schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 24
values | aliases
stringlengths 2
20
| summary
stringlengths 9
130
⌀ | details
stringlengths 34
11.7k
| severity
stringlengths 2
92
| affected
stringlengths 73
3.22k
| references
stringlengths 64
21.2k
| database_specific
stringlengths 131
202
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-f5w6-r7rg-mcgq | 2021-09-23T21:03:25Z | 2020-08-31T23:01:13Z | null | ['CVE-2014-8882'] | Regular Expression Denial of Service in validator | Versions of `validator` prior to 3.22.1 are affected by a regular expression denial of service vulnerability in the `isURL` method.
## Recommendation
Update to version 3.22.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.22.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8882'}, {'type': 'WEB', 'url': 'https://github.com/chriso/validator.js/issues/152#issuecomment-48107184'}, {'type': 'PACKAGE', 'url': 'https://github.com/chriso/validator.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:validator:20130705'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/42'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cf8j-64h9-6q58 | 2021-09-23T18:57:05Z | 2020-08-18T17:30:25Z | null | ['CVE-2020-12480'] | CSRF in Play Framework | In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12480'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10285'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'}, {'type': 'PACKAGE', 'url': 'https://github.com/playframework/playframework'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-18T17:30:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6gg3-pmm7-97xc | 2021-01-07T23:40:43Z | 2020-08-19T21:05:03Z | null | ['CVE-2020-15119'] | DOM-based XSS in auth0-lock | ### Overview
Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection.
- For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification code input.
- For Enterprise connection, the value of the input (IdP Domain) from the Enterprise connection setup screen (Auth0 Dashboard) is displayed back to the user when the `lock` widget opens.
When Passwordless or Enterprise connection is used, the application and its users might be exposed to cross-site scripting (XSS) attacks.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using auth0-lock
- You are using Passwordless or Enterprise connection mode
### How to fix that?
Upgrade to version `11.26.3`
### Will this update impact my users?
The fix provided in patch will not affect your users.
### Credit
https://github.com/mvisat | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0-lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.26.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.25.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15119'}, {'type': 'WEB', 'url': 'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T21:02:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qrg3-f6h6-vq8q | 2020-08-19T22:15:57Z | 2020-08-19T22:15:57Z | 2020-08-19T22:15:57Z | [] | Denial of Service in https-proxy-agent | Withdrawn: Duplicate of GHSA-8g7p-74h8-hg48 | [] | [{'package': {'ecosystem': 'npm', 'name': 'https-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/319532'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:15:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r587-7jh2-4qr3 | 2022-09-09T20:56:50Z | 2020-08-26T19:32:50Z | null | [] | Server secret was included in static assets and served to clients | ### Impact
Server JWT signing secret was included in static assets and served to clients.
This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**.
### Background
Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`.
Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood.
### Patches
Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components.
Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend).
### Workarounds
Users shall upgrade if they use Flood's builtin authentication system.
While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments.
> Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication.
Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions.
### References
[Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions)
[Introduction to JSON Web Tokens](https://jwt.io/introduction/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [issue tracker](https://github.com/jesec/flood/issues)
* Email us at [jc@linux.com](mailto:jc@linux.com) | [] | [{'package': {'ecosystem': 'npm', 'name': 'flood'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3'}, {'type': 'WEB', 'url': 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'}, {'type': 'WEB', 'url': 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jesec/flood'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-26T19:32:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j7wp-vjj6-cp5m | 2021-09-23T18:55:46Z | 2020-08-11T19:40:10Z | null | [] | Cross-Site Scripting in @progress/kendo-angular-editor | Kendo UI for Angular Editor Component (npm package @progress/kendo-angular-editor) before version 1.2.3 is vulnerable to Cross-Site Scripting. When the Editor content contains potentially malicious scripts in element event handlers, they get executed.
Adding the following content to the Editor value demonstrates the issue: `<img src="" onerror=alert(document.domain)>`. | [] | [{'package': {'ecosystem': 'npm', 'name': '@progress/kendo-angular-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/telerik/kendo-angular-editor'}, {'type': 'WEB', 'url': 'https://stackblitz.com/edit/angular-6xzuzp-tef7lb?file=app/app.component.ts'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1549'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-11T19:39:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q9r2-f3vc-rjg8 | 2020-08-19T22:28:51Z | 2020-08-19T22:28:51Z | 2020-08-19T22:28:51Z | [] | Command Injection in macaddress | Withdrawn: Duplicate of GHSA-pp57-mqmh-44h7 | [] | [{'package': {'ecosystem': 'npm', 'name': 'macaddress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/319467'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:32:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mpcx-8qqw-rmcq | 2020-08-19T21:51:20Z | 2020-08-19T21:51:20Z | 2020-08-19T21:51:20Z | [] | SQL Injection in waterline-sequel | Withdrawn: Duplicate of GHSA-cgpp-wm2h-6hqx | [] | [{'package': {'ecosystem': 'npm', 'name': 'waterline-sequel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cgpp-wm2h-6hqx'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:20:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-363h-vj6q-3cmj | 2021-09-23T19:28:27Z | 2020-08-31T22:45:35Z | null | ['CVE-2014-4671'] | Rosetta-Flash JSONP Vulnerability in hapi | This description taken from the pull request provided by Patrick Kettner.
Versions 6.1.0 and earlier of hapi are vulnerable to a rosetta-flash attack, which can be used by attackers to send data across domains and break the browser same-origin-policy.
## Recommendation
- Update hapi to version 6.1.1 or later.
Alternatively, a solution previously implemented by Google, Facebook, and Github is to prepend callbacks with an empty inline comment. This will cause the flash parser to break on invalid inputs and prevent the issue, and how the issue has been resolved internally in hapi. | [] | [{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4671'}, {'type': 'WEB', 'url': 'https://github.com/spumko/hapi/pull/1766'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/commit/d47f57abf23bdaa84f61aed2bac94ae5f358afb7'}, {'type': 'WEB', 'url': 'https://github.com/patrickkettner'}, {'type': 'PACKAGE', 'url': 'https://github.com/spumko/hapi'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/12'}, {'type': 'WEB', 'url': 'http://helpx.adobe.com/security/products/flash-player/apsb14-17.html'}, {'type': 'WEB', 'url': 'http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0860.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59774'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/59837'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-201407-02.xml'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/68457'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1030533'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9xgp-hfw7-73rq | 2020-08-19T21:30:04Z | 2020-08-19T21:30:04Z | 2020-08-19T21:30:04Z | [] | Authentication Weakness in keystone | There is an authentication weakness vulnerability in keystone before version 0.3.16. Due to a bug in the the default sign in functionality, incomplete email addresses could be matched. A correct password is still required to complete sign in. | [] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.16'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/1085'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:21:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wvhm-4hhf-97x9 | 2021-01-07T23:41:49Z | 2020-08-07T22:28:30Z | null | ['CVE-2020-15138'] | Cross-Site Scripting in Prism | ### Impact
The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer.
This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0).
### Patches
This problem is patched in v1.21.0.
### Workarounds
To workaround the issue without upgrading, [disable the easing preview](https://prismjs.com/plugins/previewers/#disabling-a-previewer) on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.
### References
The vulnerability was introduced by this [commit](https://github.com/PrismJS/prism/commit/4303c940d3d3a20e8ce7635bf23331c75060f5c5) on Sep 29, 2015 and fixed by [Masato Kinugawa](https://twitter.com/kinugawamasato) (#2506).
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/PrismJS/prism/issues). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.21.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15138'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c'}, {'type': 'WEB', 'url': 'https://prismjs.com/plugins/previewers/#disabling-a-previewer'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-07T16:19:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5cp4-xmrw-59wf | 2021-10-08T21:25:58Z | 2020-08-05T21:47:02Z | null | [] | XSS via JQLite DOM manipulation functions in AngularJS | ### Summary
XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`.
### Description
JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`.
One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218).
If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM.
This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/).
### Proof of concept
```javascript
const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>`
```
Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is.
As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute.
```javascript
angular.element(document).append(inertPayload);
```
This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`.
### Patches
The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2).
### Workarounds
Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended.
### References
https://github.com/advisories/GHSA-mhp6-pxh8-r675
https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://snyk.io/vuln/SNYK-JS-ANGULAR-570058 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mhp6-pxh8-r675'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T21:46:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jw37-5gqr-cf9j | 2021-01-12T19:30:42Z | 2020-08-17T21:44:54Z | null | ['CVE-2020-15152'] | Server-Side Request Forgery in ftp-srv | ### Background
The FTP protocol creates two connections, one for commands and one for transferring data.
This second data connection can be created in two ways, on the server by sending the PASV command, or on the client by sending the PORT command.
The PORT command sends the IP and port for the server to connect to the client with.
