ```json { "code": 0, "message": "Entity with the type \u0022Sulu\\Bundle\\SecurityBundle\\Entity\\User\u0022 and the id \u0022asdf\u0022 not found." } ``` This enables attackers to retrieve valid usernames. #### Forgot password leaks user email if user exists The response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful: ```json {"email":"admin@localhost.local"} ``` This information should not be exposed, as it can be used to gather email addresses. #### Response time of login gives hint if the username exists If the username the user enters in the login screen does not exists, the request responds much faster than if the username exists. This again allows attackers to retrieve valid usernames. #### Reset Token for Forgot Password feature is not hashed The reset token in the user database table is not hashed. That means that somebody could try to request a new password using the Forgot Password feature, and look that up in the database, if the attacker somehow got access to the database. Hashing the reset token would fix that problem. ### Patches This problem was fixed in Release 1.6.34, 2.0.10 and 2.1.1. ### Workarounds Override the files manually in your project and change them accordingly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.34'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15132'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/0fbb6009eb6a8efe63b7e3f3b4b886dc54bb2326'}]
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T21:26:26Z', 'nvd_published_at': None}
1.4.0
GHSA-gr4j-r575-g665
2021-09-23T19:06:33Z
2020-08-25T14:04:47Z
null
[]
Cross-Site Scripting in highcharts
Versions of `highcharts` prior to 7.2.2 or 8.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize `href` values and does not restrict URL schemes, allowing attackers to execute arbitrary JavaScript in a victim's browser if they click the link.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/'}]
[{'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/highcharts/highcharts/issues/13559'}, {'type': 'PACKAGE', 'url': 'https://github.com/highcharts/highcharts'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HIGHCHARTS-571995'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1227'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-25T14:01:38Z', 'nvd_published_at': None}
1.4.0
GHSA-v6fx-752r-ccp2
2023-08-25T22:21:14Z
2020-08-05T14:53:43Z
null
['CVE-2020-16253']
PgHero gem allows CSRF
The PgHero gem through 2.6.0 for Ruby allows CSRF. PgHero normally uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. Thus the ruby gem is vulnerable with non-session based authentication methods like basic authentication.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pghero'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16253'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/issues/330'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/pghero'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T14:51:45Z', 'nvd_published_at': None}
1.4.0
GHSA-5xf4-f2fq-f69j
2023-09-08T22:40:47Z
2020-02-14T23:10:16Z
null
['CVE-2019-10773']
Yarn Improper link resolution before file access (Link Following)
In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10773'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/pull/7755'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/commit/039bafd74b7b1a88a53a54f8fa6fa872615e90e7'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0475'}, {'type': 'WEB', 'url': 'https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HIZW4NZVV5QY5WWGW2JRP3FHYKZ6ZJ5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITY5BC63CCC647DFNUQRQ5AJDKUKUNBI/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YARN-537806,'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T21:01:35Z', 'nvd_published_at': None}
1.4.0
GHSA-ww97-9w65-2crx
2021-03-31T21:03:54Z
2020-02-12T18:45:28Z
null
['CVE-2019-17558']
Improper Input Validation in Apache Solr
Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.6.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17558'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/pull/1156'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-13971'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-14025'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b7b9d4113e6ec1ae1d3d0898c645f758511107ea44f0f3a1210c5d5@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12ab2cb15a34e49b4fecb5b2bdd7e10f3e8b7bf1f4f47fcde34d3a7c@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25f1bd4545617f5b86dde27b4c30fec73117af65598a30e20209739a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e35fd76239a381643555966fb3e72139e018d52d76544fb42f96d8@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5074d814d3a8c75df4b20e66bfd268ee0a73ddea7e85070cec3ae78d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r58c58fe51c87bc30ee13bb8b4c83587f023edb349018705208e65b37@