### Issue
Since the client can send an arbitrary IP with the PORT command, this can be used to cause the server to make a connection elsewhere.
### Patches
* _fix: disallow PORT connections to alternate hosts_: e449e75219d918c400dec65b4b0759f60476abca
Deprecation notices have been published for older versions.
### Workarounds
Blacklisting the FTP Command `PORT` will prevent the server from exposing this behaviour through active connections until a fix is applied.
```js
const ftp = new FtpSrv({
blacklist: ['PORT']
});
```
### References
https://www.npmjs.com/advisories/1445
### Credits
Thank you to;
@trs for fixing it
@andreeleuterio for reporting it to us for an anonymous user (Vincent) through the NPM platform
@quiquelhappy for bringing it to our attention after it slipped through the cracks during Christmas
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/autovance/ftp-srv](https://github.com/autovance/ftp-srv)
* Email us directly; security@autovance.com | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.19.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ftp-srv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-jw37-5gqr-cf9j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15152'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca'}, {'type': 'WEB', 'url': 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1445'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ftp-srv'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-17T21:42:37Z', 'nvd_published_at': '2020-08-17T22:15:00Z'} |
1.4.0 | GHSA-28gr-86hg-r48w | 2021-09-23T19:27:57Z | 2020-08-31T22:43:31Z | null | ['CVE-2013-3364'] | Unauthenticated Remote Command Injection in ep_imageconvert | ep_imageconvert is a plugin for [Etherpad Lite](https://github.com/ether/etherpad-lite). ep_imageconvert <= 0.0.2 is vulnerable to remote command injection.
Authentication is not required for remote exploitation.
## Recommendation
Update to version 0.0.3 or greater. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ep_imageconvert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3364'}, {'type': 'WEB', 'url': 'https://github.com/redhog/ep_imageconvert/pull/5'}, {'type': 'PACKAGE', 'url': 'https://github.com/redhog/ep_imageconvert'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ep_imageconvert:20130506'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/7'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-69rr-wvh9-6c4q | 2021-09-23T21:00:00Z | 2020-08-31T22:58:04Z | null | ['CVE-2014-3744'] | Directory Traversal in st | Versions of `st` prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused `%2e` to be interpreted as `.` by the filesystem, resulting the potential for an attacker to read sensitive files on the server.
## Recommendation
Update to version 0.2.5 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'st'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3744'}, {'type': 'PACKAGE', 'url': 'https://github.com/isaacs/st'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/st#security-status'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/36'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/67389'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h29r-4vqp-8jxf | 2020-08-20T17:21:46Z | 2020-08-20T17:21:46Z | 2020-08-20T17:21:46Z | [] | Cross-Site Scripting in keystone | Withdrawn: Duplicate of GHSA-7qcx-jmrc-h2rr | [] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/8ecb80960ffd2ae2f241b0bbb62367821a79ff63'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/980'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T22:03:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f93j-hmcr-jcwh | 2023-08-25T21:39:29Z | 2020-08-19T16:45:49Z | null | ['CVE-2015-4410'] | Moped Rubygem Data Injection Vulnerability | `The Moped::BSON::ObjecId.legal?` method in rubygem-moped before [commit dd5a7c14b5d2e466f7875d079af71ad19774609b](https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24) allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'moped'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'moped'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410'}, {'type': 'WEB', 'url': 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1229757'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongoid/moped/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml'}, {'type': 'WEB', 'url': 'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html'}, {'type': 'WEB', 'url': 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2015/q2/653'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228085849/http://www.securityfocus.com/bid/75045'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html'}, {'type': 'WEB', 'url': 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/06/3'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-14T16:47:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wx84-69jh-jjp2 | 2020-08-03T18:22:36Z | 2020-08-03T18:22:36Z | 2020-08-03T18:22:36Z | [] | Withdrawn | Withdrawn: duplicate of GHSA-2m39-62fm-q8r3 | [] | [{'package': {'ecosystem': 'npm', 'name': 'sshpk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sshpk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.1'}]}], 'versions': ['1.14.0']}] | [{'type': 'WEB', 'url': 'https://hackerone.com/reports/319593'}, {'type': 'WEB', 'url': 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:13:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p4pj-9g59-4ppv | 2021-11-19T15:41:13Z | 2020-08-19T21:04:25Z | null | ['CVE-2020-15143'] | Remote Code Execution in SyliusResourceBundle | ### Impact
Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution.
The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`.
### Example
```yaml
foo:
path: /foo/{id}
defaults:
_sylius:
repository:
method: findSome
arguments:
entity: "expr:service('repository').find($id)"
```
In this case, `$id` can be prepared in a way that calls other services.
If you visit `/foo/"~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database.
To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language.
### Patches
This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched.
### Workarounds
The fix requires adding `addslashes` in `ParametersParser::parseRequestValueExpression` to sanitize user input before evaluating it using the expression language.
```php
- return is_string($variable) ? sprintf('"%s"', $variable) : $variable;
+ return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable;
```
### Acknowledgements
This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot!
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@sylius.com](mailto:security@sylius.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-p4pj-9g59-4ppv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15143'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/commit/73ed8b8bb083f36c30ad7c3cec336f65d6a80650'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/SyliusResourceBundle'}] | {'cwe_ids': ['CWE-74', 'CWE-917'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T20:30:42Z', 'nvd_published_at': '2020-08-20T01:17:00Z'} |
1.4.0 | GHSA-44g9-w23c-5rw7 | 2021-09-23T20:57:48Z | 2020-08-31T22:53:54Z | null | ['CVE-2014-8883'] | Directory Traversal in nhouston | All versions of the static file server module nhouston are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory.
## Recommendation
It is recommended that a different module be used, as we have been unable to reacher the maintainer of this module. We will continue to reach out to them, and if an update becomes available that fixes the issue, we will update this advisory accordingly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nhouston'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8883'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:nhouston:20141114'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/25'}, {'type': 'WEB', 'url': 'http://en.wikipedia.org/wiki/Directory_traversal_attack'}] | {'cwe_ids': ['CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3fw8-66wf-pr7m | 2021-04-07T19:56:51Z | 2020-08-31T22:41:27Z | null | ['CVE-2013-7370'] | methodOverride Middleware Reflected Cross-Site Scripting in connect | Connect is a stack of middleware that is executed in order in each request.
The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override".
Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser.
###Example:
```
~ curl "localhost:3000" -d "_method=<script src=http://nodesecurity.io/xss.js></script>"
Cannot <SCRIPT SRC=HTTP://NODESECURITY.IO/XSS.JS></SCRIPT> /
```
## Recommendation
Update to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack. | [] | [{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/issues/831'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-7370'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-7370'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/21/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:07:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6898-wx94-8jq8 | 2023-09-08T20:38:35Z | 2020-08-31T22:50:48Z | null | ['CVE-2013-7381'] | Potential Command Injection in libnotify | Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify.
Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this.
### Example
```js
var libnotify = require('libnotify')
libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () {
console.log(arguments);
})
```
Special thanks to Neal Poole for submitting the pull request to fix this issue.
## Recommendation
Update to version 1.0.4 or greater | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'libnotify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7381'}, {'type': 'WEB', 'url': 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448'}, {'type': 'PACKAGE', 'url': 'https://github.com/mytrile/node-libnotify'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/20'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9vxc-g2jx-qj3p | 2021-09-23T21:00:28Z | 2020-08-31T22:59:07Z | null | ['CVE-2013-7379'] | API Admin Auth Weakness in tomato | Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests.
## Details
The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access.
Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key.
## Proof of Concept
This is the snippet of code that does the comparison to authorize requests.
```
if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) {
```
For an access_key that is set to anything that includes the letter 'a' the following request would be authorized.
```
$ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a"
{
"cmd": "ls",
"path": ".",
"stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n",
"stderr": ""
}
```
## Recommendation
Update to version 0.0.6 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'tomato'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379'}, {'type': 'WEB', 'url': 'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'}, {'type': 'PACKAGE', 'url': 'https://github.com/leizongmin/tomato'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/38'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f9vc-q3hh-qhfv | 2020-08-31T18:08:29Z | 2020-08-31T22:56:00Z | null | ['CVE-2014-10065'] | Content Injection in remarkable | Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used.
### Proof of Concept
Markdown Source:
```
[link](<javascript:alert(1)>)
```
Rendered HTML:
```
<a href="javascript:alert(1)">link</a>
```
## Recommendation
Update to version 1.4.1 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10065'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/97'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/commit/d54ed887f4997221cd7cb9790e953a83c504de36'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/30'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9m4x-8w29-r78g | 2023-09-13T19:18:38Z | 2020-08-13T18:54:19Z | null | ['CVE-2020-8205'] | Server-Side Request Forgery in @uppy/companion | The @uppy/companion npm package before versions 1.13.2 and 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha.0'}, {'fixed': '2.0.0-alpha.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-alpha.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8205'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/pull/2322/commits/dbf2f4f30aeaf3bcc5971bb867bb0b5984084828'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/891270'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/blob/master/CHANGELOG.md#1161'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-13T18:54:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-673x-f5wx-fxpw | 2021-01-07T23:39:00Z | 2020-08-28T21:45:15Z | null | ['CVE-2020-15159'] | Cross Site Scripting and RCE in baserCMS | baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE).
* Impact: XSS to RCE via Arbitrary file upload.
* Attack vector is: Administrator must be logged in.
* Components are: ThemeFilesController.php, UploaderFilesController.php.
* Tested baserCMS Version : 4.3.6 (Latest)
* Affected baserCMS Version : 4.2.0 ~ 4.3.6 (XSS), 3.0.10 ~ 4.3.6 (RCE)
* Patches : https://basercms.net/security/20200827
Found by Vulnerability Research team in [Flatt Security Inc.](https://flatt.tech/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}] | [{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20200827'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:44:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x4rf-4mqf-cm8w | 2020-08-19T22:44:23Z | 2020-08-19T22:44:22Z | 2020-08-19T22:44:22Z | [] | Open Redirect in ecstatic | Withdrawn: Duplicate of GHSA-9q64-mpxx-87fg | [] | [{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/issues/259'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/be6fc25a826f190b67f4d16158f9d67899e38ee4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/830/versions'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:09:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5j4m-89xf-mf5p | 2020-08-27T22:58:46Z | 2020-08-27T22:58:46Z | 2020-08-27T22:58:46Z | [] | Missing Origin Validation in parcel-bundler | Withdrawn: Duplicate of GHSA-37q6-576q-vgr7 | [] | [{'package': {'ecosystem': 'npm', 'name': 'parcel-bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/issues/1783'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/pull/1794'}, {'type': 'WEB', 'url': 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/721'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:44:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w4pj-7p68-3vgv | 2023-01-31T01:29:13Z | 2020-08-05T14:52:44Z | null | ['CVE-2020-11083'] | Stored XSS in October | ### Impact
A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field.
### Patches
Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to store JS in markdown to only users that have been explicitly granted the `backend.allow_unsafe_markdown` permission.
### Workarounds
Apply https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746 & https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94 to your installation manually if unable to upgrade to Build 466 or v1.4.1 of RainLab.Blog (if using that plugin).
### References
Reported by [Sivanesh Ashok](https://stazot.com/)
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
<img width="1100" alt="Screen Shot 2020-03-31 at 2 01 52 PM" src="https://user-images.githubusercontent.com/7253840/78070158-8f7ef580-7358-11ea-950c-226533f6a0a3.png"> | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.466'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'}, {'type': 'WEB', 'url': 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2020/Aug/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-28T19:36:22Z', 'nvd_published_at': '2020-07-14T21:15:00Z'} |
1.4.0 | GHSA-hxcc-f52p-wc94 | 2021-09-23T18:50:59Z | 2020-08-11T17:21:13Z | null | ['CVE-2020-7660'] | Insecure serialization leading to RCE in serialize-javascript | serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of `<UID>`. The UID has a keyspace of approximately 4 billion making it a realistic network attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ecosystem_specific': {'affected_functions': ['serialize-javascript']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd'}, {'type': 'PACKAGE', 'url': 'https://github.com/yahoo/serialize-javascript'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-11T14:14:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mqm2-cgpr-p4m6 | 2022-04-29T20:26:19Z | 2020-08-07T22:27:41Z | null | ['CVE-2020-14001'] | Unintended read access in kramdown gem | The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'kramdown'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mqm2-cgpr-p4m6'}, {'type': 'PACKAGE', 'url': 'https://github.com/gettalong/kramdown'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kramdown/CVE-2020-14001.yml'}, {'type': 'WEB', 'url': 'https://kramdown.gettalong.org'}, {'type': 'WEB', 'url': 'https://kramdown.gettalong.org/news.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/kramdown'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200731-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4562-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4743'}] | {'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-07T22:27:22Z', 'nvd_published_at': '2020-07-17T16:15:00Z'} |
1.4.0 | GHSA-4r3m-j6x5-48m3 | 2021-01-07T23:39:22Z | 2020-08-28T21:20:42Z | null | ['CVE-2020-15155'] | Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings | baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}] | [{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}, {'type': 'WEB', 'url': 'https://basercms.net/security/20200827'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:20:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7257-96vg-qf6x | 2021-11-19T15:31:10Z | 2020-08-21T17:03:24Z | null | ['CVE-2020-15147'] | Remote Code Execution in Red Discord Bot | ### Impact
A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
### Patches
This critical exploit has been fixed on version ``3.3.12`` & ``3.4``.
### Workarounds
Unloading the Streams module with ``unload streams`` can render this exploit not accessible. We still highly recommend updating to ``3.3.12`` or ``3.4`` to completely patch this issue.
### References
* https://github.com/Cog-Creators/Red-DiscordBot/pull/4183
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Red-DiscordBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.11'}}] | [{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15147'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/'}] | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T17:02:40Z', 'nvd_published_at': '2020-08-21T18:15:00Z'} |
1.4.0 | GHSA-h6m7-j4h3-9rf5 | 2021-11-19T15:36:47Z | 2020-08-19T19:52:30Z | null | ['CVE-2020-15146'] | Remote Code Execution in SyliusResourceBundle | ### Impact
Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution.
The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`.
### Example
```yaml
sylius_grid:
grids:
foo:
fields:
bar:
options:
baz: "expr:service('sylius.repository.product').find($id)"
```
In this case, `$id` can be prepared in a way that calls other services.
If you visit `/route?id="~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database.
To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language.
### Patches
This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched.
### Workarounds
The fix requires adding `addslashes` in `OptionsParser::parseOptionExpression` to sanitize user input before evaluating it using the expression language.
```php
- return is_string($variable) ? sprintf('"%s"', $variable) : $variable;
+ return is_string($variable) ? sprintf('"%s"', addslashes($variable)) : $variable;
```
### Acknowledgements
This security issue has been reported by Craig Blanchette (@isometriks), thanks a lot!
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@sylius.com](mailto:security@sylius.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/resource-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusResourceBundle/commit/73d9aba182947473a5935b31caf65ca263091e00'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/SyliusResourceBundle'}] | {'cwe_ids': ['CWE-74', 'CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T19:50:49Z', 'nvd_published_at': '2020-08-20T01:17:00Z'} |
1.4.0 | GHSA-w542-cpp9-r3g7 | 2023-07-05T20:19:49Z | 2020-08-05T14:53:34Z | null | ['CVE-2020-16252'] | Field Test CSRF vulnerability | The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2.
## Impact
The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected.
A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user.
All users running an affected release should upgrade immediately.
## Technical Details
Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'field_test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252'}, {'type': 'WEB', 'url': 'https://github.com/ankane/field_test/issues/28'}, {'type': 'WEB', 'url': 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/field_test'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T14:47:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pwqf-9h7j-7mv8 | 2021-09-23T19:05:25Z | 2020-08-21T16:25:26Z | null | ['CVE-2020-6174'] | Incorrect threshold signature computation in TUF | ### Impact
Metadadata signature verification, as used in `tuf.client.updater`, counted each of multiple signatures with identical authorized keyids separately towards the threshold. Therefore, an attacker with access to a valid signing key could create multiple valid signatures in order to meet the minimum threshold of keys before the metadata was considered valid.
The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue.
### Patches
A [fix](https://github.com/theupdateframework/tuf/pull/974) is available in version [0.12.2](https://github.com/theupdateframework/tuf/releases/tag/v0.12.2) or newer.
### Workarounds
No workarounds are known for this issue.
### References
* [CVE-2020-6174](https://nvd.nist.gov/vuln/detail/CVE-2020-6174)
* Pull request resolving the issue [PR 974](https://github.com/theupdateframework/tuf/pull/974) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ecosystem_specific': {'affected_functions': ['tuf.sig.verify']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-pwqf-9h7j-7mv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6174'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/974'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/pull/974/commits/a0397c7c820ec1c30ebc793cc9469b61c8d3f50e'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}] | {'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:25:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xw5p-hw6r-2j98 | 2020-08-03T21:25:40Z | 2020-08-05T14:53:22Z | null | ['CVE-2020-8192'] | Denial of service in fastify | A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas. | [] | [{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/903521'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T21:25:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x7c-cx64-49w8 | 2020-08-19T22:06:03Z | 2020-08-19T22:06:03Z | 2020-08-19T22:06:03Z | [] | Regular Expression Denial of Service in is-my-json-valid | Withdrawn: Duplicate of GHSA-f522-ffg8-j8r6 | [] | [{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:28:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wwrj-35w6-77ff | 2021-01-07T23:42:18Z | 2020-08-04T14:54:08Z | null | ['CVE-2020-15135'] | CSRF vulnerability in save-server | ### Impact
Versions prior to version v1.05 are affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version v1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version.