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5dc200f7337093285bac40e6d5de5ea66597c3da343a0f7553f1bb12@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79c7e75f90e735fd32c4e3e97340625aab66c09dfe8c4dc0ab768b69@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b89b3dcfc1b6c52dd8d610b897ac98408245040c92b484fe97a51a2@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f21ab40a9b17b1a703db84ac56773fcabacd4cc1eb5c4700d17c071@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a36e4f92f4449dec517e560e1b55639f31b3aca26c37bbad45e31de@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e7a3c253a695a7667da0b0ec57f9bb0e31f039e62afbc00a1d96f7b@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9271d030452170ba6160c022757e1b5af8a4c9ccf9e04164dec02e7f@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99c3f7ec3a079e2abbd540ecdb55a0e2a0f349ca7084273a12e87aeb@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra29fa6ede5184385bf2c63e8ec054990a7d4622bba1d244bee70d82d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafc939fdd753f55707841cd5886fc7fcad4d8d8ba0c72429b3220a9a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb964fe5c4e3fc05f75e8f74bf6b885f456b7a7750c36e9a8045c627a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde3dbd8e646dabf8bef1b097e9a13ee0ecbdb8441aaed6092726c98d@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re8d12db916b5582a23ed144b9c5abd0bea0be1649231aa880f6cbfff@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d7ffae2b940114324e036b6394beadf27696d051ae0c4a5edf07af@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html'}]
{'cwe_ids': ['CWE-20', 'CWE-74', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T19:43:12Z', 'nvd_published_at': '2019-12-30T17:15:00Z'}
1.4.0
GHSA-q65m-pv3f-wr5r
2022-10-07T13:11:43Z
2020-02-24T17:33:44Z
null
['CVE-2020-6802']
XSS in Bleach when noscript and raw tag whitelisted
### Impact A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option. ### Patches v3.1.1 ### Workarounds * modify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags: ``` title textarea script style noembed noframes iframe xmp ``` * A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk. ### References * https://bugzilla.mozilla.org/show_bug.cgi?id=1615315 * https://cure53.de/fp170.pdf * https://nvd.nist.gov/vuln/detail/CVE-2020-6802 * https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach ### Credits * Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues) * Email us at [security@mozilla.org](mailto:security@mozilla.org)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6802'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4276'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1615315'}, {'type': 'WEB', 'url': 'https://cure53.de/fp170.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/bleach'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-19T19:43:47Z', 'nvd_published_at': '2020-03-24T22:15:00Z'}
1.4.0
GHSA-3mcp-9wr4-cjqf
2021-04-26T21:11:59Z
2020-02-24T17:27:27Z
null
['CVE-2020-5245']
Remote Code Execution (RCE) vulnerability in dropwizard-validation
Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. ### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended. ### Impact This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**. ### Patches The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions. ### Workarounds If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html). Example: ```java @SelfValidation public void validateFullName(ViolationCollector col) { if (fullName.contains("_")) { // Sanitize fullName variable by escaping relevant characters such as "$" col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName)); } } ``` See also: https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98 ### References * https://github.com/dropwizard/dropwizard/pull/3157 * https://github.com/dropwizard/dropwizard/pull/3160 * https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm * https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions * https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation ### For more information If you have any questions or comments about this advisory: * Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new) * Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev) ### Security contact If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy): https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3157'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3160'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'}, {'type': 'WEB', 'url': 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation'}, {'type': 'WEB', 'url': 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions'}, {'type': 'WEB', 'url': 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-24T17:27:14Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}
1.4.0
GHSA-84j7-475p-hp8v
2023-05-16T16:16:12Z
2020-02-28T16:53:55Z