This is patched by implementing [Double submit](https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f).
The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including:
- Upload file
- Delete file
- Add redirect
#### If you are logged in as root, this attack is significantly more severe. They can (in addition to the above):
- Create users
- Delete users
- Update users (change password)
If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password.
Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be sure they succeeded.
### Patches
This issue has been patched. Update to version v1.0.7 or above to benefit from this fix.
### Workarounds
None. You should upgrade.
### References
What is CSRF: https://owasp.org/www-community/attacks/csrf
Fix type: https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Save-server](https://github.com/Neztore/save-server/)
* Email us at [hi@nezto.re](mailto:hi@nezto.re)
* Join our discord (preferred): [Invite](https://discord.gg/QevWabU) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'save-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.0.5'}}] | [{'type': 'WEB', 'url': 'https://github.com/Neztore/save-server/security/advisories/GHSA-wwrj-35w6-77ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15135'}, {'type': 'WEB', 'url': 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/save-server'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-04T14:53:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-55mm-5399-7r63 | 2021-03-04T18:25:42Z | 2020-08-05T14:52:54Z | null | ['CVE-2020-15128'] | Reliance on Cookies without validation in OctoberCMS | ### Impact
Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding.
Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them.
### Patches
Issue has been patched in Build 468 (v1.0.468).
>**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires).
### Workarounds
Apply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468.
### References
- https://blog.laravel.com/laravel-cookie-security-releases
- https://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences.
### Acknowledgements
Thanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/rain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.468'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/pull/508'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'}] | {'cwe_ids': ['CWE-327', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:44:58Z', 'nvd_published_at': '2020-07-31T18:15:00Z'} |
1.4.0 | GHSA-vrv8-v4w8-f95h | 2023-05-22T14:51:38Z | 2020-08-11T14:55:01Z | null | ['CVE-2020-12648'] | Cross-site scripting vulnerability in TinyMCE | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower.
### Patches
This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic.
### Workarounds
The workarounds available are:
- upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1
or
- enable the media plugin, which overrides the default parsing behaviour for iframes
or
- add the following workaround to update the parsing schema rules for iframes:
#### Example: Change the default schema for iframes
```js
setup: function(editor) {
editor.on('PreInit', function() {
editor.schema.getSpecialElements()['iframe'] = /</iframe[^>]*>/gi;
});
}
```
### Acknowledgements
Tiny Technologies would like to thank George Steketee and Chris Davis at [Bishop Fox](https://www.bishopfox.com/) for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-vrv8-v4w8-f95h'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/pull/5843'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/2b71c922214d388838d930806207a66c14e80f63'}, {'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/commit/696e43658dc9750ec24fdc4650bd2be9653daf5b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-10T22:39:05Z', 'nvd_published_at': '2020-08-14T14:15:00Z'} |
1.4.0 | GHSA-69p9-9qm9-h447 | 2020-08-19T22:34:43Z | 2020-08-19T22:34:43Z | 2020-08-19T22:34:43Z | [] | Sandbox Breakout / Arbitrary Code Execution in safer-eval | Withdrawn: Duplicate of GHSA-hgch-jjmr-gp7w | [] | [{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/commit/1c29f6a6e304fb650c05056e217e457a0d2cc3c5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/787'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/787/versions'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:59:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3mvg-rrrw-m7ph | 2021-11-19T15:41:33Z | 2020-08-04T22:17:57Z | null | ['CVE-2020-15109'] | Ability to change order address without triggering address validations in solidus | ### Impact
This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment.
All stores with at least two shipping zones and different costs of shipment per zone are impacted.
E.g.
1. Store admin configured the store so that there are two zones in US:
- East Cost Zone - Shipping Method cost: $1
- West Cost Zone - Shipping Method cost: $10
The attacker user can know that shipping to NY is less expensive than to LA just by testing different addresses in checkout.
2. The attacker user enters any NY shipping address in the address step
3. The attacker user chooses the $1 delivery option
4. The attacker user crafts a request with their real LA address, similar to:
```
// POST #checkout/update:
{
state: 'payment',
order: {
ship_address_attributes: {
city: 'Los Angeles',
...
}
}
}
```
5. The attacker user proceeds with checking out with a new address and the $1 shipment costs.
Another scenario where this could be dangerous is:
> You cannot ship products in some zones and you are relying on Solidus Shipping Method building only to filter out unwanted zones. Malicious users can enter an allowed zone's address and change back to an unwanted one in the payment step by crafting a request with some proper ship_address_attributes.
This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted.
### Patches
A PR has been attached to fix the security concern for each of all the Solidus supported versions following the rules of the [Solidus Security Policy](https://solidus.io/security).
### Workarounds
When it's not possible to upgrade to a supported patched version, please use this gist to patch the store:
https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-3mvg-rrrw-m7ph'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15109'}, {'type': 'WEB', 'url': 'https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_api/CVE-2020-15109.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_frontend/CVE-2020-15109.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}, {'type': 'WEB', 'url': 'https://solidus.io/blog/2020/07/16/new-releases.html'}] | {'cwe_ids': ['CWE-20', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-04T20:54:07Z', 'nvd_published_at': '2020-08-04T23:15:00Z'} |
1.4.0 | GHSA-55j9-849x-26h4 | 2021-11-19T15:35:36Z | 2020-08-21T16:30:52Z | null | ['CVE-2020-15140'] | Remote Code Execution in Red Discord Bot | ### Impact
A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
### Patches
This critical exploit has been fixed on version 3.3.11.
### Workarounds
Unloading the Trivia module with ``unload trivia`` can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue.
### References
https://github.com/Cog-Creators/Red-DiscordBot/pull/4175
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Red-DiscordBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-55j9-849x-26h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15140'}, {'type': 'WEB', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81'}, {'type': 'PACKAGE', 'url': 'https://github.com/Cog-Creators/Red-DiscordBot'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:30:30Z', 'nvd_published_at': '2020-08-21T17:15:00Z'} |
1.4.0 | GHSA-m75h-cghq-c8h5 | 2021-09-23T20:56:01Z | 2020-08-31T22:51:50Z | null | ['CVE-2013-6393'] | Heap Based Buffer Overflow in libyaml | Versions 0.2.2 and earlier depend on native libyaml version 0.1.5 or earlier. As such, they are affected by a heap-based buffer overflow vulnerability that may result in a crash or arbitrary code execution when parsing YAML tags.
## Recommendation
- Update to version 0.2.3 that includes a version of LibYAML that contains a fix for this issue. | [] | [{'package': {'ecosystem': 'npm', 'name': 'libyaml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6393'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/xi/libyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048'}, {'type': 'WEB', 'url': 'https://bitbucket.org/xi/libyaml/commits/tag/0.1.5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/attachment.cgi?id=847926&action=diff'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1033990'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6393'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT6536'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140302205713/http://www.securityfocus.com/bid/65258'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055002/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:060/?name=MDVSA-2015:060'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/21'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2014-0040.html'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html'}, {'type': 'WEB', 'url': 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6393'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0353.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0354.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0355.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2850'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2870'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2098-1'}] | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-49rv-g7w5-m8xx | 2021-09-23T19:08:01Z | 2020-08-28T21:24:59Z | null | ['CVE-2017-18635'] | Cross-Site Scripting in @novnc/novnc | Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `include/ui.js` and users of `vnc_auto.html` and `vnc.html`.
## Recommendation
Upgrade to version 0.6.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@novnc/novnc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18635'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/issues/748'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0754'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/horizon/+bug/1656435'}, {'type': 'WEB', 'url': 'https://github.com/ShielderSec/cve-2017-18635'}, {'type': 'PACKAGE', 'url': 'https://github.com/novnc/noVNC'}, {'type': 'WEB', 'url': 'https://github.com/novnc/noVNC/releases/tag/v0.6.2'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NOVNCNOVNC-469136'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4522-1/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1204'}, {'type': 'WEB', 'url': 'https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:21:28Z', 'nvd_published_at': '2019-09-25T23:15:00Z'} |
1.4.0 | GHSA-h698-r4hm-w94p | 2021-09-23T20:58:30Z | 2020-08-31T22:54:56Z | null | ['CVE-2014-10067'] | Validation Bypass in paypal-ipn | Versions 2.x.x and earlier of `paypal-ipn` are affected by a validation bypass vulnerability.
paypal-ipn uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox.