null
['CVE-2020-5247']
HTTP Response Splitting in Puma
In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.12.3'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.3.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2020-5247.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254'}]
{'cwe_ids': ['CWE-113'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-28T16:50:49Z', 'nvd_published_at': '2020-02-28T17:15:00Z'}
1.4.0
GHSA-5q88-cjfq-g2mh
2021-08-19T17:22:07Z
2020-02-19T17:29:39Z
null
['CVE-2020-7597']
codecov NPM module allows remote attackers to execute arbitrary commands
codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CODECOV-548879'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:04:05Z', 'nvd_published_at': None}
1.4.0
GHSA-767j-jfh2-jvrc
2022-09-08T14:06:08Z
2020-02-28T01:10:58Z
null
['CVE-2019-17569']
Potential HTTP request smuggling in Apache Tomcat
The refactoring present in Apache Tomcat versions 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.98'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.48'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.28'}, {'fixed': '9.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.98'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.48'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.28'}, {'fixed': '9.0.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17569'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4673'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:19:11Z', 'nvd_published_at': '2020-02-24T22:15:00Z'}
1.4.0
GHSA-gj76-429m-56wc
2021-08-19T16:54:03Z
2020-02-04T22:38:22Z
null
['CVE-2019-17556']
Deserialization of Untrusted Data in Apache Olingo
Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17556'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/pull/60/files'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1410'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:35:09Z', 'nvd_published_at': None}
1.4.0
GHSA-ff2w-cq2g-wv5f
2021-08-19T17:32:40Z
2020-02-21T18:55:50Z
null
['CVE-2020-7238']
HTTP Request Smuggling in Netty
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.43'}, {'fixed': '4.1.45'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.44'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7238'}, {'type': 'WEB', 'url': 'https://github.com/jdordonezn/CVE-2020-72381/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9861'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://netty.io/news/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:49Z', 'nvd_published_at': '2020-01-27T17:15:00Z'}
1.4.0
GHSA-wgjx-hm34-qgf7
2021-08-19T17:12:52Z
2020-02-11T20:36:04Z
null
['CVE-2019-16194']
SQL injection in Centreon
SQL injection vulnerabilities in Centreon through 19.04 allow attacks via the svc_id parameter in include/monitoring/status/Services/xml/makeXMLForOneService.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.04.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16194'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/7862'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:35:43Z', 'nvd_published_at': None}
1.4.0
GHSA-3m93-m4q6-mc6v
2021-08-19T17:33:33Z
2020-02-26T19:54:31Z
null
['CVE-2019-14864']
Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.15'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.7'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14864'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/63522'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/63527'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64273'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64274'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64748'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}]
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T02:19:23Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}
1.4.0
GHSA-3j78-7m59-r7gv
2021-01-08T20:29:11Z
2020-02-24T17:18:26Z
null
['CVE-2020-5244']
Private data exposure via REST API in BuddyPress
In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed. This has been patched in version 5.1.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'buddypress/buddypress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244'}, {'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'}, {'type': 'WEB', 'url': 'https://buddypress.org/2020/01/buddypress-5-1-2/'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-24T17:18:06Z', 'nvd_published_at': None}
1.4.0
GHSA-v4qh-6367-4cx2
2021-08-19T16:54:36Z
2020-02-04T22:38:38Z
null
['CVE-2020-1925']
Server-Side Request Forgery (SSRF) in Apache Olingo
Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1925'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/202001.mbox/%3CCAGSZ4d6HwpF2woOrZJg_d0SkHytXJaCtAWXa3ZtBn33WG0YFvw%40mail.gmail.com%3E'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:35:18Z', 'nvd_published_at': None}
1.4.0
GHSA-cqqj-4p63-rrmm