A motivated attacker could craft a request string using the simulator to fool the application into entering the sandbox mode, potentially allowing purchases without valid payment.
## Recommendation
Upgrade to version 3.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'paypal-ipn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10067'}, {'type': 'WEB', 'url': 'https://github.com/andzdroid/paypal-ipn/issues/11'}, {'type': 'PACKAGE', 'url': 'https://github.com/andzdroid/paypal-ipn'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/26'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-31T18:08:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-86qr-9vqc-pgc6 | 2021-10-21T20:51:16Z | 2020-08-05T14:53:06Z | null | ['CVE-2020-5413'] | Code execution in Spring Integration | Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.23'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-integration'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5413'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-08-03T21:06:31Z', 'nvd_published_at': '2020-07-31T20:15:00Z'} |
1.4.0 | GHSA-2828-9vh6-9m6j | 2021-09-23T19:00:16Z | 2020-08-21T16:25:48Z | null | ['CVE-2020-6173'] | Client Denial of Service on TUF | ### Impact
An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted.
The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue.
### Patches
No fix exists for this issue.
### Workarounds
No workarounds are known for this issue.
### References
* [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173)
* [Issue #973](https://github.com/theupdateframework/tuf/issues/973) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/issues/973'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/tuf'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/tuf/commits/develop'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-21T16:19:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7wgr-7666-7pwj | 2021-01-07T23:41:29Z | 2020-08-20T14:38:13Z | null | ['CVE-2020-15141'] | Path Traversal in openapi-python-client | ### Impact
Path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
Giving this a CVSS score of 3.0 (Low) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N/E:P/RL:U/RC:C
### Patches
A fix is being worked on for version 0.5.3
### Workarounds
Inspect OpenAPI documents before generating clients for them.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues)
* Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'openapi-python-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-7wgr-7666-7pwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15141'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/commit/3e7dfae5d0b3685abf1ede1bc6c086a116ac4746'}, {'type': 'WEB', 'url': 'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13'}, {'type': 'WEB', 'url': 'https://pypi.org/project/openapi-python-client'}, {'type': 'WEB', 'url': 'https://pypi.org/project/openapi-python-client/'}] | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-08-14T16:08:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-crf2-xm6x-46p6 | 2021-11-19T15:36:13Z | 2020-08-19T18:02:36Z | null | ['CVE-2020-15151'] | Observable Timing Discrepancy in OpenMage LTS | ### Impact
This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks
### Patches
The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved
### References
Related to Adobes CVE-2020-9690 ( https://helpx.adobe.com/security/products/magento/apsb20-47.html )
fixed in Magento2 https://github.com/magento/magento2/commit/52d72b8010c9cecb5b8e3d98ec5edc1ddcc65fb4
as part of 2.4.0/2.3.5-p2 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15151'}, {'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenMage/magento-lts'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/magento/apsb20-47.html'}] | {'cwe_ids': ['CWE-203', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-19T18:02:10Z', 'nvd_published_at': '2020-08-20T01:17:00Z'} |
1.4.0 | GHSA-chqj-j4fh-rw7m | 2023-09-13T18:51:44Z | 2020-08-28T21:25:11Z | null | ['CVE-2019-16728'] | Cross-Site Scripting in dompurify | Versions of `dompurify` prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of `<svg>`/`<math>` elements and `</p>`/`</br>`. An example payload is: `<svg></p><style><a id="</style><img src=1 onerror=alert(1)>">`. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.0.3 or later. You may also disallow `<svg>` and `<math>` through `dompurify` configurations:
```DOMPurify.sanitize(input, {
FORBID_TAGS: ['svg', 'math']
});``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'dompurify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16728'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html'}, {'type': 'WEB', 'url': 'https://research.securitum.com/dompurify-bypass-using-mxss/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1205'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-28T21:24:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wfm4-pq59-wg6r | 2021-01-07T23:41:55Z | 2020-08-05T21:27:44Z | null | ['CVE-2020-15132'] | Reset Password / Login vulnerability in Sulu | ### Impact
_What kind of vulnerability is it? Who is impacted?_
This vulnerability consists of a few related issues:
#### Forget password leaks information if the user exists
When the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist:
```json
{
"code": 0,
"message": "Entity with the type \u0022Sulu\\Bundle\\SecurityBundle\\Entity\\User\u0022 and the id \u0022asdf\u0022 not found."
}
```
This enables attackers to retrieve valid usernames.
#### Forgot password leaks user email if user exists
The response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful:
```json
{"email":"admin@localhost.local"}
```
This information should not be exposed, as it can be used to gather email addresses.
#### Response time of login gives hint if the username exists
If the username the user enters in the login screen does not exists, the request responds much faster than if the username exists. This again allows attackers to retrieve valid usernames.
#### Reset Token for Forgot Password feature is not hashed
The reset token in the user database table is not hashed. That means that somebody could try to request a new password using the Forgot Password feature, and look that up in the database, if the attacker somehow got access to the database. Hashing the reset token would fix that problem.
### Patches
This problem was fixed in Release 1.6.34, 2.0.10 and 2.1.1.
### Workarounds
Override the files manually in your project and change them accordingly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.34'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15132'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/0fbb6009eb6a8efe63b7e3f3b4b886dc54bb2326'}] | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T21:26:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gr4j-r575-g665 | 2021-09-23T19:06:33Z | 2020-08-25T14:04:47Z | null | [] | Cross-Site Scripting in highcharts | Versions of `highcharts` prior to 7.2.2 or 8.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize `href` values and does not restrict URL schemes, allowing attackers to execute arbitrary JavaScript in a victim's browser if they click the link. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/'}] | [{'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/highcharts/highcharts/issues/13559'}, {'type': 'PACKAGE', 'url': 'https://github.com/highcharts/highcharts'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HIGHCHARTS-571995'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1227'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-25T14:01:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v6fx-752r-ccp2 | 2023-08-25T22:21:14Z | 2020-08-05T14:53:43Z | null | ['CVE-2020-16253'] | PgHero gem allows CSRF | The PgHero gem through 2.6.0 for Ruby allows CSRF. PgHero normally uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. Thus the ruby gem is vulnerable with non-session based authentication methods like basic authentication. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'pghero'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16253'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/issues/330'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/pghero'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-08-05T14:51:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5xf4-f2fq-f69j | 2023-09-08T22:40:47Z | 2020-02-14T23:10:16Z | null | ['CVE-2019-10773'] | Yarn Improper link resolution before file access (Link Following) | In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted "bin" keys. Existing files could be overwritten depending on the current user permission set. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10773'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/issues/7761#issuecomment-565493023'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/pull/7755'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/commit/039bafd74b7b1a88a53a54f8fa6fa872615e90e7'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0475'}, {'type': 'WEB', 'url': 'https://blog.daniel-ruf.de/critical-design-flaw-npm-pnpm-yarn/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HIZW4NZVV5QY5WWGW2JRP3FHYKZ6ZJ5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITY5BC63CCC647DFNUQRQ5AJDKUKUNBI/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-YARN-537806,'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T21:01:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ww97-9w65-2crx | 2021-03-31T21:03:54Z | 2020-02-12T18:45:28Z | null | ['CVE-2019-17558'] | Improper Input Validation in Apache Solr | Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.6.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.7.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17558'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/pull/1156'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-13971'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-14025'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b7b9d4113e6ec1ae1d3d0898c645f758511107ea44f0f3a1210c5d5@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12ab2cb15a34e49b4fecb5b2bdd7e10f3e8b7bf1f4f47fcde34d3a7c@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25f1bd4545617f5b86dde27b4c30fec73117af65598a30e20209739a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e35fd76239a381643555966fb3e72139e018d52d76544fb42f96d8@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5074d814d3a8c75df4b20e66bfd268ee0a73ddea7e85070cec3ae78d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r58c58fe51c87bc30ee13bb8b4c83587f023edb349018705208e65b37@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5dc200f7337093285bac40e6d5de5ea66597c3da343a0f7553f1bb12@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79c7e75f90e735fd32c4e3e97340625aab66c09dfe8c4dc0ab768b69@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b89b3dcfc1b6c52dd8d610b897ac98408245040c92b484fe97a51a2@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f21ab40a9b17b1a703db84ac56773fcabacd4cc1eb5c4700d17c071@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a36e4f92f4449dec517e560e1b55639f31b3aca26c37bbad45e31de@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e7a3c253a695a7667da0b0ec57f9bb0e31f039e62afbc00a1d96f7b@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9271d030452170ba6160c022757e1b5af8a4c9ccf9e04164dec02e7f@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99c3f7ec3a079e2abbd540ecdb55a0e2a0f349ca7084273a12e87aeb@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra29fa6ede5184385bf2c63e8ec054990a7d4622bba1d244bee70d82d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafc939fdd753f55707841cd5886fc7fcad4d8d8ba0c72429b3220a9a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb964fe5c4e3fc05f75e8f74bf6b885f456b7a7750c36e9a8045c627a@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rde3dbd8e646dabf8bef1b097e9a13ee0ecbdb8441aaed6092726c98d@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re8d12db916b5582a23ed144b9c5abd0bea0be1649231aa880f6cbfff@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d7ffae2b940114324e036b6394beadf27696d051ae0c4a5edf07af@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html'}] | {'cwe_ids': ['CWE-20', 'CWE-74', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T19:43:12Z', 'nvd_published_at': '2019-12-30T17:15:00Z'} |
1.4.0 | GHSA-q65m-pv3f-wr5r | 2022-10-07T13:11:43Z | 2020-02-24T17:33:44Z | null | ['CVE-2020-6802'] | XSS in Bleach when noscript and raw tag whitelisted | ### Impact
A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option.
### Patches
v3.1.1
### Workarounds
* modify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags:
```
title
textarea
script
style
noembed
noframes
iframe
xmp
```
* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.
### References
* https://bugzilla.mozilla.org/show_bug.cgi?id=1615315
* https://cure53.de/fp170.pdf
* https://nvd.nist.gov/vuln/detail/CVE-2020-6802
* https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach
### Credits
* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)
* Email us at [security@mozilla.org](mailto:security@mozilla.org)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-6802'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4276'}, {'type': 'WEB', 'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1615315'}, {'type': 'WEB', 'url': 'https://cure53.de/fp170.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/bleach'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-19T19:43:47Z', 'nvd_published_at': '2020-03-24T22:15:00Z'} |
1.4.0 | GHSA-3mcp-9wr4-cjqf | 2021-04-26T21:11:59Z | 2020-02-24T17:27:27Z | null | ['CVE-2020-5245'] | Remote Code Execution (RCE) vulnerability in dropwizard-validation | Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature.
### Summary
A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.
If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended.
### Impact
This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**.
### Patches
The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions.
### Workarounds
If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html).
Example:
```java
@SelfValidation
public void validateFullName(ViolationCollector col) {
if (fullName.contains("_")) {
// Sanitize fullName variable by escaping relevant characters such as "$"
col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName));
}
}
```
See also:
https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98
### References
* https://github.com/dropwizard/dropwizard/pull/3157
* https://github.com/dropwizard/dropwizard/pull/3160
* https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm
* https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions
* https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new)
* Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev)
### Security contact
If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy):
https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3157'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/pull/3160'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'}, {'type': 'WEB', 'url': 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation'}, {'type': 'WEB', 'url': 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions'}, {'type': 'WEB', 'url': 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-24T17:27:14Z', 'nvd_published_at': '2020-02-24T18:15:00Z'} |
1.4.0 | GHSA-84j7-475p-hp8v | 2023-05-16T16:16:12Z | 2020-02-28T16:53:55Z | null | ['CVE-2020-5247'] | HTTP Response Splitting in Puma | In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting.
While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server.
This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.12.3'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.3.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2020-5247.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254'}] | {'cwe_ids': ['CWE-113'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-28T16:50:49Z', 'nvd_published_at': '2020-02-28T17:15:00Z'} |
1.4.0 | GHSA-5q88-cjfq-g2mh | 2021-08-19T17:22:07Z | 2020-02-19T17:29:39Z | null | ['CVE-2020-7597'] | codecov NPM module allows remote attackers to execute arbitrary commands | codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CODECOV-548879'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:04:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-767j-jfh2-jvrc | 2022-09-08T14:06:08Z | 2020-02-28T01:10:58Z | null | ['CVE-2019-17569'] | Potential HTTP request smuggling in Apache Tomcat | The refactoring present in Apache Tomcat versions 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.98'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.48'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.28'}, {'fixed': '9.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.98'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.48'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.28'}, {'fixed': '9.0.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17569'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0005/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4673'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:19:11Z', 'nvd_published_at': '2020-02-24T22:15:00Z'} |
1.4.0 | GHSA-gj76-429m-56wc | 2021-08-19T16:54:03Z | 2020-02-04T22:38:22Z | null | ['CVE-2019-17556'] | Deserialization of Untrusted Data in Apache Olingo | Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17556'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/pull/60/files'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1410'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:35:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ff2w-cq2g-wv5f | 2021-08-19T17:32:40Z | 2020-02-21T18:55:50Z | null | ['CVE-2020-7238'] | HTTP Request Smuggling in Netty | Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.43'}, {'fixed': '4.1.45'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.44'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7238'}, {'type': 'WEB', 'url': 'https://github.com/jdordonezn/CVE-2020-72381/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9861'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://netty.io/news/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:49Z', 'nvd_published_at': '2020-01-27T17:15:00Z'} |
1.4.0 | GHSA-wgjx-hm34-qgf7 | 2021-08-19T17:12:52Z | 2020-02-11T20:36:04Z | null | ['CVE-2019-16194'] | SQL injection in Centreon | SQL injection vulnerabilities in Centreon through 19.04 allow attacks via the svc_id parameter in include/monitoring/status/Services/xml/makeXMLForOneService.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.04.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16194'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/7862'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:35:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3m93-m4q6-mc6v | 2021-08-19T17:33:33Z | 2020-02-26T19:54:31Z | null | ['CVE-2019-14864'] | Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible | Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.15'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.7'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14864'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/63522'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/63527'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64273'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64274'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/64748'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}] | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T02:19:23Z', 'nvd_published_at': '2020-01-02T15:15:00Z'} |
1.4.0 | GHSA-3j78-7m59-r7gv | 2021-01-08T20:29:11Z | 2020-02-24T17:18:26Z | null | ['CVE-2020-5244'] | Private data exposure via REST API in BuddyPress | In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed.
This has been patched in version 5.1.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'buddypress/buddypress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244'}, {'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'}, {'type': 'WEB', 'url': 'https://buddypress.org/2020/01/buddypress-5-1-2/'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-24T17:18:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v4qh-6367-4cx2 | 2021-08-19T16:54:36Z | 2020-02-04T22:38:38Z | null | ['CVE-2020-1925'] | Server-Side Request Forgery (SSRF) in Apache Olingo | Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1925'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/202001.mbox/%3CCAGSZ4d6HwpF2woOrZJg_d0SkHytXJaCtAWXa3ZtBn33WG0YFvw%40mail.gmail.com%3E'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:35:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cqqj-4p63-rrmm | 2021-08-25T17:26:45Z | 2020-02-21T18:55:24Z | null | ['CVE-2019-20444'] | HTTP Request Smuggling in Netty | HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.44'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20444'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9866'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9871'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9871/files#diff-e26989b9171ef22c27c9f7d80689cfb059d568c9bd10e75970d96c02d0654878'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4532-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}] | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:33Z', 'nvd_published_at': '2020-01-29T21:15:00Z'} |
1.4.0 | GHSA-xwgq-pcqx-hpmv | 2021-08-19T16:56:45Z | 2020-02-12T18:45:50Z | null | ['CVE-2019-19703'] | URL Redirection to Untrusted Site (Open Redirect) in Ktor | In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.ktor:ktor-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/issues/1467'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T17:33:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w4rc-rx25-8m86 | 2021-08-19T17:13:33Z | 2020-02-12T18:44:16Z | null | ['CVE-2019-11325'] | Improper Input Validation in Symfony | An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/var-exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/var-exporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11325'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-11325.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/var-exporter/CVE-2019-11325.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://github.com/symfony/var-exporter/compare/d8bf442...57e00f3'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-11325-fix-escaping-of-strings-in-varexporter'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-11325'}] | {'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:39:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2gc7-w4hw-rr2m | 2021-08-19T19:29:17Z | 2020-02-28T01:10:17Z | null | ['CVE-2019-19634'] | class.upload.php in verot.net omits .pht from the set of dangerous file extensions | class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'verot/class.upload.php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'verot/class.upload.php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19634'}, {'type': 'WEB', 'url': 'https://github.com/jra89/CVE-2019-19634'}, {'type': 'WEB', 'url': 'https://github.com/verot/class.upload.php/blob/2.0.4/src/class.upload.php#L3068'}, {'type': 'WEB', 'url': 'https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:03:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p5w7-qmq6-pmjr | 2023-08-31T10:01:20Z | 2020-02-26T19:55:32Z | null | ['CVE-2019-12413'] | Users able to query database metadata in Apache Superset | In Apache Incubator Superset before 0.31 user could query database metadata information from a database he has no access to, by using a specially crafted complex query. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/85ab04f8c52df8c353ecfa0ecd2ff27fc07fb8ab7566a754349806be%40%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-APACHESUPERSET-558911'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:53:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-84cm-v6jp-gjmr | 2021-08-19T17:14:36Z | 2020-02-14T23:09:24Z | null | ['CVE-2019-10776'] | OS command injection in git-diff-apply | In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-diff-apply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.22.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10776'}, {'type': 'WEB', 'url': 'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774,'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T19:30:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-477x-w7m6-c6ph | 2021-08-19T16:52:56Z | 2020-02-04T22:37:15Z | null | ['CVE-2019-17555'] | Improper input validation in Apache Olingo | The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to implement a DoS attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17555'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/pull/61'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1411'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d65UmudJ_MQkFXEv9YY_wwZbRA3sgtNDzMoLM51Qh%3DRCA%40mail.gmail.com%3E'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:19:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cchx-mfrc-fwqr | 2021-09-30T18:40:15Z | 2020-02-12T18:45:08Z | null | ['CVE-2019-10911'] | Improper authentication in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony '}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10911'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_19'}] | {'cwe_ids': ['CWE-200', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:17:08Z', 'nvd_published_at': '2019-05-16T22:29:00Z'} |