2021-08-25T17:26:45Z
2020-02-21T18:55:24Z
null
['CVE-2019-20444']
HTTP Request Smuggling in Netty
HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.44'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20444'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9866'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9871'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9871/files#diff-e26989b9171ef22c27c9f7d80689cfb059d568c9bd10e75970d96c02d0654878'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4532-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}]
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:33Z', 'nvd_published_at': '2020-01-29T21:15:00Z'}
1.4.0
GHSA-xwgq-pcqx-hpmv
2021-08-19T16:56:45Z
2020-02-12T18:45:50Z
null
['CVE-2019-19703']
URL Redirection to Untrusted Site (Open Redirect) in Ktor
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.ktor:ktor-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/issues/1467'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T17:33:16Z', 'nvd_published_at': None}
1.4.0
GHSA-w4rc-rx25-8m86
2021-08-19T17:13:33Z
2020-02-12T18:44:16Z
null
['CVE-2019-11325']
Improper Input Validation in Symfony
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/var-exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/var-exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11325'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-11325.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/var-exporter/CVE-2019-11325.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://github.com/symfony/var-exporter/compare/d8bf442...57e00f3'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-11325-fix-escaping-of-strings-in-varexporter'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-11325'}]
{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:39:28Z', 'nvd_published_at': None}
1.4.0
GHSA-2gc7-w4hw-rr2m
2021-08-19T19:29:17Z
2020-02-28T01:10:17Z
null
['CVE-2019-19634']
class.upload.php in verot.net omits .pht from the set of dangerous file extensions
class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'verot/class.upload.php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'verot/class.upload.php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19634'}, {'type': 'WEB', 'url': 'https://github.com/jra89/CVE-2019-19634'}, {'type': 'WEB', 'url': 'https://github.com/verot/class.upload.php/blob/2.0.4/src/class.upload.php#L3068'}, {'type': 'WEB', 'url': 'https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:03:36Z', 'nvd_published_at': None}
1.4.0
GHSA-p5w7-qmq6-pmjr
2023-08-31T10:01:20Z
2020-02-26T19:55:32Z
null
['CVE-2019-12413']
Users able to query database metadata in Apache Superset
In Apache Incubator Superset before 0.31 user could query database metadata information from a database he has no access to, by using a specially crafted complex query.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/85ab04f8c52df8c353ecfa0ecd2ff27fc07fb8ab7566a754349806be%40%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-APACHESUPERSET-558911'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:53:04Z', 'nvd_published_at': None}
1.4.0
GHSA-84cm-v6jp-gjmr
2021-08-19T17:14:36Z
2020-02-14T23:09:24Z
null
['CVE-2019-10776']
OS command injection in git-diff-apply
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-diff-apply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10776'}, {'type': 'WEB', 'url': 'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774,'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T19:30:10Z', 'nvd_published_at': None}
1.4.0
GHSA-477x-w7m6-c6ph
2021-08-19T16:52:56Z
2020-02-04T22:37:15Z
null
['CVE-2019-17555']
Improper input validation in Apache Olingo
The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to implement a DoS attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17555'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/pull/61'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1411'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d65UmudJ_MQkFXEv9YY_wwZbRA3sgtNDzMoLM51Qh%3DRCA%40mail.gmail.com%3E'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:19:48Z', 'nvd_published_at': None}
1.4.0
GHSA-cchx-mfrc-fwqr
2021-09-30T18:40:15Z
2020-02-12T18:45:08Z
null
['CVE-2019-10911']
Improper authentication in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony '}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10911'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_19'}]
{'cwe_ids': ['CWE-200', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:17:08Z', 'nvd_published_at': '2019-05-16T22:29:00Z'}
1.4.0
GHSA-7553-jr98-vx47
2022-04-22T17:29:45Z
2020-02-24T19:12:36Z
null
['CVE-2020-7595']
libxml as used in Nokogiri has an infinite loop in a certain end-of-file situation
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation. The Nokogiri RubyGem has patched its vendored copy of libxml2 in order to prevent this issue from affecting nokogiri.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7595'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1992'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-7595.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202010-04'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200702-0005/'}, {'type': 'WEB', 'url': 'https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4274-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T18:58:16Z', 'nvd_published_at': '2020-01-21T23:15:00Z'}
1.4.0
GHSA-pg97-ww7h-5mjr
2021-08-19T17:21:06Z
2020-02-13T22:21:06Z
null
['CVE-2019-10785']
XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode
### Impact _What kind of vulnerability is it? Who is impacted?_ Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo: * 1.16.1 * 1.15.2 * 1.14.5 * 1.13.6 * 1.12.7 * 1.11.9 Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch. ### For more information If you have any questions or comments about this advisory: * Open an issue in [dojo/dojox](https://github.com/dojo/dojox/)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.1'}]}], 'versions': ['1.16.0']}]
[{'type': 'WEB', 'url': 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/pull/315'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T22:20:36Z', 'nvd_published_at': None}
1.4.0
GHSA-qxf4-chvg-4r8r
2021-08-19T19:30:36Z
2020-02-28T01:10:48Z
null
['CVE-2020-1935']
Potential HTTP request smuggling in Apache Tomcat
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1935'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0005/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4448-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4673'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:18:59Z', 'nvd_published_at': '2020-02-24T22:15:00Z'}
1.4.0
GHSA-73m2-3pwg-5fgc
2023-08-23T00:09:00Z
2020-02-04T03:07:31Z
null
['CVE-2020-5236']
Catastrophic backtracking in regex allows Denial of Service in Waitress
### Impact When waitress receives a header that contains invalid characters it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This would allow an attacker to send a single request with an invalid header and take the service offline. Invalid header example: ``` Bad-header: xxxxxxxxxxxxxxx\x10 ``` Increasing the number of `x`'s in the header will increase the amount of time Waitress spends in the regular expression engine. This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230. ### Patches The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible. ### Workarounds If you have deployed a reverse proxy in front of Waitress it may already be rejecting requests that include invalid headers. ### Thanks The Pylons Project would like to thank [Fil Zembowicz](https://github.com/fzembow) for reaching out and disclosing this vulnerability! ### References Catastrophic backtracking explained: https://www.regular-expressions.info/catastrophic.html ### For more information If you have any questions or comments about this advisory: - open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) - email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.rfc7230.FIELD_CONTENT', 'waitress.rfc7230.FIELD_VALUE', 'waitress.rfc7230.OWS_STRIP']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.2'}, {'fixed': '1.4.3'}]}], 'versions': ['1.4.2']}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-73m2-3pwg-5fgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5236'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T03:06:40Z', 'nvd_published_at': None}
1.4.0
GHSA-hmr4-m2h5-33qx
2022-03-21T20:34:24Z
2020-02-11T21:03:20Z
null
['CVE-2020-7471']
SQL injection in Django
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7471'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/001b0634cd309e372edb6d7d95d083d02b8e37bd'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/505826b469b16ab36693360da9e11fd13213421b'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c67a368c16e4680b324b4f385398d638db4d8147'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2020/Feb/30'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200221-0006/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4264-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4629'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/feb/03/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/02/03/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/03/1'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-05T15:07:21Z', 'nvd_published_at': None}
1.4.0
GHSA-qvrv-2x7x-78x2
2021-08-19T17:22:37Z
2020-02-24T17:33:31Z
null
['CVE-2019-19325']
Reflected XSS in SilverStripe