1.4.0 | GHSA-7553-jr98-vx47 | 2022-04-22T17:29:45Z | 2020-02-24T19:12:36Z | null | ['CVE-2020-7595'] | libxml as used in Nokogiri has an infinite loop in a certain end-of-file situation | xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
The Nokogiri RubyGem has patched its vendored copy of libxml2 in order to prevent this issue from affecting nokogiri. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7595'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1992'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-7595.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202010-04'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200702-0005/'}, {'type': 'WEB', 'url': 'https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4274-1/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T18:58:16Z', 'nvd_published_at': '2020-01-21T23:15:00Z'} |
1.4.0 | GHSA-pg97-ww7h-5mjr | 2021-08-19T17:21:06Z | 2020-02-13T22:21:06Z | null | ['CVE-2019-10785'] | XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo:
* 1.16.1
* 1.15.2
* 1.14.5
* 1.13.6
* 1.12.7
* 1.11.9
Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dojo/dojox](https://github.com/dojo/dojox/) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.14.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '1.16.1'}]}], 'versions': ['1.16.0']}] | [{'type': 'WEB', 'url': 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/pull/315'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T22:20:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qxf4-chvg-4r8r | 2021-08-19T19:30:36Z | 2020-02-28T01:10:48Z | null | ['CVE-2020-1935'] | Potential HTTP request smuggling in Apache Tomcat | In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.100'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.51'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1935'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200327-0005/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4448-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4673'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T16:18:59Z', 'nvd_published_at': '2020-02-24T22:15:00Z'} |
1.4.0 | GHSA-73m2-3pwg-5fgc | 2023-08-23T00:09:00Z | 2020-02-04T03:07:31Z | null | ['CVE-2020-5236'] | Catastrophic backtracking in regex allows Denial of Service in Waitress | ### Impact
When waitress receives a header that contains invalid characters it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions.
This would allow an attacker to send a single request with an invalid header and take the service offline.
Invalid header example:
```
Bad-header: xxxxxxxxxxxxxxx\x10
```
Increasing the number of `x`'s in the header will increase the amount of time Waitress spends in the regular expression engine.
This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230.
### Patches
The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.
### Workarounds
If you have deployed a reverse proxy in front of Waitress it may already be rejecting requests that include invalid headers.
### Thanks
The Pylons Project would like to thank [Fil Zembowicz](https://github.com/fzembow) for reaching out and disclosing this vulnerability!
### References
Catastrophic backtracking explained: https://www.regular-expressions.info/catastrophic.html
### For more information
If you have any questions or comments about this advisory:
- open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
- email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.rfc7230.FIELD_CONTENT', 'waitress.rfc7230.FIELD_VALUE', 'waitress.rfc7230.OWS_STRIP']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.2'}, {'fixed': '1.4.3'}]}], 'versions': ['1.4.2']}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-73m2-3pwg-5fgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5236'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/6e46f9e3f014d64dd7d1e258eaf626e39870ee1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T03:06:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hmr4-m2h5-33qx | 2022-03-21T20:34:24Z | 2020-02-11T21:03:20Z | null | ['CVE-2020-7471'] | SQL injection in Django | Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.postgres.aggregates.StringAgg']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7471'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/001b0634cd309e372edb6d7d95d083d02b8e37bd'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/505826b469b16ab36693360da9e11fd13213421b'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c67a368c16e4680b324b4f385398d638db4d8147'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2020/Feb/30'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200221-0006/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4264-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4629'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/feb/03/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/02/03/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/03/1'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-05T15:07:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qvrv-2x7x-78x2 | 2021-08-19T17:22:37Z | 2020-02-24T17:33:31Z | null | ['CVE-2019-19325'] | Reflected XSS in SilverStripe | SilverStripe through 4.4.x before 4.4.5 and 4.5.x before 4.5.2 allows Reflected XSS on the login form and custom forms. Silverstripe Forms allow malicious HTML or JavaScript to be inserted through non-scalar FormField attributes, which allows performing XSS (Cross-Site Scripting) on some forms built with user input (Request data). This can lead to phishing attempts to obtain a user&#39;s credentials or other sensitive user input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19325'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/49fda52b12ba59f0a04bcabf78425586a8779e89'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2019-19325'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:11:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mgh8-hcwj-h57v | 2021-08-19T16:53:27Z | 2020-02-04T22:37:43Z | null | ['CVE-2019-17554'] | Improper Restriction of XML External Entity Reference in Apache Olingo | The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-client-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.olingo:odata-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17554'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63'}, {'type': 'WEB', 'url': 'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/OLINGO-1409'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/11'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T22:29:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-934x-72xh-5hrg | 2021-08-19T17:15:08Z | 2020-02-14T23:09:45Z | null | ['CVE-2019-10777'] | OS command injection in aws-lambda | In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName". | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'aws-lambda'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10777'}, {'type': 'WEB', 'url': 'https://github.com/awspilot/cli-lambda-deploy'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T19:57:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c5r5-7pfh-6qg6 | 2023-08-28T19:12:01Z | 2020-02-14T23:10:01Z | null | ['CVE-2019-10780'] | BibTeX-Ruby vulnerable to OS command injection | BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby `Kernel.open` method through BibTeX.open. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bibtex-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10780'}, {'type': 'WEB', 'url': 'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c5r5-7pfh-6qg6'}, {'type': 'PACKAGE', 'url': 'https://github.com/inukshuk/bibtex-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bibtex-ruby/CVE-2019-10780.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T20:45:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r679-m633-g7wc | 2023-03-06T20:47:04Z | 2020-02-04T22:36:36Z | null | ['CVE-2019-12422'] | Improper input validation in Apache Shiro | Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12422'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c9db14cfebfb8e74205884ed2bf2e2b30790ce24b7dde9191c82572c@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T21:49:59Z', 'nvd_published_at': '2019-11-18T23:15:00Z'} |
1.4.0 | GHSA-r6j9-8759-g62w | 2021-03-26T00:27:41Z | 2020-02-04T22:39:19Z | null | ['CVE-2019-10172'] | Improper Restriction of XML External Entity Reference in jackson-mapper-asl | A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar to CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jackson:jackson-mapper-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10172'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe%40%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581%40%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0%40%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9%40%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c%40%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e%40%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b%40%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-04T20:42:17Z', 'nvd_published_at': '2019-11-18T17:15:00Z'} |
1.4.0 | GHSA-fxjm-wvj9-9c39 | 2023-09-01T10:12:40Z | 2020-02-26T19:54:57Z | null | ['CVE-2020-1932'] | Information disclosure in Apache Superset | An information disclosure issue was found in Apache Superset 0.34.0, 0.34.1, 0.35.0, and 0.35.1. Authenticated Apache Superset users are able to retrieve other users' information, including hashed passwords, by accessing an unused and undocumented API endpoint on Apache Superset. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.35.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1932'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e5323c3bc786005495311a6ff53ac6d990b2c7eb52941a1a13ce227%40%3Cdev.superset.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:51:07Z', 'nvd_published_at': '2020-01-28T01:15:00Z'} |
1.4.0 | GHSA-3jqw-vv45-mjhh | 2023-05-22T18:25:18Z | 2020-02-12T23:37:46Z | null | ['CVE-2020-5241'] | XSS/Script injection vulnerability in matestack | matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection.