SilverStripe through 4.4.x before 4.4.5 and 4.5.x before 4.5.2 allows Reflected XSS on the login form and custom forms. Silverstripe Forms allow malicious HTML or JavaScript to be inserted through non-scalar FormField attributes, which allows performing XSS (Cross-Site Scripting) on some forms built with user input (Request data). This can lead to phishing attempts to obtain a user&amp;#39;s credentials or other sensitive user input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19325'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/49fda52b12ba59f0a04bcabf78425586a8779e89'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2019-19325'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:11:37Z', 'nvd_published_at': None}
1.4.0
GHSA-mgh8-hcwj-h57v
2021-08-19T16:53:27Z
2020-02-04T22:37:43Z
null
['CVE-2019-17554']
Improper Restriction of XML External Entity Reference in Apache Olingo
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17554'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1409'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/11'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:29:36Z', 'nvd_published_at': None}
1.4.0
GHSA-934x-72xh-5hrg
2021-08-19T17:15:08Z
2020-02-14T23:09:45Z
null
['CVE-2019-10777']
OS command injection in aws-lambda
In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'aws-lambda'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10777'}, {'type': 'WEB', 'url': 'https://github.com/awspilot/cli-lambda-deploy'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T19:57:58Z', 'nvd_published_at': None}
1.4.0
GHSA-c5r5-7pfh-6qg6
2023-08-28T19:12:01Z
2020-02-14T23:10:01Z
null
['CVE-2019-10780']
BibTeX-Ruby vulnerable to OS command injection
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby `Kernel.open` method through BibTeX.open.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bibtex-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10780'}, {'type': 'WEB', 'url': 'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c5r5-7pfh-6qg6'}, {'type': 'PACKAGE', 'url': 'https://github.com/inukshuk/bibtex-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bibtex-ruby/CVE-2019-10780.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T20:45:35Z', 'nvd_published_at': None}
1.4.0
GHSA-r679-m633-g7wc
2023-03-06T20:47:04Z
2020-02-04T22:36:36Z
null
['CVE-2019-12422']
Improper input validation in Apache Shiro
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12422'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c9db14cfebfb8e74205884ed2bf2e2b30790ce24b7dde9191c82572c@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T21:49:59Z', 'nvd_published_at': '2019-11-18T23:15:00Z'}
1.4.0
GHSA-r6j9-8759-g62w
2021-03-26T00:27:41Z
2020-02-04T22:39:19Z
null
['CVE-2019-10172']
Improper Restriction of XML External Entity Reference in jackson-mapper-asl
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar to CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jackson:jackson-mapper-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10172'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe%40%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581%40%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9%40%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e%40%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T20:42:17Z', 'nvd_published_at': '2019-11-18T17:15:00Z'}
1.4.0
GHSA-fxjm-wvj9-9c39
2023-09-01T10:12:40Z
2020-02-26T19:54:57Z
null
['CVE-2020-1932']
Information disclosure in Apache Superset
An information disclosure issue was found in Apache Superset 0.34.0, 0.34.1, 0.35.0, and 0.35.1. Authenticated Apache Superset users are able to retrieve other users' information, including hashed passwords, by accessing an unused and undocumented API endpoint on Apache Superset.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.35.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1932'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e5323c3bc786005495311a6ff53ac6d990b2c7eb52941a1a13ce227%40%3Cdev.superset.apache.org%3E'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:51:07Z', 'nvd_published_at': '2020-01-28T01:15:00Z'}
1.4.0
GHSA-3jqw-vv45-mjhh
2023-05-22T18:25:18Z
2020-02-12T23:37:46Z
null
['CVE-2020-5241']
XSS/Script injection vulnerability in matestack
matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection. This vulnerability is patched in version 0.7.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'matestack-ui-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/security/advisories/GHSA-3jqw-vv45-mjhh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5241'}, {'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/commit/5c61571739e860db9ca578fe09ab4733878cb0fc'}, {'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/commit/e96915cf20c4fa0571df7fa21e9b09a69be19107'}, {'type': 'PACKAGE', 'url': 'https://github.com/matestack/matestack-ui-core'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/matestack-ui-core/CVE-2020-5241.yml'}]
{'cwe_ids': ['CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-12T23:37:29Z', 'nvd_published_at': None}
1.4.0
GHSA-jppv-gw3r-w3q8
2023-08-29T15:03:03Z
2020-02-28T16:54:36Z
null
['CVE-2020-8130']
OS Command Injection in Rake
There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in `Rake::FileList` when supplying a filename that begins with the pipe character `|`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rake'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/651518'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jppv-gw3r-w3q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rake'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rake/CVE-2020-8130.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4295-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:50:03Z', 'nvd_published_at': None}
1.4.0
GHSA-mxhp-79qh-mcx6
2023-01-30T19:22:17Z
2020-02-19T16:43:42Z
null
['CVE-2019-10790']
TaffyDB can allow access to any data items in the DB
TaffyDB allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. Taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, TaffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB. **Note:** `taffy` and its successor package `taffydb` are not maintained.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'taffy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'taffydb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10790'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TAFFY-546521'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/taffy'}, {'type': 'PACKAGE', 'url': 'https://www.npmjs.com/package/taffydb'}]
{'cwe_ids': ['CWE-20', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:15:03Z', 'nvd_published_at': '2020-02-17T20:15:00Z'}
1.4.0
GHSA-wp7m-mrvf-599c
2021-11-01T14:12:07Z
2020-02-14T23:09:10Z
null
['CVE-2019-15597']
Command Injection in node-df
All versions of `node-df` are vulnerable to Command Injection. The package fails to sanitize filenames passed to the `file` option. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-df'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15597'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/703412'}, {'type': 'PACKAGE', 'url': 'https://github.com/adriano-di-giovanni/node-df'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1431'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T17:09:46Z', 'nvd_published_at': '2019-12-18T21:15:00Z'}
1.4.0
GHSA-8rc5-hx3v-2jg7
2021-08-19T19:25:06Z
2020-02-27T20:36:29Z
null
['CVE-2019-10772']
Sanitizer bypass in svg-sanitizer
It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'enshrined/svg-sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10772'}, {'type': 'WEB', 'url': 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:32:43Z', 'nvd_published_at': None}
1.4.0
GHSA-cmcx-xhr8-3w9p
2023-05-04T20:02:25Z
2020-02-20T23:26:10Z
null
['CVE-2020-5243']
Denial of Service in uap-core when processing crafted User-Agent strings
### Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ### Patches Please update uap-core to &amp;amp;gt;= v0.7.3 Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes. ### Details Each vulnerable regular expression reported here contains 3 overlapping capture groups. Backtracking has approximately cubic time complexity with respect to the length of the user-agent string. #### Regex 1: ``` \bSmartWatch *\( *([^;]+) *; *([^;]+) *; ``` is vulnerable in portion ` *([^;]+) *` and can be attacked with ```python &amp;amp;quot;SmartWatch(&amp;amp;quot; + (&amp;amp;quot; &amp;amp;quot; * 3500) + &amp;amp;quot;z&amp;amp;quot; ``` e.g. ``` SmartWatch( z ``` #### Regex 2: ``` ; *([^;/]+) Build[/ ]Huawei(MT1-U06|[A-Z]+\d+[^\);]+)[^\);]*\) ``` is vulnerable in portion `\d+[^\);]+[^\);]*` and can be attacked with ```python &amp;amp;quot;;A Build HuaweiA&amp;amp;quot; + (&amp;amp;quot;4&amp;amp;quot; * 3500) + &amp;amp;quot;z&amp;amp;quot; ``` #### Regex 3: ``` (HbbTV)/[0-9]+\.[0-9]+\.[0-9]+ \([^;]*; *(LG)E *; *([^;]*) *;[^;]*;[^;]*;\) ``` is vulnerable in portion ` *([^;]*) *` and can be attacked with ```python &amp;amp;quot;HbbTV/0.0.0 (;LGE;&amp;amp;quot; + (&amp;amp;quot; &amp;amp;quot; * 3500) + &amp;amp;quot;z&amp;amp;quot; ``` #### Regex 4: ``` (HbbTV)/[0-9]+\.[0-9]+\.[0-9]+ \([^;]*; *(?:CUS:([^;]*)|([^;]+)) *; *([^;]*) *;.*; ``` is vulnerable in portions ` *(?:CUS:([^;]*)|([^;]+)) *` and ` *([^;]*) *` and can be attacked with ```python &amp;amp;quot;HbbTV/0.0.0 (;CUS:;&amp;amp;quot; + (&amp;amp;quot; &amp;amp;quot; * 3500) + &amp;amp;quot;z&amp;amp;quot; &amp;amp;quot;HbbTV/0.0.0 (;&amp;amp;quot; + (&amp;amp;quot; &amp;amp;quot; * 3500) + &amp;amp;quot;z&amp;amp;quot; &amp;amp;quot;HbbTV/0.0.0 (;z;&amp;amp;quot; + (&amp;amp;quot; &amp;amp;quot; * 3500) + &amp;amp;quot;z&amp;amp;quot; ``` Reported by Ben Caller @bcaller