This vulnerability is patched in version 0.7.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'matestack-ui-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/security/advisories/GHSA-3jqw-vv45-mjhh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5241'}, {'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/commit/5c61571739e860db9ca578fe09ab4733878cb0fc'}, {'type': 'WEB', 'url': 'https://github.com/matestack/matestack-ui-core/commit/e96915cf20c4fa0571df7fa21e9b09a69be19107'}, {'type': 'PACKAGE', 'url': 'https://github.com/matestack/matestack-ui-core'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/matestack-ui-core/CVE-2020-5241.yml'}] | {'cwe_ids': ['CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-12T23:37:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jppv-gw3r-w3q8 | 2023-08-29T15:03:03Z | 2020-02-28T16:54:36Z | null | ['CVE-2020-8130'] | OS Command Injection in Rake | There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in `Rake::FileList` when supplying a filename that begins with the pipe character `|`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rake'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 12.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/651518'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jppv-gw3r-w3q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rake'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rake/CVE-2020-8130.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4295-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:50:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mxhp-79qh-mcx6 | 2023-01-30T19:22:17Z | 2020-02-19T16:43:42Z | null | ['CVE-2019-10790'] | TaffyDB can allow access to any data items in the DB | TaffyDB allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. Taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, TaffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB. **Note:** `taffy` and its successor package `taffydb` are not maintained. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'taffy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'taffydb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10790'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TAFFY-546521'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/taffy'}, {'type': 'PACKAGE', 'url': 'https://www.npmjs.com/package/taffydb'}] | {'cwe_ids': ['CWE-20', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-18T20:15:03Z', 'nvd_published_at': '2020-02-17T20:15:00Z'} |
1.4.0 | GHSA-wp7m-mrvf-599c | 2021-11-01T14:12:07Z | 2020-02-14T23:09:10Z | null | ['CVE-2019-15597'] | Command Injection in node-df | All versions of `node-df` are vulnerable to Command Injection. The package fails to sanitize filenames passed to the `file` option. If this value is user-controlled it may allow attackers to run arbitrary commands in the server.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-df'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15597'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/703412'}, {'type': 'PACKAGE', 'url': 'https://github.com/adriano-di-giovanni/node-df'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1431'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T17:09:46Z', 'nvd_published_at': '2019-12-18T21:15:00Z'} |
1.4.0 | GHSA-8rc5-hx3v-2jg7 | 2021-08-19T19:25:06Z | 2020-02-27T20:36:29Z | null | ['CVE-2019-10772'] | Sanitizer bypass in svg-sanitizer | It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'enshrined/svg-sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10772'}, {'type': 'WEB', 'url': 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:32:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cmcx-xhr8-3w9p | 2023-05-04T20:02:25Z | 2020-02-20T23:26:10Z | null | ['CVE-2020-5243'] | Denial of Service in uap-core when processing crafted User-Agent strings | ### Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
### Patches
Please update uap-core to &amp;gt;= v0.7.3
Downstream packages such as uap-python, uap-ruby etc which depend upon uap-core follow different version schemes.
### Details
Each vulnerable regular expression reported here contains 3 overlapping capture groups. Backtracking has approximately cubic time complexity with respect to the length of the user-agent string.
#### Regex 1:
```
\bSmartWatch *\( *([^;]+) *; *([^;]+) *;
```
is vulnerable in portion ` *([^;]+) *` and can be attacked with
```python
&amp;quot;SmartWatch(&amp;quot; + (&amp;quot; &amp;quot; * 3500) + &amp;quot;z&amp;quot;
```
e.g.
```
SmartWatch( z
```
#### Regex 2:
```
; *([^;/]+) Build[/ ]Huawei(MT1-U06|[A-Z]+\d+[^\);]+)[^\);]*\)
```
is vulnerable in portion `\d+[^\);]+[^\);]*` and can be attacked with
```python
&amp;quot;;A Build HuaweiA&amp;quot; + (&amp;quot;4&amp;quot; * 3500) + &amp;quot;z&amp;quot;
```
#### Regex 3:
```
(HbbTV)/[0-9]+\.[0-9]+\.[0-9]+ \([^;]*; *(LG)E *; *([^;]*) *;[^;]*;[^;]*;\)
```
is vulnerable in portion ` *([^;]*) *` and can be attacked with
```python
&amp;quot;HbbTV/0.0.0 (;LGE;&amp;quot; + (&amp;quot; &amp;quot; * 3500) + &amp;quot;z&amp;quot;
```
#### Regex 4:
```
(HbbTV)/[0-9]+\.[0-9]+\.[0-9]+ \([^;]*; *(?:CUS:([^;]*)|([^;]+)) *; *([^;]*) *;.*;
```
is vulnerable in portions ` *(?:CUS:([^;]*)|([^;]+)) *` and ` *([^;]*) *` and can be attacked with
```python
&amp;quot;HbbTV/0.0.0 (;CUS:;&amp;quot; + (&amp;quot; &amp;quot; * 3500) + &amp;quot;z&amp;quot;
&amp;quot;HbbTV/0.0.0 (;&amp;quot; + (&amp;quot; &amp;quot; * 3500) + &amp;quot;z&amp;quot;
&amp;quot;HbbTV/0.0.0 (;z;&amp;quot; + (&amp;quot; &amp;quot; * 3500) + &amp;quot;z&amp;quot;
```
Reported by Ben Caller @bcaller | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'uap-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'user_agent_parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5243'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/commit/0afd61ed85396a3b5316f18bfd1edfaadf8e88e1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/user_agent_parser/CVE-2020-5243.yml'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T23:09:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9r27-994c-4xch | 2020-02-21T20:20:53Z | 2020-02-24T17:34:02Z | null | [] | discord-html not escaping HTML code blocks when lacking a language identifier | ### Impact
Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed.
### Patches
This has been patched in version 2.3.1
### Workarounds
Escape the characters `<>&` before sending plain code blocks to discord-markdown.
### References
https://github.com/brussell98/discord-markdown/issues/13 | [] | [{'package': {'ecosystem': 'npm', 'name': 'discord-markdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch'}, {'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-21T20:20:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9c29-9h4m-wg5p | 2023-08-31T10:11:22Z | 2020-02-26T19:55:14Z | null | ['CVE-2019-12414'] | Users can view database names in Apache Superset | In Apache Incubator Superset before 0.32, a user can view database names that he has no access to on a dropdown list in SQLLab | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.32.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12414'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/396034aabe08dd349ff44eb062c718aadcf1b4e86f6372c7d5e988c0%40%3Cdev.superset.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-25T15:51:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w2fr-65vp-mxw3 | 2021-08-19T17:12:23Z | 2020-02-12T18:44:50Z | null | ['CVE-2019-10912'] | Deserialization of untrusted data in Symfony | In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpunit-bridge. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/phpunit-bridge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10912'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/phpunit-bridge/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/21'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10912'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2019-016/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4441'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-11T20:17:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p2v9-g2qv-p635 | 2021-08-25T17:37:42Z | 2020-02-21T18:55:04Z | null | ['CVE-2019-20445'] | HTTP Request Smuggling in Netty | HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.45'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20445'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/issues/9861'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/pull/9865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0497'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0567'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0601'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0605'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4532-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-20T20:54:25Z', 'nvd_published_at': '2020-01-29T21:15:00Z'} |
1.4.0 | GHSA-r5fx-8r73-v86c | 2022-08-02T16:22:26Z | 2020-02-14T23:08:49Z | null | ['CVE-2019-14863'] | AngularJS Cross-site Scripting due to failure to sanitize `xlink.href` attributes | Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled.
## Recommendation
Upgrade to version 1.5.0-beta.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0-beta.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14863'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/pull/12524'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:angular:20150807'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1453'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-02-13T17:26:17Z', 'nvd_published_at': '2020-01-02T15:15:00Z'} |
1.4.0 | GHSA-x8wj-6m73-gfqp | 2021-01-08T20:30:34Z | 2020-02-18T18:59:24Z | null | ['CVE-2020-5237'] | Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle | ### Impact
The vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, OneupUploaderBundle is susceptible to a path
traversal vulnerability which can be exploited to upload files to
arbitrary folders on the filesystem. The assembly process can further be
misused with some restrictions to delete and copy files to other
locations.
The vulnerability can be exploited by any users that have legitimate
access to the upload functionality and can lead to arbitrary code
execution, denial of service and disclosure of confidential information.
### Patches
Yes, see version 1.9.3 and 2.1.5.
### References
https://owasp.org/www-community/attacks/Path_Traversal
### Credits:
This security vulnerability was found by Thibaud Kehler of SySS GmbH.
E-Mail: thibaud.kehler@syss.de | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'oneup/uploader-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oneup/uploader-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5237'}, {'type': 'WEB', 'url': 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}, {'type': 'WEB', 'url': 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt'}] | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-02-05T13:52:02Z', 'nvd_published_at': '2020-02-05T14:15:00Z'} |