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'uap-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'user_agent_parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5243'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/commit/0afd61ed85396a3b5316f18bfd1edfaadf8e88e1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/user_agent_parser/CVE-2020-5243.yml'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T23:09:32Z', 'nvd_published_at': None}
1.4.0
GHSA-9r27-994c-4xch
2020-02-21T20:20:53Z
2020-02-24T17:34:02Z
null
[]
discord-html not escaping HTML code blocks when lacking a language identifier
### Impact Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed. ### Patches This has been patched in version 2.3.1 ### Workarounds Escape the characters `&lt;&gt;&amp;` before sending plain code blocks to discord-markdown. ### References https://github.com/brussell98/discord-markdown/issues/13
[]
[{'package': {'ecosystem': 'npm', 'name': 'discord-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch'}, {'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-21T20:20:53Z', 'nvd_published_at': None}
1.4.0
GHSA-9c29-9h4m-wg5p
2023-08-31T10:11:22Z
2020-02-26T19:55:14Z
null
['CVE-2019-12414']
Users can view database names in Apache Superset
In Apache Incubator Superset before 0.32, a user can view database names that he has no access to on a dropdown list in SQLLab
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.32.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12414'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/396034aabe08dd349ff44eb062c718aadcf1b4e86f6372c7d5e988c0%40%3Cdev.superset.apache.org%3E'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:51:20Z', 'nvd_published_at': None}
1.4.0
GHSA-w2fr-65vp-mxw3
2021-08-19T17:12:23Z
2020-02-12T18:44:50Z
null
['CVE-2019-10912']
Deserialization of untrusted data in Symfony
In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10912'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/21'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10912'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2019-016/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4441'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:17:25Z', 'nvd_published_at': None}
1.4.0
GHSA-p2v9-g2qv-p635
2021-08-25T17:37:42Z
2020-02-21T18:55:04Z
null
['CVE-2019-20445']
HTTP Request Smuggling in Netty
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.45'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20445'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9861'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4532-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}]
{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:25Z', 'nvd_published_at': '2020-01-29T21:15:00Z'}
1.4.0
GHSA-r5fx-8r73-v86c
2022-08-02T16:22:26Z
2020-02-14T23:08:49Z
null
['CVE-2019-14863']
AngularJS Cross-site Scripting due to failure to sanitize `xlink.href` attributes
Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled. ## Recommendation Upgrade to version 1.5.0-beta.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0-beta.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14863'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/pull/12524'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:angular:20150807'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1453'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T17:26:17Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}
1.4.0
GHSA-x8wj-6m73-gfqp
2021-01-08T20:30:34Z
2020-02-18T18:59:24Z
null
['CVE-2020-5237']
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
### Impact The vulnerability was identified in the web service for a chunked file upload. While the names of the POST parameters vary with the used frontend, their values are always used in the same way to build a path where the chunks are stored and assembled temporarily. By not validating these parameters properly, OneupUploaderBundle is susceptible to a path traversal vulnerability which can be exploited to upload files to arbitrary folders on the filesystem. The assembly process can further be misused with some restrictions to delete and copy files to other locations. The vulnerability can be exploited by any users that have legitimate access to the upload functionality and can lead to arbitrary code execution, denial of service and disclosure of confidential information. ### Patches Yes, see version 1.9.3 and 2.1.5. ### References https://owasp.org/www-community/attacks/Path_Traversal ### Credits: This security vulnerability was found by Thibaud Kehler of SySS GmbH. E-Mail: thibaud.kehler@syss.de
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'oneup/uploader-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oneup/uploader-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5237'}, {'type': 'WEB', 'url': 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}, {'type': 'WEB', 'url': 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt'}]
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-05T13:52:02Z', 'nvd_published_at': '2020-02-05T14:15:00Z'}